Entrust Datacard delivers new credentialing software
Entrust Datacard unveiled the new Datacard TruCredential Suite Software which is designed to help organizations of all sizes deploy a secure ID program that meets a wide range of application requirements—from basic photo IDs to high-assurance credentials.
The software suite can be used to issue a variety of credentials such as student, faculty or visitor IDs; employee or contract badges; patient and staff health care IDs; credentials for local government programs; membership and customer loyalty cards; and transit passes.
Available in four editions that enable organizations to easily scale from a single workstation to a multi-station, enterprise-wide application without increasing complexity – the TruCredential Suite offers a combination of functionalities.
These include pre-configured card design templates that can be easily customized to develop unique designs; enrollment and data capture capabilities with support for QR code, photo and signature devices for capturing physical and logical cardholder data; workflow tools for reduced set-up time; enterprise integration including physical access control system interfaces; and smart card encoding support to drive operational efficiencies.
India police force taps NEC for facial recognition
NEC India Pvt. Ltd., NEC Corp. and Innovative Telecom & Softwares Pvt. Ltd., announced the deployment of NEC’s face recognition technology for Surat City Police (Gujarat).
NEC’s NeoFace Watch for Live CCTV surveillance and NeoFace Reveal for forensic criminal investigation will be deployed for Surat City Police, an important step forward in Surat’s safe city initiative.
NeoFace Reveal is a software solution for forensic investigation that provides law enforcement and crime laboratory agencies with the ability to enhance poor quality latent face images, search against their mugshot databases, and locate potential suspects, while NeoFace Watch integrates with existing video surveillance systems and matches faces in real-time against a watch list of individuals to trigger an alert.
Zetes providing health care IDs for Côte d’Ivoire
Côte d’Ivoire’s SNEDAI, the national company for the issuing of administrative identification documents, has selected Zetes for registration and the production of cards for 4 million health card cards.
The United Nations has repeatedly pointed out that a universal healthcare system would play a key role in the development of Africa. In 2014, the government of the Côte d’Ivoire decided to set up a universal medical cover system.
Zetes is setting up the infrastructure for the biographical and biometric registration of citizens and the biometric database, which ensures the integrity and uniqueness of the data collected. Cards that comply with the security standards for identity documents are then produced and personalized. Finally, they are given to the beneficiaries.
Together, Zetes and SNEDAI have been managing the Ivorian biometric and electronic passport since 2008. Following the recording of their personal data, more than 600,000 people have received one of the most secure passports in the world.
FIME, Thales team on host-card emulation
FIME and Thales have announced the launch of a joint offering for the host-card emulation (HCE) mobile services market. The partners have teamed up to provide near field communication service providers and issuing banks with a three-phase portfolio of functional and security consultancy and testing services.
From project initiation, FIME combines its established HCE training and consultancy package with support for specification development, request for proposal drafting, pilot assessment and test plan advancements. At the same time, on the security side, Thales offers security pre-assessment and consulting to ensure the product or system is ready for official security evaluation.
In the second phase, FIME supports service providers and issuers with testing for their HCE mobile applications and servers, to ensure they work as intended once live in the market.
Finally, Thales manages the security evaluation and certification, including analysis of the product documentation, source code examination which can either be conducted in its laboratory or at the customer’s premises, and penetration testing to confirm the resistance of the application to external threats.