Finger vein authentication using smartphone camera

Hitachi today announced the development of highly-accurate finger vein authentication technology using the camera commonly integrated in the standard smartphone. This technology will enable the use of biometric authentication ...

Encryption method takes authentication to a new level

VTT Technical Research Centre of Finland has developed new kinds of encryption methods for improving the privacy protection of consumers to enable safer, more reliable and easier-to-use user authentication than current systems ...

Generating unclonable patterns to fight counterfeiting

In a multinational collaboration, researchers from the Universities of Luxembourg, Ljubljana and Vienna have developed a new method to produce unique reflecting patterns that can be applied on valuable objects. As these patterns ...

Nanoparticle ink could combat counterfeiting

(Phys.org)—Researchers have demonstrated that transparent ink containing gold, silver, and magnetic nanoparticles can be easily screen-printed onto various types of paper, with the nanoparticles being so small that they ...

Researchers find vulnerability in two-factor authentication

Two-factor authentication is a computer security measure used by major online service providers to protect the identify of users in the event of a password loss. The process is familiar: When a password is forgotten, the ...

Protecting data assets with two-factor authentication

To better protect the Institute's data – including employee data – from future cyber risks, the Office of Information Technology (OIT) will begin deploying two-factor authentication to early adopters across campus in ...

What makes a 'smart gun' smart?

Every time a toddler accidentally shoots a friend or family member, a teen kills himself via gunshot or a shooter perpetrates an act of mass violence, public discussion circles back to "smart gun" technology. The concept ...

Comfort is important in identification

VTT Technical Research Centre of Finland has conducted a study about user attitudes to different personal identification methods. The most popular identification methods were internet banking access codes and passwords. The ...

page 4 from 13