Identification vs Verification: What’s the Difference?
By Ian E. Muller | July 12, 2018
Often, when people think about biometrics-based access management and security, they think of two different words: Identification and verification. However, when it comes to actually implementing and using access control systems and setting up a security infrastructure that deploys biometrics, they often confuse these terms and how they apply to their security needs. It can […]Read More
Biometric Mythbusters: Hiding Your Identity by Altering Fingerprints
By Ian E. Muller | July 6, 2018
In the world of biometrics, the most ubiquitous and popular biometric used in both real life and entertainment is the fingerprint. Mankind has been aware of the identifying nature of prints since 200 BCE, when handprints were used as evidence during burglary investigations in the Qin Dynasty, China. However, it wasn’t until the 1800s that […]Read More
Biometric Mythbusters: Do Stolen Fingerprints Mean Identity Theft?
By Ian E. Muller | February 6, 2018
This article focuses on the theft of a complete fingerprint image. Stay tuned for a follow-up article on why you also don’t need to worry to much if your biometric template is stolen from an authentication system. With the rise of biometrics in use across our business and personal lives, it can be easy to […]Read More
Biometrics in Film: True or False
By Ian E. Muller | February 21, 2017
Since the 1950s biometrics have been featured in films of all types. Earlier in the history of the silver screen, these were often mysteries, with fingerprints used in criminal investigations. By later on, as the technology itself evolved, movies began portraying biometrics in more capacities, sometimes futuristically, sometimes realistically. The impressive ways that biometrics are […]Read More
Identity Theft & Biometrics
By Ian E. Muller | April 5, 2016
One of the major hurdles for businesses when it comes to investing in and deploying biometrics solutions is misinformation. There are a wide variety of myths surrounding biometric authentication systems that have to be properly “busted” in order to clear up this innovated security infrastructure and ensure that a strong foundation of understanding exists. By […]Read More