Many of us remember those stretch-of-the-imagination science-fiction movies and TV shows in which people were screened by facial and iris scans to access otherwise-off-limits locations. While these futuristic depictions of technology have found success in some government and commercial applications, its use for consumers is still in its infancy.
By contrast, fingerprint authentication has been readily adopted on consumer flagship... Read more
One of the many advances being made in smartphones and tablets is the progression to a “whole-device” display. Some models already have full-width displays with little or no bezel or ink area on the sides. The next step will be a nearly full-height display; “nearly” that is, because while the home button will be gone, there will still need to be a front-facing camera.
The use of biometrics for user identity has become increasingly... Read more
Easy-to-guess keyboard passwords are just one of the pitfalls of legacy user authentication. In the world of enterprise IT, maintaining security is a challenge and managing the logistics that enable it can be tedious as well. But it is never in vain – protecting the company’s crown jewels is so important, and in our hyper-connected world, strong security procedures are necessary. Biometrics provides that enhanced security, eliminates the... Read more
Wealth attracts criminals like honey attracts bears. It should come as no surprise, then, that the wealth of information and services accessed through fingerprint authentication would be “honey” to the bad guys out there, intent on using such access for illicit purposes. Among their methods is spoofing – the act of fabricating fingerprints for use on... Read more
You’re in another state attending a wedding when you realize you left the gift at home. In an effort to get a quick replacement, you stop at the local department store to get a silver chafing dish. Of course you’ve never been to this department store, you’re not in your home state,... Read more