We see more and more articles about hackers running rampant and stealing important data - passwords, account information and more. With respect to this, people ask how this can be circumvented. Biometry is a rather popular answer to this question, but at the end of every article, there are the questions: "But is it good enough? What happens if our biometric samples are stolen? It lasts for a life!" and so on. This blog article is aimed at clearing things up a little bit, because while these questions are valid and good, there is rarely a fulfilling answer for them.
Read moreThe two most common abbreviations one can meet when dealing with biometric identification systems are FAR (False Acceptance Rate) and FRR (False Rejection Rate). But how do they relate to each other? What is their significance? This blogpost aims to shed light on this matter.
Read moreHow does behaviour based identification work, or, in other words, what makes it good for unique identification? What questions has to be answered in order for the technology to gain foothold and spread widely, and what questions will arise because of it?
Read moreThere are a number of things you might have not known about biometry, but it is good to know, especially nowadays, that biometry is expanding more than ever, and also, misconceptions run rampant in the media. Our blog attempts to shed light on the true facts about biometry, and in this effort, we have collected a number of small facts that you may have not known about the topic
Read moreIn biometry, there are two methods for identifying people, based on the pool of templates the identification is performed on. These are the 1:1 method, or verification and the 1:N method, or identification. Both has its own pros, cons and suggested usages, and this blogpost is aimed at providing a basic understanding of the two concepts along with their properties.
Read moreSingle or multi-factor? This is a question that, in our experience, gets asked quite frequently when planning an access control system. One might say that the more factors, the more security, the better... but is this really true? In certain cases, where security takes precedence, the answer is straightforward. In other cases, not so much.
Security level is not the only difference between single and multi-factor authentication, and as such, one must examine the question thoroughly, before choosing the method to be used.
This blogpost will examine these questions, primarily from a biometric standpoint, but we will also look at other solutions. This information is important for anyone who is planning access control for all, but the highest security places, where the highest possible security requirements override any other consideration.
Read moreWelcome to the third instalment of our blogposts about the terms we use in our tests and the ones you may come across when dealing with biometry. Our aim is to make these words, terms and abbreviations understandable and defined in layman's terms, based on the respective standards. This chapter deals with an assortment of terms that you may encounter when dealing with biometry
Read moreA general misconception that biometric identification gives an especially high security level, due to the idea that a biometric feature can't be stolen. Well, this is part true and part untrue. As most with most questions of this kind, the security that biometry can give depends on the preparedness of the attacker, and more importantly the quality of the device in question.
Most biometric technologies are vulnerable (=can be spoofed) - or a better way to put this is that many methods are known and published. In this post, we collected methods and materials that can be used to attack biometric identification devices on the technological level.
It is not our aim to give a precise definition of the methods, that can be found with a little effort on the internet, moreover, under the White Hat section, we already feature multiple methodology. The main purpose is to demonstrate the possibilities and costs associated with them. The first episode features the fingerprint identification technology.
Read moreWelcome to the second chapter of our blogposts about the terms we use in our tests and the ones you may come across when dealing with biometry. Our aim is to make these words, terms and abbreviations understandable and defined in layman's terms, based on the respective standards. Part 2 is dealing with the abbreviations and words regarding test types and identification methods.
Read moreWe often find ourselves in front of subjective opinions that either praise or despise biometry. This may be a pain for those who are trying to introduce or install biometry at their organizations, if they do not learn to handle these - often resulting from strong emotions - suggestions. In order, to do so, however, we must understand them. It is good to know what kind of attitudes we may face in our practice.
We started a research on such attitudes regarding biometric technologies, and we will constantly publish the results as we progress.
Let's see what premises we started with and what are the questions we are seeking answers for.
Read moreWith just a few easy steps, you can get a 365 day full access to all our tests. Click Register to get started!
Learn about the various biometric technologies available to you! Find the direction you wish to follow with our overview on identification technologies!
Already selected a technology? See how it worked out for others! Read our case studies to confirm your choice!
Choosing the proper device for your application is crucial to achieve the desired results. Our independent and professional tests will help you find the most suitable system that will best serve your needs.