New cards for use in the European Union would include digital fingerprint representations and photos of cardholders. The general idea behind the biometric ID cards is to make life harder for criminals and extremists.
As the biometric authentication spreads — this latest project in Miami involves Lufthansa Customs and Border Protection (CBP) and SITA. It relies on live facial photos checked against CBP databases for real-time matching and verification.
Evernym, which promotes use of blockchain for digital ID, has awarded the Red Cross and four other global humanitarian groups free access to an accelerator program. The effort, involving organizations with wide reach, could further promote the deployment of cutting-edge digital IDs among millions of people.
Facial recognition is increasingly being deployed to tighten security, improve authentication, and streamline payment and retail transactions. But an ordinance in San Francisco — the first of its kind — would ban its use by city government, potentially restricting police from using evidence gained from the biometric tool.
Biometrics, in simple terms, involves the recording of body measurements and details such as fingerprints, facial recognition, and iris scans. Fingerprints and facial scans unlock our phones and various biometrics secure our access to buildings and facilities. But where else can biometrics help? Can they alleviate the security issues associated with smart cards? Smart cards […]
Louisiana has already approved them, and other states are considering them, and now digital driver’s licenses could soon see lawmaker debate in Florida. A bill is ready, and it goes beyond digital ID — it seeks to boost blockchain and could help lead to the creation of a real-time insurance database.
ELATEC offers multi-tech readers that meet emerging health care needs
Contactless and RFID readers have long been used by hospitals for time and attendance and logical access applications, but their use is growing rapidly for cybersecurity and HIPAA compliance as well. User authentication deficiencies, endpoint data leakage and excessive user permissions are the three most common cybersecurity risks facing health systems and hospitals, according to […]