Category: My-ID

Welcome to our archive

Face Anti Spoofing In the recent times as biometric recognition systems increase their performance, IT Managers have to take in great consideration possible direct attack; potential intruders may gain access to the IT system by directly interacting with the system input device, like a normal user would. Such attempts are referred as spoofing attacks. Our […]

Read More

Biometrics and Cryptography : The biometric Password   Biometrics provide a person with unique characteristics which are always there.  Can they be used as a cryptographic key?   First of all we can define  Conventional cryptography a methodology based on encryption keys, which are just bit strings long enough, usually 128 bit or more.  These […]

Read More

Anti-Money Laundering: who are the recipients of the obligations? The recipients of anti-money laundering obligations, in the presence of some signals, must strengthened the measures and carry out strict controls. The anti-money laundering legislation affects a wide range of recipients. Among those we can found: – banking and financial intermediaries; – professionals (accountants, career counselors); […]

Read More

There are many techniques that can be used to find information linked to users’ accesses. Can you avoid these attacks by not sending users and passwords? There are highly advanced tools which allow password recovery which can also be used as a password cracker. The great speed of this software relies in the ability to […]

Read More

My-ID meets all 3 requirements of the PSD2: •       something that only the user knows: My-ID requires the repetition of the phrases that the user knows for voice verification •       something the user owns: a personal smartphone •       something that represents the user: his voice and his face

Read More