Category: Biometrics and Security Blog

Better Life with Finger ID

As we enter into the 9th year of operation, we’ve reviewed mofiria’s vision and mission. The core message, that is “to contribute to make the better world by using our super-accurate authentication technology” is not changed, but the expression is modified for better understanding. For the better world, we’ d like to help solve these three challenges: 1) To make every single person have their own secure ID2) That ID is hard to be spoofed3) You’ll be free from keys, cards, or passwords Including all those essences, we’d decided to use the new slogan:Better Life with Finger ID Author of this article Satoshi Amagaimofiria CorporationPresident and CEO

8-Year Anniversary for mofiria

On December 6th,2018, Today we have 8-year anniversary of mofiria Corporation. Taking this opportunity, we want to express our sincere appreciation to all the people who have supported us, worked with us, and advised us. Sorry this is written in Japanese, but it is a kind of “my eternal reference”. It is an impressive documentary about Sony’s CCD development history.Sony’s CCD eventually made success after the tough 8-year of blood, sweat and tears in its R&D. The author is Mr. Yoshiyuki Kawana, one of core engineers of CCD development.Most precious lesson for me is “Never give up as long as you believe the future benefit of this new technology”. Recalling

10 Years After The Financial Crisis 2008

The other day a broadcast said that 10 years have passed since the Financial Crisis happened, which reminds me of its pretty heavy impact on the mofiria operation at that time.In 2008 we were with Sony Corporation and in the incubation phase seeking for any business opportunities inside/outside SONY. ・One of our first development trials was to be embedded into a personal computer. We set up the joint development project with a PC team and made the product planning and the mass production design together. However, when the Financial Crisis occurred, the global IT market also collapsed, and the business of the PC team immediately got worse and their next

Solution Deployment Utilizing Bluetooth Connected Vein Authentication

— Building accurate security environments using Bluetooth connected vein authentication unit, FVA-U4BT — Working Together with Attendance Management System idearecord, inc. has a concept as ‘Web solutions on chain store business’ and helps the customers to solute various problems around chain stores.idearecord’s cloud type attendance management system ‘CREW CHECKER’ enables identity verification using mofiria’s Bluetooth connected finger vein authentication unit FVA-U4BT.It helps to remove common problems regarding time card and ID card such as forgetting to punch, losing a card and unfair processing including proxy time recording. Since each finger has a different vein pattern, it is so hard to forge and impersonate. Thus, finger vein authentication is very effective

Biometrics and Deep Learning

Third AI Boom and Deep Learning Artificial intelligence is booming in recent years, that named third AI boom.Deep learning is the key technology of the AI boom.It uses neural networks that had been developed previously as pattern recognition technology.Recognition performance has been greatly improved by using DNN (Deep Neural Network), which has many middle layers. Last year, Google Deep Mind’s computer game software “Alpha GO” developed using this technology surprised the world by winning 4 wins and 1 loss against world top players.Deep learning is currently used in various fields such as translation / speech processing (recognition / synthesis) / image processing, and many of them have achieved significant performance

Biometrics for Attendance Management Part 2

On the Part 1, we explained the current problems and suitable biometric modality for attendance management.This Part 2 features several things that you have to decide to develop or implement biometrics-driven attendance management system, and the way how you consider to deciding those elements. Storage location of biometric information data The suitable storage location for biometric information data (template) depends on the scale, scheme or network configuration of corporation or organization that introduces the solution. It would be either of the following four locations:・Server (External storage)・Client computer・Biometric device・IC card In most cases for networked environments, the data would be stored in the server. For standalone environments, the general storage location

Protection of Biomertric Information

Necessity of Biomertic Information Protection Since biometrics authentication uses perspnal characteristics of individuals,it has the following advantages: there is no possibility of being lost such ascards for authentication using possessions, and of being forgotten such as passwordsfor authentication using memory of individuals.On the other hand, it has the disadvantage that information for authentication can not be changed.If the biometric information is stolen and known to a third party,it becomes impossible to perform biometric authentication using that information.Also, if the same information is used in multiple services, leakage of biometric information in a certain service also affects other services.With the spread of biometric authentication, how to protect biometric information has become

Evaluating the Performance of Biometric Authentication Technology

The authentication performance of the biometric authentication technology is one of the indications that the user is most interested in introducing the biometric authentication.If the authentication performance can be expressed as numerical values by several scales, the user can know the authentication performance by simply comparing them.Although the numerical value relating to the performance of the product is clarified by the product developer even now, the user is not satisfied only with the value.In this article, the difficulty of performance evaluation particular to biometric authentication technology is described. *) Difficulty in Unifying Evaluation Data When comparing different authentication technologies, it is necessary to use the same evaluation data for measuring

Logon Software for Mac and Windows – @SECURE/fv

Enlarging Scope for Using Mac Computer Recently more corporations and organizations start using Mac computers for their operations.In an interview of a company president on television, we often see a laptop Mac computer placed on the desk.Before, as most business application system ran on Windows computer only, we didn’t have an alternative choice. Due to recent system transitions to cloud computing, you can access business application system from anywhere using a web browser. Thus, you don’t necessarily need to have a Windows computer and accessing to the system from outside of the office via internet connection is getting popular. However, in terms of protecting personal information and/or corporate confidential information,

Authentication Using Various Biometric Information

Biometric authentication begins with research on fingerprint authentication, and now much biometric information such as face, iris, voice, vein are used for personal authentication.As these biometric authentication technologies have been put to practical use and biometric authentication techniques have become widely known, biometric authentication techniques using various types of biometric information have been studied.In this article, we will introduce research on these technologies in Japan. Gait Recognition Many researches have been done on the identification of individuals by the way they walk. This technology has the advantage that is able to authenticate individuals from a distance as long as 50 meters away, that are not found in other biometrics.Osaka University,

Finger Vein Recognition

Finger vein recognition is a sort of biometrics using finger vein patterns for verifying or identifying one person.

mofiria provides finger vein authentication devices and SDKs that combine the highest level of accuracy, speed and efficiency.

Biometrics and Security Blog
Amagai Blog