Chinese citizens are required to use their national ID cards for a variety of tasks and service. A test set to expand across the country seeks to create virtual ID cards tied to the accounts of WeChat, one of the most popular apps in the world.
White Papers & Webinars
Protecting healthcare from cyber attack
The Georgetown Law Center on Privacy and Technology questions the value and legal standing of facial recognition technology that supporters say could make international travel safer and more efficient. The criticism comes as the Biometric Exit technology finds use in eight U.S. airports.
12 Jan, 2018Digital identity for bars and nightclubs in UK
Yoti, a British startup that focuses on digital ID authentication via smartphones, says its system will help UK bars cut down on underage entries and make it more efficient for legitimate customers to start drinking. Next up? Supermarkets and dating sites.
The company will supply components for the smart ID card used my military members, contractors and Department of Defense employees. The deal marks the second such relationship that XTec has forged with defense officials.
The multi-billion-dollar deal comes amid a major push by Thales to beef up its digital security strength—and as Gemalto expands further into government and other services. The new ‘powerhouse’ will have expertise in such areas as biometrics and multifactor authentication.
The most talked about application for mobile ID technology is the mobile driver’s licenses, but there are many other functions and credentials that are poised to go the mobile route. Check out what one expert in the field identifies as the top five uses for mobile ID beyond driver’s licenses.
21 Dec, 2017Protecting healthcare from cyber attack
By Mollie Shields Uehling, President and CEO, SAFE-BioPharma Association Over the past few years almost 180 million Americans have had their healthcare records stolen. Our ubiquitous reliance on user names and passwords is the leading cause of these massive cyber thefts. Another term for it is weak identity trust. The same can be said of […]