Category: Biometrics

Solution Deployment Utilizing Bluetooth Connected Vein Authentication

— Building accurate security environments using Bluetooth connected vein authentication unit, FVA-U4BT — Working Together with Attendance Management System idearecord, inc. has a concept as ‘Web solutions on chain store business’ and helps the customers to solute various problems around chain stores.idearecord’s cloud type attendance management system ‘CREW CHECKER’ enables identity verification using mofiria’s Bluetooth connected finger vein authentication unit FVA-U4BT.It helps to remove common problems regarding time card and ID card such as forgetting to punch, losing a card and unfair processing including proxy time recording. Since each finger has a different vein pattern, it is so hard to forge and impersonate. Thus, finger vein authentication is very effective

Biometrics and Deep Learning

Third AI Boom and Deep Learning Artificial intelligence is booming in recent years, that named third AI boom.Deep learning is the key technology of the AI boom.It uses neural networks that had been developed previously as pattern recognition technology.Recognition performance has been greatly improved by using DNN (Deep Neural Network), which has many middle layers. Last year, Google Deep Mind’s computer game software “Alpha GO” developed using this technology surprised the world by winning 4 wins and 1 loss against world top players.Deep learning is currently used in various fields such as translation / speech processing (recognition / synthesis) / image processing, and many of them have achieved significant performance

Protection of Biomertric Information

Necessity of Biomertic Information Protection Since biometrics authentication uses perspnal characteristics of individuals,it has the following advantages: there is no possibility of being lost such ascards for authentication using possessions, and of being forgotten such as passwordsfor authentication using memory of individuals.On the other hand, it has the disadvantage that information for authentication can not be changed.If the biometric information is stolen and known to a third party,it becomes impossible to perform biometric authentication using that information.Also, if the same information is used in multiple services, leakage of biometric information in a certain service also affects other services.With the spread of biometric authentication, how to protect biometric information has become

Evaluating the Performance of Biometric Authentication Technology

The authentication performance of the biometric authentication technology is one of the indications that the user is most interested in introducing the biometric authentication.If the authentication performance can be expressed as numerical values by several scales, the user can know the authentication performance by simply comparing them.Although the numerical value relating to the performance of the product is clarified by the product developer even now, the user is not satisfied only with the value.In this article, the difficulty of performance evaluation particular to biometric authentication technology is described. *) Difficulty in Unifying Evaluation Data When comparing different authentication technologies, it is necessary to use the same evaluation data for measuring

Authentication Using Various Biometric Information

Biometric authentication begins with research on fingerprint authentication, and now much biometric information such as face, iris, voice, vein are used for personal authentication.As these biometric authentication technologies have been put to practical use and biometric authentication techniques have become widely known, biometric authentication techniques using various types of biometric information have been studied.In this article, we will introduce research on these technologies in Japan. Gait Recognition Many researches have been done on the identification of individuals by the way they walk. This technology has the advantage that is able to authenticate individuals from a distance as long as 50 meters away, that are not found in other biometrics.Osaka University,

Vulnerability in Biometric Authentication

What Is Vulnerability? Vulnerability generally refers to a security flaw due to a program failure or the like and means a state in which the security of the system is compromised against unauthorized access from the outside.Security holes are a typical example of the vulnerability.As a vulnerability in biometric authentication, “spoofing to others” is typical one.There are some specific attack methods of creating and presenting artifacts of some parts of living human body in some way. Presentation Attack Detection and Its Limitation In case of developing biometric authentication products, it is necessary to implement “presentation attack detection” to judge that artifacts as above are not human bodies.One of the typical

Security Evaluation for Biometric Verification Product Part 2

※For the part 1, please refer to here. II. Efforts Toward Security Evaluation Using CC Various approaches to security evaluation of biometric verification products have been made up to now. The author reports on these efforts and the current situation twice, last time and this time. This time, he reports various overseas and domestic efforts related to security evaluation using CC. 1. Efforts in each country and ISO / IEC 19792 It was Great Britain that first tackled a PP development in the field of biometrics. The draft in 2001 can still be referenced on the Internet, but is incomplete.U.S. Government Biometric Verification Mode Protection Profiles were developed for Basic

Security Evaluation for Biometric Verification Product Part 1

I. Security Evaluation Using CC Various approaches to security evaluation of biometric verification products have been made up to now. The author reports on these efforts and current situation twice. This time security evaluation, especially the one using CC (Common Criteria) is reported. 1. Requirements for security evaluation Security evaluation is to evaluate the security of a product. The evaluation result depends on the evaluator who evaluates it. Evaluators are classified into three: product developers themselves, product procurers, and independent third parties. Evaluation by product developers has the least objectivity and evaluation by product procurers is difficult to reuse by other procurers. Evaluation by independent third parties is the most

The Importance of Two-Factor Authentication

What Is Two-Factor Authentication (Multi-Factor Authentication)? In recent years, the use of “two-factor authentication” has been increasing as a personal identification method. The methods of identity verification are roughly divided into the following three: 1) Use user’s knowledge: (Something you know)2) Use user’s possession: (Something you have)3) Use characteristics of users themselves: (Something you are, biometrics) Multi-factor authentication is a method of identity verification using multiple elements of these three, and two-factor authentication is using two elements of these three.For example, ATM using a cash card as 1) and a secret number as 2) realizes two-factor authentication.Even in the case of using two levels of authentication, both passwords and answers

Introduction: About Biometrics

※This article is a revised version of the one published on Dempa Shimbun High Technology issued on May 2017. Biometrics Market Since Japan is a relatively safe country, we Japanese tend to have a kind of subconscious mind that safety is a common thing. However, other countries have a stronger demand for high security and assured identity verification. Therefore, they also have a stronger movement for utilizing biometrics technologies into various security purposes. Many countries introduce biometrics into their infrastructure institutions and some already try to associate biometric information with national ID. The CAGR, Compound Annual Growth Rate, for biometrics market in the world is about 12%. Many emerging countries

Finger Vein Recognition

Finger vein recognition is a sort of biometrics using finger vein patterns for verifying or identifying one person.

mofiria provides finger vein authentication devices and SDKs that combine the highest level of accuracy, speed and efficiency.

Biometrics and Security Blog
Amagai Blog