23 Mar, 2015Spring 2015 Regarding ID magazine available via interactive PDF viewer
Stories from the spring issue include: the evolution of AFIS; for better cards, consider better materials; step-up authentication; and electronic IDs in Europe.
23 Mar, 2015Spring 2015 Regarding ID magazine available via interactive PDF viewer
Stories from the spring issue include: the evolution of AFIS; for better cards, consider better materials; step-up authentication; and electronic IDs in Europe.
26 Feb, 2015New credentialing software, Indian police using facial recognition, Zetes providing African health card IDs
Entrust Datacard unveiled the new Datacard TruCredential Suite Software; NEC India Pvt. Ltd., NEC Corp. and Innovative Telecom & Softwares Pvt. Ltd., announced the deployment of NEC’s face recognition technology for Surat City Police; Côte d’Ivoire has selected Zetes for registration and the production of cards for 4 million health card cards; FIME and Thales have announced the launch of a joint offering for the host-card emulation (HCE) mobile services market.
11 Feb, 2015Touchless fingerprints: A new approach to an old modality
The stalwart of biometric authentication has long been fingerprints, with implementations ranging from high-security physical access to unlocking a mobile phone. But while other biometric modalities have made public strides in recent years, the fingerprint has been quietly taken for granted as a secure authenticator. Some are offering a new spin on the old modality by enabling it to be touchless.
21 Jan, 2015HID predicts identity trends for 2015
Selva Selvaratnam, senior vice president and chief technology officer with HID Global, has predicted some identity and security trends for 2015, including moving campus IDs to mobile devices, centralizing identity management and better securing electronic prescriptions
20 Jan, 201525 worst passwords of 2014
Computer users are not using stronger passwords, according to the annual list of the 25 worst passwords from SplashData. In the fourth annual report, compiled from more than 3.3 million leaked passwords during the year, “123456” and “password” continue to hold the top two spots that they have held each year since the first list in 2011. Other passwords in the top 10 include “qwerty,” “dragon,” and “football.”
06 Jan, 2015Authentication in the IoT – challenges and opportunities
Any article on the Internet of Things (IoT) will point out that the IoT must be secure in order for its value to be realized. Generally the point is made by describing a scary scenario where an attacker is able to access data or perform an operation by impersonating a valid user, highlighting the importance of authentication to the IoT.
05 Jan, 2015End of life for fed’s four levels of assurance?
Kill them? Revise them? Industry ponders options
The four levels of assurance are oft cited as guidelines for how much an identity can be trusted. But they are also oft criticized as being too rigid and not accommodating to to all markets. How is the government and others viewing these levels and how might they change in the future?
Enter the site