New Lumidigm® J110 Fingerprint Sensors Work In The Real World
New Lumidigm® J110 Fingerprint Sensors Work In The Real World

The J110 is a ruggedised sensor that incorporates Lumidigm’s patented technology.  In a fraction of a second, multiple wavelengths of light coupled with advanced filtering techniques capture images at and below the surface of the skin.  The resulting high-quality fingerprint images virtually eliminate common performance problems due to poor images.  This award-winning sensor also has the industry’s best anti-spoof technology.Designed for the most demanding civil and access control applications, the J110 delivers high-quality, 500 dpi fingerprint images in all environments.  Multispectral imaging provides clean, clear fingerprint images when fingers are wet, extremely dry, or incompletely touching the platen.  By looking below the skin surface, high-quality fingerprint images can be captured even when the individual has little or no surface fingerprint.  This translates to repeatable high-quality fingerprint images that can reduce or eliminate enrollment problems and false rejections making secure high-throughput indoor and outdoor applications a reality.While fake fingers and finger spoofs are a significant risk for fingerprint applications, the J110 eliminates this barrier to deployment.  Readily available spoofs that easily defeat conventional fingerprint sensors such as thin films and prostheses are rendered useless against Lumidigm’s new sensor. Built to withstand the elements and continue to perform all day, every day in the real world, the J110 has a cast aluminum case and NEMA 4 rating and is capable of operating at temperatures from -20o to +70o C with humidity ranging from 10 – 99% RH.

Add to Compare

Browse Access Control Readers

Access control readers - Expert commentary

Wireless Technology Is Transforming Motion Detection
Wireless Technology Is Transforming Motion Detection

Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.

The Growth Of The Mobile Access Card Market In 2020
The Growth Of The Mobile Access Card Market In 2020

The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.

Entrance Control Vs Access Control: Similarities And Differences
Entrance Control Vs Access Control: Similarities And Differences

Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorized personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognizing the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorized person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorized users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.

Latest Lumidigm news

ISC West 2019 Day Two: Explaining The New And The Tried-And-True
ISC West 2019 Day Two: Explaining The New And The Tried-And-True

There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm Biometrics Integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative Security Technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud?  PowerSeries Pro Intrusion Portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping To Cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalize on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight Hosted Managed Service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarize system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.

ISC West 2016: HID Global Mobility Initiative Expands Capabilities Of Trusted IDs On Mobile Devices
ISC West 2016: HID Global Mobility Initiative Expands Capabilities Of Trusted IDs On Mobile Devices

A highlight of initiative is HID’s latest mobility solutions unveiled at ISC West, including goID platform, Mobile Access enhancements, & more HID Global®, a worldwide leader in secure identity solutions, has introduced a mobility initiative that includes solutions, services, investments and alliances that expand the capabilities of trusted IDs on mobile devices across a growing range of access control, authentication and Internet of Things (IoT) applications. A highlight of the initiative is the company’s latest mobility solutions unveiled at ISC West 2016, including the new HID goID™ platform for mobile IDs which makes it possible to carry a driver license and other citizen IDs on smartphones, and new enhancements to HID Mobile Access® that now enable the use of smartwatches and tablets, in addition to smartphones, for secure access to buildings. “The HID Global mobility initiative dramatically elevates how users regard security by enabling them to confidently connect to and use more applications, on the go, than ever before, with a single, trusted ID that can be carried on a smart device,” said Stefan Widing, President and CEO of HID Global. “During the past several years, we’ve led the market in taking the first steps to turn smartphones into ID cards, keys and computer logon tools, with rapid growth in enterprise adoption of HID Mobile Access this year. Now, HID Global is driving advancements that will usher in an era of connected and trusted identities that become the heart of a more secure digital lifestyle built around the convenience and ubiquity of our ever-present mobile devices.” HID Global’s growing mobility offering is aimed at driving new levels of convenience and empowerment to transform the user experience in today’s increasingly connected, mobile-first world. New solutions launched at ISC West as part of the mobility initiative include: HID goID™ Platform for Mobile IDs: An important step toward making the vision of mobile citizen IDs a reality, the HID goID™ platform for mobile IDs enables federal, state and local government agencies to issue credentials over the air to citizens’ smartphones for driver’s licenses, passports, social security cards and other national ID documents. It also makes it possible for a smartphone to serve as an all-in-one secure credential and ID reader, providing the choice to eliminate ID readers at border crossings and other locations. New HID Mobile Access capabilities, including support for Apple Watch, Android Wear and tablets: New capabilities provide smart device choice, beyond the smartphone, to open doors and gates. New HID Mobile Access Portal and App software developer kits (SDKs) enable partners and end-users to create innovative, customized mobile access solutions that can be fully integrated into their back-end systems. New services to meet compliance, security and risk management needs: HID Professional Services™ provide customers with the technical expertise to design and implement mobileaccess and strong authentication solutions for secure access to data, cloud-based applications and web services. "The HID Global mobility initiative dramatically elevates how users regard security by enabling them to confidently connect to and use more applications, on the go, than ever before, with a single, trusted ID that can be carried on a smart device" says Stefan Widing, President and CEO, HID Global Over the past 18 months, HID Global has steadily integrated mobility into the security experience through numerous new solutions and services, strategic partnerships and investments. As the company’s mobility initiative has expanded and accelerated, it has: Improved the convenience of enterprise strong authentication: ActivID® Tap Authentication for Microsoft enables users to simply tap their smart card to laptops, tablets, phones and other NFC-enabled devices for easy and convenient access to Office365 and other cloud apps and web-based services. Created a better and more secure banking experience: Mobile Push notifications for ActivID® Trusted Transactions eliminate the hassle of PINs, passwords and authentication challenge questions by turning the smartphone into a security token. Enabled new IoT applications: HID Trusted Tag® Services have added trust to NFC transactions, enabling IoT applications that would otherwise be vulnerable to risk or simply not possible. Security guards and other “lone workers” can verify they are where they are supposed to be on their rounds. Strengthened HID Global’s mobility portfolio through strategic partnerships and acquisitions: Partnerships with Samsung, NXP and other industry-leading companies to forward the adoption of mobile solutions. HID Global’s Lumidigm® acquisition expanded its biometrics capabilities, and the acquisition of Quantum Secure provides the ability to automate access control by adding an integrated physical security policy platform for managing secure identities, compliance and operational analytics across multiple sites and systems. Forrester Research said in its 2016 Mobile Predictions report that mobile devices will become users’ go-to technology, and mobile will act as a catalyst to transform businesses in the Age of the Customer. The firm also said in its 2015 Mobile Security Playbook that security leaders are struggling to accommodate a mobile mind shift in the enterprise and must balance security and privacy concerns with the importance of user experience and the business objectives of the enterprise. HID Global’s mobility solutions are powered by the company’s award-winning Seos® technology, which adds trust to identities, so users can confidently embrace and use new applications that simplify and enrich their lives. As the underlying technology for solutions leveraged by enterprises, banks, hospitals, universities and other organizations, Seos is also used by HID Global’s parent company ASSA ABLOY in the successful Starwood Keyless entry program, where hotel guests around the world open guest rooms with their smartphones. Live Demonstrations At ISC West 2016 In Booth #11063 Visit HID Global’s booth for a wide range of mobility demonstrations, along with the company’s broad portfolio of solutions for creating, managing and using secure identities.

Rapid Growth Of Biometric Solutions In The Banking Industry Strengthens Protection Against Identity Theft And Fraud
Rapid Growth Of Biometric Solutions In The Banking Industry Strengthens Protection Against Identity Theft And Fraud

Biometric solutions are replacing PINs at physical ATMs and providing a more fool-proof form of identification for banking security Biometrics is seeing especially rapid adoption rates throughout the worldwide banking infrastructure, particularly at the ATM and teller counter, says Phil Scarfo, VP worldwide marketing, biometrics, HID Global. “There are also opportunities for biometrics to improve security by enabling transaction-based authentication for online and mobile banking”, he says.  Apart from the usual video security and CCTV solutions that are being widely used, biometric authentication ensures enhanced protection for banks. Interoperable Biometric Authentication Devices For Payments & Mobile Banking Popular use cases include a) PIN replacement at physical ATMs; b) proof-of-presence (such as pension benefit distribution) that requires liveness detection; c) more easily authenticating multiple transactions during a single ATM session; d) incorporating biometric information directly into a smart device; and e) the ability to leverage investments in biometric enrolment databases across multiple applications. An example of the latter is when fingerprint authentication on mobile devices used for payments and secure mobile banking is also used in conjunction with enrolled information for authentication at an ATM. The availability of interoperable authentication devices would permit cross-bank usage and pave the way for many new applications in the future. When multi-spectral fingerprint technology is combined with a trusted biometric authenticator, it can enable new user experiences that are highly inclusive, non-intrusive and secure, says Scarfo. In one example, a financial institution has enabled customers to enjoy card-less processing, which improves security by eliminating the need for PINs while offering the convenience of making their finger the only required personal “key” or “wallet” for accessing cash and conducting other transactions at an ATM. Users simply enter their account number and confirm the transaction with a fingerprint. The bank that took this to market established a competitive advantage over its peers who did not offer the service, which resulted in the successful acquisition of new customers who made the switch specifically for this reason. Biometric solutions on smart devices combine security and convenience forthe user, removing the need for bank cards to make cash transactions Biometrics Identity-Proofing Reduces Risk Of Fraud & Identity Theft Scarfo says many countries use biometrics to strengthen the chain of trust across many different types of transactions – from banking to citizen ID applications like pension delivery and public healthcare services. By enrolling a citizen’s fingerprints and then creating an ecosystem in which these transactions are strongly tied to that individual’s biometrics, the potential for fraud and identity theft approaches zero, says Scarfo, and the process is simple and convenient for users. The biometric for identity-proofing each transaction must interoperate with trusted devices at each verification point (including PCI-compliance readers and mobile devices bound to their owners), and there must be adequate liveness detection and identity proofing across all transactions. Scarfo says HID Global’s Lumidigm biometric authenticator exemplifies this approach for creating a device-independent, trusted physical identity verification process. It connects to an institution’s systems through a cryptographically secure channel protected by hardware tamper detection and response, establishing trust between devices and the institution’s systems independent of intermediate systems and networks. The device performs a finger scan with best-in-class liveness detection to ensure the person transacting is the one that enrolled the fingerprint. Extending this concept, if a card, smartphone, PID pad, or other form of authentication is then presented for authentication, each is also confirmed by the biometric to ensure true identity verification was performed in a trusted manner.

Related white papers

5 Reasons To Integrate Mobile Technology Into Your Security Solution

11 Considerations For Embedded System RFID Readers

RFID and Smartphone Readers in Physical Access Control