White Paper: Nymi Band. Redefining Identity

Size: px
Start display at page:

Download "White Paper: Nymi Band. Redefining Identity"

Transcription

1 White Paper: Nymi Band Redefining Identity Lysanne Pinto TWR2009 December 11 th, 2015

2 Contents Introduction... 1 Biometrics... 2 Electrocardiograms as a Biometric Solution... 3 Technical Overview of the Nymi Band... 4 What is the Nymi Band?... 4 What Does it Look Like?... 4 How Does it Work?... 6 Features and Benefits of the Nymi Band... 7 Nymi Band as a Wearable... 7 Nymi Band s Privacy by Design... 7 Nymi Band s Bluetooth Low Energy... 8 Conclusion... 8 Summary... 8 Where to Get the Nymi Band?... 9

3 Glossary Activation: The process of capturing and processing a sample of the user s ECG in order to turn it into a biometric template. Biometrics: A universal behavioral or physiological characteristic that is used to identify a person. Enrollment: The process of authenticating the user s identity against the previously created biometric template. Electrocardiogram (ECG): An interpretation of changes in the electrical activity of the heart overtime, depicted as a wave. Information for an ECG is collected by placing electrodes externally on both sides of the body. Nymi Companion Application (NCA): Nymi s own application run on a smartphone, tablet, or computer, which facilitates enrollment and activation of the Nymi Band. Privacy by Design: The philosophy and approach of embedding privacy into the design specifications of various technologies. Spoof: The act of recreating data to impersonate a communication. For Nymi Band users, an attacker would attempt to mimic their ECG in order to access their applications, devices, and personal data.

4 Executive Summary The purpose of this white paper is to show how sacrificing security and privacy for convenience is a problem in today s society, and to show how the Nymi Band will improve your life by making your digital identity secure and private. The Nymi Band is a wearable wristband device that enables the wearer with secure and continuous authentication through biometric ECG identification. This wearable device addresses today s issues of security and convenience, and also enables a hyperpersonalized user experience for the emerging applications of tomorrow. The Nymi Band uses HeartID a proprietary technology that leverages the wearer s unique ECG as a biometric identifier. HeartID is the core technology in Nimy, which functions as a set of algorithms that allow you to be identified by your ECG. Nimy is a device that is wearable, is designed with embedded privacy, and communicates through Bluetooth Low Energy, which allows for the benefits of convenience, security, and hyper-personalization. The following white paper aims to show how the Nymi Band s ECG biometric system is a solution to the problem of identity, as it provides more convenient and secure authentication.

5 Introduction The purpose of this white paper is to show how sacrificing security and privacy for convenience is a problem in today s society, and to show how the Nymi Band will improve your life by making your digital identity secure and private. Our daily lives are scattered with things that we constantly need to carry with us; from what s in our wallet, like payment cards and government-issued IDs; to what we carry in our pockets, such as house keys, car keys, and workplace badges; to the things that we need to remember, such as passwords, PINs, and usernames. All of these different things are tools that authenticate your identity in order to use a system, service, or device. Moreover, these tools can be lost, stolen, or compromised, thus posing inconvenience and risk involved with your personal data and identity 1. Finally, this white paper is for enterprise security enterprises that want to implement secure and continuous authentication solutions, for consumers who want the convenience of a wearable device without sacrificing security, and for developers who are interested in developing more applications for the Nymi Band. Therefore, as a solution to the problem of identity, biometrics has been introduced in order to provide more convenient and secure authentication. This white paper will cover: Biometrics Technical overview of the Nymi Band Key features and benefits of the Nymi Band, and Conclusion 1 Agrafioti. F., Hatzinakos, D. ECG biometric analysis in cardiac irregularity conditions. In Signal, Image, and Video Processing

6 Biometrics The traditional password and username combination is insecure and inconvenient. As we are moving away from traditional forms of passwords to authenticate a person s digital identity, the use of biometric recognition systems is more secure and convenient as they are unique to each individual and avoid the problem of having to remember a multitude of passwords. A biometric is defined as a behavioral or physiological characteristic that is used to recognize a person s identity 2. The most common forms of biometric systems used to authenticate identity are: hand recognition, facial recognition, iris recognition, and fingerprint recognition 3. For example, mobile devices and laptops can now be unlocked with fingerprints. Moreover, a recent report from PYMNTS.com in Identity Tracker claims ( ) that the worldwide biometrics technology market will grow from $2 billion in 2015 to $14.9 billion by , thus suggesting that biometrics are a key trend. However, these forms of biometrics either ( ) can not provide reliable performance in terms of recognitions accuracy or are not robust enough against falsification 5. That is to say, these common forms of biometrics still pose a challenge as they can be lifted or captured without a person s consent. 2 SearchSecurity, 'What is biometrics? - Definition from WhatIs.com', [Online]. Available: [Accessed: 08- Dec- 2015]. 3 The Economist, 'A heart to my key', [Online]. Available: [Accessed: 08- Dec- 2015]. 4 Oberthur Technologies. PYMNTS.com Report. In Identity Tracker. Available: Wang, Y., Agrafioti, F., Harzinakos, D., Plataniotis, K. N. Analysis of human electrocardiogram for biometric recognition. In EURASIP Journal on Advances in Signal Processing

7 Electrocardiograms as a Biometric Solution As an alternative to the most commonly used biometrics, the electrocardiogram or ECG, has been proven to be the most reliable biometric for identity authentication 5. The reason for this is that the physiological and geometrical differences of the heart in different individuals display certain uniqueness in their ECG signals (See Figure 1 below). The ECG is the signal that describes the electrical activity of the heart, which provides information about the heart s rate, rhythm, and morphology 5. In medical settings, the ECG is usually recorded by placing a set of electrodes on the body. That is to say, biometrics are convenient to use, but also secure the most secure being your heartbeat. ECG is the ultimate biometric because unlike a fingerprint, it is internal and difficult to spoof. ECG Wave Unique to the Individual Figure 1: Illustrates the Uniqueness of the ECGs 3

8 Technical Overview of the Nymi Band This section will answer three main questions such as: (1) What is the Nymi Band?, (2) What does it look like?, and (3) How does it work? What is the Nymi Band? The Nymi Band is a wearable wristband device that enables the wearer with secure and continuous authentication through biometric ECG identification. This wearable device addresses today s issues of security and convenience, and also enables a hyperpersonalized user experience for the emerging applications of tomorrow. The Nymi Band uses HeartID a proprietary technology that leverages the wearer s unique ECG as a biometric identifier. HeartID is the core technology in Nimy, which functions as a set of algorithms that allow you to be identified by your ECG. The founders of Nymi, Karl Martin and Foteini Agrafioti both completed their PhD s in biometric cryptography at the UofT in Toronto. The core technology of the Nymi Band was developed in Foteini s PhD. What Does it Look Like? The Nymi Band looks similar to other wearable wristband devices, like the Fitbit Fitness Tracker, for example. It consists of two main components: (1) the band and (2) the core. The band is composed of a high quality hypoallergenic material with an IPX7 waterresistance rating so you can wear it all day without any discomfort. It comes in two sizes, small and large. The small band measures 5.8 to 7 and the large band measures 6.6 to 7.8 (See Figure 2 on the next page for an illustration of the sizes). 4

9 Figure 2: Illustrates the Two Sizes of the Nimy Band Moreover, the band contains a bottom sensor and a top sensor. The bottoms sensor touches your wrist while the top sensor senses your opposite hand. These two sensors are integral to the Nymi Band s function as they read and capture your ECG. They will be discussed in more detail later in the next section. Second, the core of the Nimy Band contains the HeartID technology, which reads and transforms your ECG for authentication. This will also be discussed in more detail in the next section. Also, the core contains the device s battery. The battery life lasts for five days and takes two hours to charge. This is convenient as it allows the wearer to have the band on for a long period of time without having to take it off to charge (See Figure 2 on the next page for an illustration of the main components). Finally, in order to appeal to a sense of fashion, you can get the band in three different colors: red, white, or black. 5

10 Top Sensor Bottom Sensor Core Band Battery Lights Figure 3: Illustrates the Main Components of the Nymi Band How Does it Work? As previously discussed, the Nymi Band contains an electronics module, called the Nymi Core, which incorporates an ECG sensor with two electrodes located on the top and bottom of the module. One electrode touches the wrist, and one is exposed on the top side of the Nymi Core. ECG data can be captured when the user wears the Nymi Band on one wrist and touches the top electrode with the opposite hand. Moreover, the Nymi Band functions by a two-step process of enrollment and activation. Firstly, the process of enrollment entails capturing and processing a sample of the user s ECG in order to turn it into a biometric template. Secondly, once enrolled, the process of activation entails authenticating the user s identity against the previously created biometric template. 6

11 Key Features and Benefits of the Nymi Band This section will discuss the main key features and their benefits, which make the Nymi band s secure and continuous authentication unique compared to other biometric solutions on the market. The three main key features that this white paper will focus on are: the Nymi Band as a wearable, the Nymi Band s Privacy by Design, and the Nymi Band s Bluetooth Low Energy. Nymi Band as a Wearable Because the Nymi Band is a wearable device, it allows for the benefit of convenience, as you will no longer have to remember and enter passwords or PINs. Moreover, from when you put it on, to when you take it off, the Nymi Band s HeartID will continuously authenticate your identity even in spite of a change in heart rate due to illness, exercise, or other dynamic conditions 6. Nymi Band s Privacy by Design Because the Nymi Band incorporates the philosophy of Privacy by Design, the notion of privacy is embedded in the design of the Nymi Band, it ultimately respects the user s privacy 7. That is to say, the Nymi Band s ECG biometric system allows for the benefit of maximum security, as it is difficult to spoof or even track. Moreover, this is due to its three-factor authentication process, which includes: biometric authentication (ECG), 6 T. Zerucha, 'You can wear your heart on your sleeve and authenticate everything with Nymi', Bankless Times, [Online]. Available: [Accessed: 08- Dec- 2015]. 7 Cavoukian, A. Privacy by Design. In Information and Privacy Commissioner of Ontario. Available:

12 possession of your Nymi Band, and possession of your device that has your Nymi Companion Application (NCA). Without all three factors, the device will not work. Nymi Band s Bluetooth Low Energy Because the Nymi Band connects with other devices with its Bluetooth Low Energy frequency, this allows for the benefit of hyper-personalization. That is to say, once authenticated, the Nymi Band communicates its wearer s identity to nearby devices only with its wearer s approval 8. This ensures that your personal data is not collected and tracked by default 9. Moreover, Nymi s sensors also allow for proximity and gesture recognition, which enables seamless and dynamic interactions with technology. Conclusion This section will conclude with a summary of the white paper, as well as with information on where to get the Nimy Band. Summary The way people provide their identity for convenience is problematic. When it comes to wearable authentication technology, people should never feel like they have to sacrifice security and privacy for the sake of convenience. The Nymi Band s secure and continuous ECG biometric authentication is a solution to this problem as the Nymi Band can replace every current identity authentication tool, and can be seamlessly employed in situations where PINs, passwords, and other biometric solutions are employed. 8 J. Havens, 'An Inconvenient Proof', TechCrunch, [Online]. Available: [Accessed: 08- Dec- 2015]. 9 J. Havens, 'Creating a code of ethics for artificial intelligence', Mashable, [Online]. Available: [Accessed: 08- Dec- 2015]. 8

13 Where to Get the Nimy Band? Although the Nymi Band is still in development, the Nymi Band Discovery Kit is available for purchase at the cost of $149. The Nymi Band Discovery Kit is intended for developers who want to help create a platform for Nymi Enabled Applications (NEAs). Follow the links below for more information on where to buy the Nymi Band, information about its development, more information about Nymi, and how to contact Nymi for questions or comments. To buy the Nymi Band Discvoery Kit: For developers: For more information on Nymi and the Nymi Band: Send Nymi a Comment or Ask a Question: - contact Drop by the Nymi Office or Write a Letter: Office: 82 Peter Street, Toronto, ON, Canada, M5V 2G5 9

14 References [1] Agrafioti. F., Hatzinakos, D. ECG biometric analysis in cardiac irregularity conditions. In Signal, Image, and Video Processing [2] SearchSecurity, 'What is biometrics? - Definition from WhatIs.com', [Online]. Available: [Accessed: 08- Dec- 2015]. [3] The Economist, 'A heart to my key', [Online]. Available: [Accessed: 08- Dec- 2015]. [4] Oberthur Technologies. PYMNTS.com Report. In Identity Tracker. Available: Final-1.pdf [5] Wang, Y., Agrafioti, F., Harzinakos, D., Plataniotis, K. N. Analysis of human electrocardiogram for biometric recognition. In EURASIP Journal on Advances in Signal Processing [6] T. Zerucha, 'You can wear your heart on your sleeve and authenticate everything with Nymi', Bankless Times, [Online]. Available: [Accessed: 08- Dec- 2015]. [7] Cavoukian, A. Privacy by Design. In Information and Privacy Commissioner of Ontario. Available: [8] J. Havens, 'An Inconvenient Proof', TechCrunch, [Online]. Available: [Accessed: 08- Dec- 2015]. [9] J. Havens, 'Creating a code of ethics for artificial intelligence', Mashable, [Online]. Available: [Accessed: 08- Dec- 2015]. 10

This white paper provides the reader with an overview of the Nymi Band and how it works.

This white paper provides the reader with an overview of the Nymi Band and how it works. WHITE PAPER 08.11.2015 This white paper provides the reader with an overview of the Nymi Band and how it works. We have included information about its development, functioning, underlying technology, security

More information

Contents. Contents 2 Preface 3 Introduction 4. Underlying Technology 7. Security 12. Privacy 18. Conclusions 22 References 23 Glossary 25

Contents. Contents 2 Preface 3 Introduction 4. Underlying Technology 7. Security 12. Privacy 18. Conclusions 22 References 23 Glossary 25 11-19-2013 This white paper provides the reader with an overview of the Nymi and how it works. We have included information about its development, functioning, underlying technology, security and privacy.

More information

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information

Using Biometric Authentication to Elevate Enterprise Security

Using Biometric Authentication to Elevate Enterprise Security Using Biometric Authentication to Elevate Enterprise Security Biometric authentication in the enterprise? It s just a matter of time Mobile biometric authentication is officially here to stay. Most of

More information

Current Biometric Adoption and Trends

Current Biometric Adoption and Trends Current Biometric Adoption and Trends A UT CID Report by Rachel L. German and K. Suzanne Barber May 2018 The Center for Identity greatly appreciates and acknowledges the following organization for their

More information

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication Stuart Hall ICTN 4040 601 04/10/17 Advantages and Drawbacks to Using Biometric Authentication As technology advances, so must the means of heightened information security. Corporate businesses, hospitals

More information

Identity & security CLOUDCARD+ When security meets convenience

Identity & security CLOUDCARD+ When security meets convenience Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Applying biometric authentication to physical access control systems

Applying biometric authentication to physical access control systems Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market

More information

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017 Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

Internet is Global. 120m. 300m 1.3bn Users. 160m. 300m. 289m

Internet is Global. 120m. 300m 1.3bn Users. 160m. 300m. 289m UAF Protocol Internet is Global 120m 300m 1.3bn Users 160m 289m 300m #Users 2014 Google: 2013 Twitter: 2015 Devices without physical keyboard How Secure is Authentication? Cloud Authentication Password

More information

EMERGING TRENDS AROUND AUTHENTICATION

EMERGING TRENDS AROUND AUTHENTICATION EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,

More information

Enabling Compliance for Physical and Cyber Security in Mobile Devices

Enabling Compliance for Physical and Cyber Security in Mobile Devices Enabling Compliance for Physical and Cyber Security in Mobile Devices Brandon Arcement & Chip Epps HID Global Sept 12, 2016 1630-1730 ET Agenda Smart Devices vs. Traditional Cards Mobility Infrastructure

More information

The Role of PNT in Cybersecurity Location-based Authentication

The Role of PNT in Cybersecurity Location-based Authentication The Role of PNT in Cybersecurity Location-based Authentication Dr. Michael O Connor November 14, 2013 Satelles is a Division of ikare Corporation What do we mean by Authentication? Authentication is the

More information

2013 NATIONAL ONLINE SAFETY STUDY

2013 NATIONAL ONLINE SAFETY STUDY 2013 NATIONAL ONLINE SAFETY STUDY Methodology and Sample Characteristics The National Cyber Security Alliance has conducted a new study with PayPal to analyze the cyber security behaviors and perceptions

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

The Future of Authentication

The Future of Authentication The Future of Authentication Table of Contents Introduction Facial Recognition Liveness Detection and Multimodal Biometrics FIDO: Standards-Based, Password-Free Authentication Biometric Authentication

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

An Overview of Biometric Image Processing

An Overview of Biometric Image Processing An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional

More information

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY Page 1 [1] Karthik. T, [2] Ganeshselvan. N, [3] Janagaraj. V, [4] Nandha Kumar. N Angel College of Engineering and Technology, [1] teekarthik@gmail.com,

More information

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA 1 SECURING DIGITAL IDENTITY THE KEY TO ASIA S VAST POTENTIAL IN E-COMMERCE We are living through an exciting time for digital commerce in Asia.

More information

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection IBM Security s Brooke Satti Charles on the Power of These New Capabilities SPONSORED BY As fraudsters continually refine their techniques

More information

Table of Contents. Index CONNECTED WEARABLES

Table of Contents. Index CONNECTED WEARABLES CONNECTED WEARABLES INDEX Index Table of Contents Table of Contents... i List of Figures... vi Executive summary... 1 1 Introduction to wearable technology... 3 1.1 Introduction... 3 1.1.1 Background...

More information

Biometrics Our Past, Present, and Future Identity

Biometrics Our Past, Present, and Future Identity Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti

More information

Protecting Personal Health Information on Mobile and Portable Devices. Guidance from the Information and Privacy Commissioner of Ontario

Protecting Personal Health Information on Mobile and Portable Devices. Guidance from the Information and Privacy Commissioner of Ontario Protecting Personal Health Information on Mobile and Portable Devices Guidance from the Information and Privacy Commissioner of Ontario Why is the Protection of Personal Health Information (PHI) So Critical?

More information

FIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR. All Rights Reserved FIDO Alliance Copyright 2017

FIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR. All Rights Reserved FIDO Alliance Copyright 2017 FIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR 1 250+ MEMBER & PARTNER ORGANIZATIONS GLOBALLY FIDO board members include leading global brands and technology providers + SPONSOR MEMBERS

More information

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013 Securing Wireless Mobile Devices Lamaris Davis East Carolina University 11/15/2013 Attract As more employees prefer to use mobile devices in the workplace, organizations are starting to adopt the Bring

More information

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Meeting FFIEC Meeting Regulations for Online and Mobile Banking Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and

More information

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity

More information

Overview of PBI-blockchain cooperation technology

Overview of PBI-blockchain cooperation technology FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview

More information

ReACT New User Setup, Password Reset and Account Unlock Instructions

ReACT New User Setup, Password Reset and Account Unlock Instructions ReAct is a tool that will replace the current password reset system. In order to use ReAct you have to enroll and setup your challenge questions. Once enrolled you will have easy access to reset your password

More information

Charter Pacific Biometrics Acquisition

Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific has executed a Share Purchase Agreement to acquire 100% of Microlatch. Charter Pacific/Microlatch has a patent

More information

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their

More information

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24 Bluetooth mobile solutions APPLICATION NOTE / FAQ Page 1 on 24 Table of Contents I. Introduction... 5 II. Bluetooth Smart technology General principles... 5 III. Frequently Asked Questions... 5 A. STid

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO

ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing Pierre Garnier, COO 1 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium

More information

Mobile Security / Mobile Payments

Mobile Security / Mobile Payments Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY

More information

What consumers are looking for, when they buy a smart apparel

What consumers are looking for, when they buy a smart apparel What consumers are looking for, when they buy a smart apparel August 2018 1 1 Introduction Dr. Michael Burrows, Global Venture Leader at DuPoint points out the obvious Clothes will always outsell phones.

More information

Bridging Identity Islands with Continuous, Contextual Identity Assurance

Bridging Identity Islands with Continuous, Contextual Identity Assurance Bridging Identity Islands with Continuous, Contextual Identity Assurance Kayvan Alikhani RSA, Lead Strategist, Identity and Authentication What we ll cover Islands of Identity Continuous authentication

More information

The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c

The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c 5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1,

More information

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA)

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA) Biometrics 101 Presented by The International Biometrics & Identification Association (IBIA) Mr. Benji Hutchinson MorphoTrust USA Senior Director, Federal Business 703-508-3864 jbhutchinson@morphotrust.com

More information

Authentication Technologies

Authentication Technologies Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something

More information

Challenges and. Opportunities. MSPs are Facing in Security

Challenges and. Opportunities. MSPs are Facing in Security Challenges and Opportunities MSPs are Facing in 2017 Security MSPs work in an environment that is constantly changing for both the needs of customers and the technology in which they provide. Fanning the

More information

CSC 474 Network Security. Authentication. Identification

CSC 474 Network Security. Authentication. Identification Computer Science CSC 474 Network Security Topic 6. Authentication CSC 474 Dr. Peng Ning 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

Solution. Imagine... a New World of Authentication.

Solution. Imagine... a New World of Authentication. A Solution Imagine... a New World of Authentication. Imagine a World Where Passwords can t be hacked People can t share credentials Users can t pretend to be someone else Where authentication is more Secure

More information

FIDO AS REGTECH ADDRESSING GOVERNMENT REQUIREMENTS. Jeremy Grant. Managing Director, Technology Business Strategy Venable LLP

FIDO AS REGTECH ADDRESSING GOVERNMENT REQUIREMENTS. Jeremy Grant. Managing Director, Technology Business Strategy Venable LLP FIDO AS REGTECH ADDRESSING GOVERNMENT REQUIREMENTS Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com :: @jgrantindc 1 WHAT IS REGTECH? RegTech: Technology

More information

Smart Card and Biometrics Used for Secured Personal Identification System Development

Smart Card and Biometrics Used for Secured Personal Identification System Development Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica

More information

SEAhawk and Self Encrypting Drives (SED) Whitepaper

SEAhawk and Self Encrypting Drives (SED) Whitepaper Suite 301, 100 Front Street East, Toronto, Ontario, M5A 1E1 SEAhawk and Self Encrypting Drives (SED) Whitepaper This paper discusses the technology behind Self-Encrypting Drives (SEDs) and how Cryptomill

More information

Enabling Compliance for Physical and Cyber Security in Mobile Devices. Chip Epps & Daniel Bailin HID Global

Enabling Compliance for Physical and Cyber Security in Mobile Devices. Chip Epps & Daniel Bailin HID Global Enabling Compliance for Physical and Cyber Security in Mobile Devices Chip Epps & Daniel Bailin HID Global 1 Agenda Managing Identities Traditional cards for PACS and IT Smart Devices Convergence & Compliance

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

Authentication. Identification. AIT 682: Network and Systems Security

Authentication. Identification. AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION Introduction Why static passwords are insufficient Introducing two-factor Authentication Form Factors for OTP delivery Contact information OTP generating

More information

Thread in Commercial Backgrounder

Thread in Commercial Backgrounder Thread in Commercial Backgrounder September 2018 An introduction to Thread, its Network Topology and Application Support 1 What is Thread Thread is an open standard for wireless communication providing

More information

NFC Identity and Access Control

NFC Identity and Access Control NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

Identity & Access Management

Identity & Access Management Identity & Access Management THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY WITHOUT COMPROMISING SECURITY? S E C U R I T Y OR P R O D U C T I V I T Y On-premises THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY

More information

Biometrics problem or solution?

Biometrics problem or solution? Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these

More information

white paper SMS Authentication: 10 Things to Know Before You Buy

white paper SMS Authentication: 10 Things to Know Before You Buy white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling

More information

Biometrics. Overview of Authentication

Biometrics. Overview of Authentication May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication

More information

1. Appearance. Power button. Multi-function button. Microphone. Charging port. Heart rate sensor Speaker 1

1. Appearance. Power button. Multi-function button. Microphone. Charging port. Heart rate sensor Speaker 1 Quick Start Guide 1. Appearance Power button Press and hold the power button until your watch switches on. Touch the power icon on the watch face, and choose Settings > System > Power off. Multi-function

More information

FAQ S About Unicâmbio Prepaid Card

FAQ S About Unicâmbio Prepaid Card FAQ S About Unicâmbio Prepaid Card What are the advantages of the Unicâmbio Prepaid Card when compared with a credit or debit card? Security. It is common knowledge that the risks of credit and debit cards

More information

MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK

MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK E -BOOK MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK MOBILITY 1 04 INTRODUCTION 06 THREE TECHNOLOGIES THAT SECURELY UNLEASH MOBILE AND BYOD TABLE OF CONTENTS

More information

Palm Vein Technology

Palm Vein Technology Technical Paper Presentation On Palm Vein Technology (Security Issue) Hyderabad Institute of Technology And Management ABSTRACT Identity verification has become increasingly important in many areas of

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

Paystar Remittance Suite Tokenless Two-Factor Authentication

Paystar Remittance Suite Tokenless Two-Factor Authentication Paystar Remittance Suite Tokenless Two-Factor Authentication Introduction Authentication is the process by which a computer system positively identifies a user It is commonly considered to be one of the

More information

How to prepare for a seamless Windows 10 migration. Windows 7 end of support is due on January 14, are you ready?

How to prepare for a seamless Windows 10 migration. Windows 7 end of support is due on January 14, are you ready? How to prepare for a seamless Windows 10 migration Windows 7 end of support is due on January 14, 2020 - are you ready? Windows 10 has gained in popularity and in December 2018 three years after its initial

More information

Biometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way

Biometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way Biometrics in Banking How to Integrate Touch ID into your Mobile Banking Application the Right Way Table of Contents Introduction 1 Adoption of Touch ID as a banking authentication tool 2 Touch ID: Benefits

More information

2014 ISACA IT Risk/Reward Barometer US Consumer Results. October 2014

2014 ISACA IT Risk/Reward Barometer US Consumer Results. October 2014 2014 ISACA IT Risk/Reward Barometer US Consumer Results October 2014 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Aaron Berger, Ketchum,

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively

More information

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came Victoria Ellsworth Dr. Ping Li ICTN 4040 04/11/17 Internet of Things (IoT) Attacks The Internet of Things (IoT) is based off a larger concept; the Internet of Things came from idea of the Internet of Everything.

More information

Table of Contents. Biometrics for the Connected Car. Automotive Biometrics Market Analysis & Forecasts

Table of Contents. Biometrics for the Connected Car. Automotive Biometrics Market Analysis & Forecasts Table of Contents Biometrics for the Connected Car Automotive Biometrics Market Analysis & Forecasts 2018-2023 www.goodeintelligence.com Forward Goode Intelligence Author Report Scope Goode Intelligence

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

Table of Contents. Index CONNECTED WEARABLES

Table of Contents. Index CONNECTED WEARABLES Index Table of Contents Table of Contents... i List of Figures... vii Executive summary... 1 1 Introduction to wearable technology... 3 1.1 Introduction... 3 1.1.1 Background... 3 1.1.2 Definitions...

More information

Password-less protection. Reduce your risk exposure with password alternatives

Password-less protection. Reduce your risk exposure with password alternatives Password-less protection Reduce your risk exposure with password alternatives Contents 03 / Introduction Passwords are no longer enough 05 / Why eliminate passwords? Moving away from passwords 08 / Introduction

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

Empower your phone to open new doors

Empower your phone to open new doors Empower your phone to open new doors Introducing BlueDiamond Mobile Unmatched experience in mobile applications BlueDiamond Mobile leverages United Technologies Corporation s 17 years of experience developing

More information

Security Solutions for Mobile Users in the Workplace

Security Solutions for Mobile Users in the Workplace Security Solutions for Mobile Users in the Workplace 1 1 Multitasking means multiple devices for busy end users Introduction Cloud computing helps organizations operate with less infrastructure, reducing

More information

How. Biometrics. Expand the Reach of Mobile Banking ENTER

How. Biometrics. Expand the Reach of Mobile Banking ENTER How Biometrics Expand the Reach of Mobile Banking ENTER Table of Contents 01 The Mobile Banking Opportunity 02 What s Suppressing Mobile Adoption? 03 Onboarding Challenges: Proving One s Identity 04 Authentication

More information

A Remote Biometric Authentication Protocol for Online Banking

A Remote Biometric Authentication Protocol for Online Banking International Journal of Electrical Energy, Vol. 1, No. 4, December 2013 A Remote Biometric Authentication Protocol for Online Banking Anongporn Salaiwarakul Department of Computer Science and Information

More information

Integrating Password Management with Enterprise Single Sign-On

Integrating Password Management with Enterprise Single Sign-On Integrating Password Management with Enterprise Single Sign-On 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Background: one problem, two solutions 2 2.1 The Problem.............................................

More information

Who What Why

Who What Why Who What Why Board Members Sponsors Associates To Change Authentication Online by: (a) Developing unencumbered Specifications that define interoperable mechanisms that supplant reliance on passwords (b)

More information

ENTERPRISE MOBILITY TRENDS

ENTERPRISE MOBILITY TRENDS ENTERPRISE MOBILITY TRENDS Raghuram Nair, Nandakishore Bellore Enterprise Mobility has emerged as a top technology trend globally. Every enterprise with a mobile workforce has an imperative to deploy a

More information

Safelayer's Adaptive Authentication: Increased security through context information

Safelayer's Adaptive Authentication: Increased security through context information 1 Safelayer's Adaptive Authentication: Increased security through context information The password continues to be the most widely used credential, although awareness is growing that it provides insufficient

More information

Wireless Wearable Electrocardiogram (WWECG) Ulbert Joey Botero EE Alexander Consunji CpE Ryan Shifman EE Karson Kimbrel CS Group 18

Wireless Wearable Electrocardiogram (WWECG) Ulbert Joey Botero EE Alexander Consunji CpE Ryan Shifman EE Karson Kimbrel CS Group 18 Wireless Wearable Electrocardiogram (WWECG) Ulbert Joey Botero EE Alexander Consunji CpE Ryan Shifman EE Karson Kimbrel CS Group 18 Project Overview The Wireless Wearable Electrocardiogram is a portable

More information

Using biometrics for password reset.

Using biometrics for password reset. Using biometrics for password reset. How to secure and simplify your password reset process. Legal Information No part of this document may be copied or reproduced in any form or by any means without the

More information

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

E-guide CISSP Prep: 4 Steps to Achieve Your Certification CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access

More information

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication White Paper The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication Table of contents Introduction... 2 Password protection alone is no longer enough...

More information

The Medeco Solution for Controlled Access and Accountability

The Medeco Solution for Controlled Access and Accountability Medeco XT The Medeco Solution for Controlled Access and Accountability Medeco XT is a powerful Intelligent Key System that uses innovative technology to deliver a flexible, cost-effective solution for

More information

The Evolving Role of Primary Care and Technology in Cardiology

The Evolving Role of Primary Care and Technology in Cardiology The Evolving Role of Primary Care and Technology in Cardiology Peter Tilkemeier, MD, MMM, FACC Chair, Department of Medicine Greenville Health System Professor, University of South Carolina School of Medicine

More information

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT DigitalPersona Premium Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond traditional two-factor

More information

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! 1 Today s Speakers! Alex Doll! CEO OneID Jim Fenton! Chief Security Officer OneID 2 Contents!

More information

Tiger Scheme QST/CTM Standard

Tiger Scheme QST/CTM Standard Tiger Scheme QST/CTM Standard Title Tiger Scheme Qualified Security Tester Team Member Standard Version 1.2 Status Public Release Date 21 st June 2011 Author Professor Andrew Blyth (Tiger Technical Panel)

More information

Bluetooth Lock Boxes User Guide

Bluetooth Lock Boxes User Guide Bluetooth Lock Boxes User Guide BATTERY Q: What type of battery is used in a Master Lock Bluetooth Lock Box? A: Master Lock Bluetooth Lock Boxes come installed with a C123A lithium battery. For optimal

More information

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017 Thomas Lippert Principal Product Manager Sophos Mobile Spring 2017 Market Overview Trends Security or data breaches involving mobile devices are on the rise More people use mobile devices for work than

More information

L-1 Fingerprint Reader Solutions. V-Flex 4G

L-1 Fingerprint Reader Solutions. V-Flex 4G L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in

More information

Mobility has changed the way we live and work

Mobility has changed the way we live and work Take a Closer Look at Windows 8.1 PC Retreat 2014 Windows 8 is the best business platform we ve ever shipped. Buying Windows 7, when you could get Windows 8 is just leaving value on the table. Windows

More information

Smart Mobile Identity. Revolutionizing biometric identity verification

Smart Mobile Identity. Revolutionizing biometric identity verification Smart Mobile Identity Revolutionizing biometric identity verification Introduction Mobile devices are poised to transform the biometric industry and greatly broaden the use of biometrics for identity verification.

More information