Category: Biometrics and Security Blog

Biometrics for Attendance Management Part 1

Problems in Attendance Management The most frequent inquiries we mofiria recently receive may be about attendance management. They are hoping to implement some kind of biometrics into their own existing solution or a customized development for a specific company or organization. So many companies and organizations are still using IC cards, timecards or even hand-writing manually for recording attendance data.These operation methods have some problems about incorrect attendance data by proxy time recording of IC card or timecard, or by tampering the data.Especially, it can be a serious problem for corporations and organizations that employ many part-time workers for hourly wage.Also, it is not efficient to issue an IC card

Visiting Our Partner – 01 Systems WLL

The other day I visited one of our most important business partners in Middle East, 01 Systems WLL. This article is the report of my visit and the introduction of this innovative company. 01 Systems has its headquarter in Manama, Kingdom of Bahrain and the branch offices in other Middle East countries and India. They are implementing their solution services globally including mainly Middle East and North Africa. One of their representative solutions is content management system by the combination of signatory management and biometric authentication. They provide it depending on the customers demands.They are utilizing mofiria’s finger vein authentication technology into the system used for identity verification at bank’s

Vulnerability in Biometric Authentication

What Is Vulnerability? Vulnerability generally refers to a security flaw due to a program failure or the like and means a state in which the security of the system is compromised against unauthorized access from the outside.Security holes are a typical example of the vulnerability.As a vulnerability in biometric authentication, “spoofing to others” is typical one.There are some specific attack methods of creating and presenting artifacts of some parts of living human body in some way. Presentation Attack Detection and Its Limitation In case of developing biometric authentication products, it is necessary to implement “presentation attack detection” to judge that artifacts as above are not human bodies.One of the typical

Introducing Cloud-based Vein Authentication Solution (Security Solution from T4U Part 2)

※This article is a guest post by T4U Co.,Ltd  Part.1: Security Circumstances and Multi-Layered Protection (Security Solution from T4U Part 1) Cloud-based Vein Authentication Solution – VIP System The VIP System is a security solution based on multi-layered protection. VIP is stand for Vein Identification Platform.It is a combination of thin client system and finger vein authentication enabling realtime monitoring and data encryption. In thin client system, a terminal doesn’t have information and using external device can be prohibited. Therefore, it can keep high security even if the user is not familiar with IT related knowledge.Thin client system provided by T4U can protect not only the endpoint but also any data

Security Circumstances and Multi-Layered Protection (Security Solution from T4U Part 1)

※This article is a guest post by T4U Co.,Ltd In general, we regard ‘Security’ as a kind of obstacle that prohibits various things or makes anything inconvenient. The security solution T4U proposes enables the users to build an environment that they can concentrate on their own business. In addition to being safe, the users can spend their time in their proper work instead of managing passwords and rules. Security incidents in Japan The following table and chart were reported by Japan Network Security Association on May 2017 and these elements show security incidents occurred in 2016 and those causes.As you can see, the total number of persons whose info was

Optimizing Your Solution 3 – Cache Matching

Troubleshooting for server authentication Mofiria’s vein authentication can be executed on the device or centrally on a server. However, when you are using server authentication, what if there is something wrong with the data communication or authentication server and the process can’t be done? Surely it would affect your business greatly. There are many ways to prevent this critical situation such as building a backup server and communication line, introducing a UPS (Uninterruptible Power Supply), introducing a cloud storage and so on. However, there is no perfect solution. Cache Matching feature In such case, we recommend using the cache matching feature, also referred to as the offline matching feature.This feature

Security Evaluation for Biometric Verification Product Part 2

※For the part 1, please refer to here. II. Efforts Toward Security Evaluation Using CC Various approaches to security evaluation of biometric verification products have been made up to now. The author reports on these efforts and the current situation twice, last time and this time. This time, he reports various overseas and domestic efforts related to security evaluation using CC. 1. Efforts in each country and ISO / IEC 19792 It was Great Britain that first tackled a PP development in the field of biometrics. The draft in 2001 can still be referenced on the Internet, but is incomplete.U.S. Government Biometric Verification Mode Protection Profiles were developed for Basic

Security Evaluation for Biometric Verification Product Part 1

I. Security Evaluation Using CC Various approaches to security evaluation of biometric verification products have been made up to now. The author reports on these efforts and current situation twice. This time security evaluation, especially the one using CC (Common Criteria) is reported. 1. Requirements for security evaluation Security evaluation is to evaluate the security of a product. The evaluation result depends on the evaluator who evaluates it. Evaluators are classified into three: product developers themselves, product procurers, and independent third parties. Evaluation by product developers has the least objectivity and evaluation by product procurers is difficult to reuse by other procurers. Evaluation by independent third parties is the most

Optimizing Your Solutions 2 – Event Notification

What is ‘Event Notification’ feature? First of all, please take a look at the following video: This video includes two patterns of vein recognition processes that is used as an alternative for a physical key. Did you notice there was a slight difference between them? In the first process, the person did one additional behavior that turned on the device before starting the authentication. In the second one, however, the process started soon after placing a finger on the device. The authentication process to open the cabinet uses the ‘Event Notification’ feature. The authentication device is waiting for placing a finger on and the process starts as soon as it

Finger Vein Recognition

Finger vein recognition is a sort of biometrics using finger vein patterns for verifying or identifying one person.

mofiria provides finger vein authentication devices and SDKs that combine the highest level of accuracy, speed and efficiency.

Biometrics and Security Blog
Amagai Blog