Skip to main content

Biometrics authentication

https://www3.nhk.or.jp/nhkworld/en/news/20181004_41/

Fujitsu says the new technology identifies people by their unique biological information such as veins in their palms and facial data.
  1. Palm authentication technology is already used in automatic teller machines at banks but needs to be supplemented by data provided by a cash card and a pin number.
An enormous amount of data is needed to identify people accurately with only the information on the veins in their palms. Therefore, the technology is a limited now.
Fujitsu says it has developed a system to boost data processing capability. By combining information on the veins in palms and facial recognition, it will take only a second to identify a million people without using pin numbers.
The company says it plans to make it practical within fiscal 2020.
An engineer at the Fujitsu Laboratories, Hiroshi Tsuda, says that the technology will be especially helpful in case of a disaster as people can make payments even if they lose their smartphones or cash cards.

 

Copyright NHK (Japan Broadcasting Corporation) All rights reserved.

Popular posts from this blog

How To Evade Job-Scam Victimization

A Job seekers Guide to Basic Digital Forensic Investigation using actual Email Phoney Job Invitation Dear Terry, We decided to include you in the list of potential candidates after we reviewed your resume on Jobsite. We decided to offer you the position of TS Associate in our company. This is Part-time home based role and most of the work can be done in a comfort of your own home. We invite you to apply online on our website: http://marfigroup.com/careers/tsa/ Please include your telephone numbers along with your application and our HR staff will be back with you for telephone interview. We hope that our offer will make a positive influence on your potential career change and you will become one of our valued employees. Thank you, Charles Panter HR Department First Glance At first glance nothing alarming stands out and 'Jobsite' does have a copy of my CV.   The mandatory unsubscribe link is there and is managed by 'Constant Contact' which, so far, all seems

SOCIAL MEDIA IN RURAL AREA: A COMMUNITY POLICE CASE STUDY

"MyPolice" proprietary social media software product, which was studied in this investigation, has not yet been deployed commercially and appears to be dormant. My conclusion that community-run rather than enterprise-run is the better method to manage this sort of social media tool might be correct, given than MyPolice seems to be dormant. Social_Media_in_Rural_Area.pdf   Abstract: Computer-Mediated Communication (CMC) has evolved from email and simple bulletin boards to live text feeds and elaborate Social Networking Sites (SNS) some of which have gained cult-like status. The pervasiveness of Social Media (SM) within the CMC landscape has inspired social-entrepreneurs and software developers to create civic-centric communication platforms for civic engagement rather than vanity-centric for personal satisfaction.  As the Internet becomes the default communication method by the will of Government the need to be connected to the world by the Ethernet increases. Bu

Infosec Blunder by Infosec Specialist (supposedly)

Seven days ago I received 'Infosec Consultant'  job prospect news from **** Recruitment by email, but did not reply;  an Infosec Consultancy wants to contract security consultants. Today I received unsolicited news update direct from ****'s client , which included the email contact details of hundreds of job seekers listed in ****'s data base including the name of ****' staff... oops!  Update: One week on, the same from a Financial Services firm!  Now the question is - who is the more stupid? 1)   Dear Terry, Please accept my apologies on behalf of **** Recruitment for this unfortunate incident. ****  has strict procedures and controls in place for sending out e-shots and electronic mailers to candidates to ensure that incidents of this nature do not occur. The recruitment consultants all receive training on their obligations under the Data Protection Act and are required to use an email maker system that ensures all recipient email addresses are blind