Read the interview released in the enterprise security magazine about biometric authentication
Read the interview released in the enterprise security magazine about biometric authentication
Face Anti Spoofing In the recent times as biometric recognition systems increase their performance, IT Managers have to take in great consideration possible direct attack; potential intruders may gain access to the IT system by directly interacting with the system input device, like a normal user would. Such attempts are referred as spoofing attacks. Our […]
Biometrics and Cryptography : The biometric Password Biometrics provide a person with unique characteristics which are always there. Can they be used as a cryptographic key? First of all we can define Conventional cryptography a methodology based on encryption keys, which are just bit strings long enough, usually 128 bit or more. These […]
Anti-Money Laundering: who are the recipients of the obligations? The recipients of anti-money laundering obligations, in the presence of some signals, must strengthened the measures and carry out strict controls. The anti-money laundering legislation affects a wide range of recipients. Among those we can found: – banking and financial intermediaries; – professionals (accountants, career counselors); […]
There are many techniques that can be used to find information linked to users’ accesses. Can you avoid these attacks by not sending users and passwords? There are highly advanced tools which allow password recovery which can also be used as a password cracker. The great speed of this software relies in the ability to […]
My-ID meets all 3 requirements of the PSD2: • something that only the user knows: My-ID requires the repetition of the phrases that the user knows for voice verification • something the user owns: a personal smartphone • something that represents the user: his voice and his face
My-Id checks two biometric factors to ascertain the identity: the person alive and his / her voice timbre.
My-ID is a Multi-Factor Biometric Authentication (MFA) technology that adds an extra layer of protection before access to corporate applications is granted
My-ID considers the biometric identity as a personal asset that cannot be distributed and therefore must remain the complete property of the user
A security discipline is the use of IAM or Biometric Identity Access Management (BIAM) for business and risk management, which includes practices, processes and technologies that manage the identities and authorizations of people, services and things, as well as relationships and trust between them.
Recent Comments