Uncategorized

Plans to Create and Test Health Credential Biometric Systems are Being Explored Globally.

The effects of the pandemic has brought forward an idea that perhaps would have previously been more easily dismissed and regarded as an invasion of privacy to determine the health status of travellers crossing borders. The risk that COVID-19 poses to the global economy has meant that more drastic systems and processes are being proposed and put in place. Plans to create and test health credential biometric systems are being explored in different sectors, not just in the UK but globally. The proposals are initially targeting the travel industry and to allow people to travel again with a greater level of assurance for both passenger and governments that the virus will not be transmitted across borders. Currently, while vaccine programs are being rolled out at differing rates globally and with the target for the world to be COVID 19 immune by 2023, the interim will see a ‘hybrid’ of vaccinations status and negative COVID-19 tests. There are several groups and initiatives globally that have been set up by both governments and organisations to create systems that will verify individuals vaccination status to protect against the future spread of the disease. One such group is The Vaccination Credential Initiative which aims to create the standards to verify a persons vaccination status. While primarily the concern is for travelers to demonstrate their status, it’s expected that businesses in other industries will also require proof from their customers, such as event organisers and even employers from their employees. What are the options? While there are different approaches being discussed all aim to ensure the health status of the person by use of apps, QR codes or novel technology each approach requires the use of biometrics so to overcome the biggest challenge of fraud. To prevent individuals from misrepresenting their vaccination status is crucial for countries to take back control over the spread of COVID-19. Apps such as VeriFLY with facial recognition and digital identity technology, allows passengers to create a secure profile on the app and so meet the testing and documentation requirements. This app is already in use by airlines in the USA. While in the UK there have not previously been such apps in use, COVID-19 immunity and vaccination passports have started trials this month. The digital passport allows for an individuals test results or vaccination status to be registered and proved on an app without disclosing their identity. The app uses facial recognition to secure the data which will allow them to verify their status more securely. The system has been designed to plug into the existing NHS infrastructure and so does not increase the burden on frontline services. The trial is due to be completed by 31st March 2021. An alternative approach is to use QR codes and smartphone to encode the test results or vaccine status. At the site of testing biometric data such as fingerprint or facial recognition would be enrolled to secure the credentials and also used to unlock the QR code so to prevent it from being shared with others. Global e-dentity has a more novel approach by developing a system that can detect asymptomatic COVID-19 infection using a scanner. The device will scan the individual’s palm and can detect biometric characteristics such as altered blood vessel morphology and reduced haemoglobin levels, both of which have been shown to be indicative of COVID-19 infection. This technology has shown huge promise and indicated near 100% accuracy in detecting asymptomatic and presymptomatic COVID-19 infections. What are the concerns? As with any data collection or storage plans, there is a concern for data privacy. To ensure that the arrival of the digital health passport is favourable for all involved privacy is paramount. The risk of this data being either leaked or used unfavourably against an individual is a valid concern. Individuals deserve the assurances that their health data is secure and will not be used in a way that is of detriment to them. Not only the issue of privacy but any potential ethical implications also need to be explored fully and in-depth to ensure that the transformation of digital health data begins on secure foundations.

Plans to Create and Test Health Credential Biometric Systems are Being Explored Globally. Read More »

biometric enrolment, biobox, enrolment, biometric ID

White Paper: Addressing the Challenges Organisations Face with Accurately Linking a Person with Their Identity

 Identity Challenges  Organisations and Governments were faced with the challenge of accurately linking a person with their identity. In the past, a person\’s identity could be proven simply using documents that included a photo, which would have been enough. Over the last several decades, the evolution of technology brought about a more secure identification process that saw the creation of a digital identity. Although a step in the right direction, many still found themselves faced with the challenge of an inaccurate link, alongside, the new challenge of fraud and fraudulent documents.    Addition of Biometric identification Biometric literally means \”measurement of life,\” biometrics refers to all processes used to recognise, authenticate and identify personnel based on individual physical or behavioural characteristics. In an attempt to deal with the challenges at hand, modern technologies can now successfully input a person\’s biometric data and create a sold link to their identity in addition to other digital information.  With the addition of biometrics, the level of security created provides a much higher standard for identification processes, which can be used as multi-levels of verification to accurately prove a person\’s true identity.   Meet the BioBox The BioBox was designed to establish a physical link between biometric identity, digital information and the person themselves. With the capacity to store and generate data in a secure system,  our diverse software allows for flexibility without jeopardising security standards. Easy, secure and fast processing, BioBox ID enables authorities to capture and store the data anywhere in under 4 minutes. With face, iris and FBI certified fingerprint capabilities; this product permits multi verification, encoding and generating EFT files making ID fraud extremely difficult. The choice of included products is entirely up to the client. We are able to add or remove elements based around the necessities of the project. Stored in a waterproof, shockproof, compact case, it allows the user ease of transportation between locations.   Not only is the BioBox adjustable to a specific requirement, but the software we have developed is also customisable. The flexibility ensures BioBox is adaptable to various usage scenarios from commercial offices to governmental bodies; the software\’s capabilities are continually being upgraded to meet any potential challenges.             Security of the Biometrics and Data Collected The fact that a person\’s entire biometric footprint cannot be replicated is the ultimate reason we chose to bring different elements together when we created the BioBox. Including several biometric components of a person ensures the safety and security of data collected.    Stored according to  international standards to generate an EFT (Electric Fingerprint Transmission) file format, which is created  with the highest level of security access. The database can be  stored locally on BioBox or a network server, allowing for  remote collection of the data, which can then be imported to the central database via a secure line if necessary. Our software and products are equipped to face fraud attempts.     Where can it be used?  BioBox solution can be used in various scenarios around the world; its ease of use and flexibility is ideal for a  diverse range of organisations within the public and private sectors.   ⮚ Citizen enrolment in large territories with distributed populations,  ⮚ Enhanced security checks (field clearance, roadblocks etc.), ⮚ Law enforcement,  ⮚ Homeland security and military personnel,  ⮚ NGOs,  ⮚ Education departments,  ⮚ Border controls and even  ⮚ Enterprise sector.   Case study Secure Controlled Area – Middle East For this specific project, a highly secure smart card solution was provided to restrict the access within a  controlled area inside a city; the solution we implemented was based on secure contact & contactless smart cards. With several gates present to allow access to this area, the requirement was to present the smart card ID at the gate and so allowing complete control of the restricted area. The challenge faced was producing highly secure smart cards and making sure the cards could be verified easily, relying on the physical characteristic of the cards and the digital and biometric identity verification if necessary.    Requiring the use of biometric information, we decided to implement our BioBox and then take the collected data and encode it on a smart card. The BioBox ID was used in the enrolment of the biometric data and integrated with an already existing central database. We customised the BioBox ID software to meet the requirement for this client by connected our system to their database and executing the conception of EFT files; the biometric data was collected and added to the database. We also encoded elements of the biometric data on the smart card for verification. On each gate, mobile verification devices were deployed to allow for biometric verification and so to provide more secure access controls. The solution was deployed in a short amount of time and as a result, improved the level of secure access by encoding the biometric data to the cards.  About Us  Arana Security specialises in Biometric solution, Smart Card technology, Access Control and Surveillance and monitoring systems. Priding ourselves on ensuring full end-to-end security solutions, from design and programming to printing and authentication, we work in close collaboration with clients to deliver a solution that ensures harmony between quality, reliability and cost. With extensive experience delivering such solutions internationally to public and private sector organisations, we can deliver tailor-made solutions to suit your organisation using the latest in smart technology.

White Paper: Addressing the Challenges Organisations Face with Accurately Linking a Person with Their Identity Read More »

Advancements in Biometric Technology in the Events Sector

The events and entertainment industry is one that will benefit from biometric technologies, such as fingerprint scanners, face recognition and palm scanners, in several different ways. The rapidly advancing biometric technologies are set to reshape the way in which events and planned, marketed and executed. From allowing events organisers to reduce queuing time, increase security, prevent fraud and help the environment. The appearance of COVID-19 has had a devastating effect on this industry but it has also accelerated the introduction of biometric technology for many larger events venues. Many events venues are looking to put contingency plans in place in order to protect them from the current and future pandemics. This includes using contactless access control, ticketing and payment. Ticketing Transforming the ticketing system is one of the easiest solutions for event organisers as the technology is already readily available. Using biometric authentication, such as fingerprint scanners, palm readers and face recognition, to gain admission to venues/ events means that physical tickets won’t need to be produced. This has several benefits such as; Attendees can’t lose their tickets or damage them Fake tickets can’t be made and sold Better for the environment as physical tickets will not be needed The biometric scanners can be teamed with evolving gate technology such as Digicon D-Flow gates. Check-ins By using biometric registration the check-in time to venues will be massively reduced and thus reducing the queuing times too. It will reduce the burden on staff that are required to check-in the attendees making the process smoother and more accurate. Crowd control and access restriction Using access control solutions in a venue can mean that certain event spaces are restricted for staff only or VIP areas. Such technologies will also give an audit trail, showing who enters the restricted areas. Crowd analytics Face recognition/detection will aim to provide emotional and physical profiles to give attendees a better experience. The technology is still being developed but the concepts are already being tested. If organisers can understand how much and what attendees enjoyed about the events, without having to carry out surveys, they can optimise the experience. Crowd analytics will also help to map the foot traffic which will show the event guest journey. This can be used to make any modifications to the venue or help enhance future experiences at with the event or the venue. Security Enhanced security is a major advantage of using biometrics technologies. Access control into and around the venue will give the organisers an advantage. It will help eliminate the use of a fake ID to gain entry. It can also combat the problem of theft if face recognition was used to allow payment for food, beverages and merchandise inside the venue/event, by automatically charging a pre-registered card. Marketing By better understanding, the attendee experience through the data collected event organisers can then target their marketing better to the audience that would benefit or enjoy them. More tailored messaging can provide better attendance and higher levels of enjoyment at the events. All of the above is only possible if the organisers have prior consent from the attendees to both collect and hold their data for processing. At the point of registration when data biometric data should be collected then consent must also be received to ensure GDPR compliance. With data protection regulations being part of the system there are already systems in place to ensure that event organisers can remain compliant and protect attendees rights. As you can see, biometric technologies will bring mutual benefit for event organisers and attendees by enhancing experiences while improving efficiency and security. While its adoption is still growing it’s a trend that is likely to be accelerated by the current push for more advanced biometric technologies.

Advancements in Biometric Technology in the Events Sector Read More »

What is Wearable Technology and what are the concerns?

Wearable technology being any device that is connected to the body in some form to measure or enhance the bodies capability. The 13th century brought the first known wearable device; corrective lenses. And over the next 700 years followed a number of inventions that people use by wearing and some formed the primitive ideas for more modern technology. The modern definition of wearable technology is that it contains a microprocessor and internet connection. Modern Wearable Technology The 21st century has been when modern personal technology has boomed. The advances in computer technology paved the way for many devices that we now consider part of our daily lives. In 2002 the new Bluetooth technology opened the door to many further creative solutions and improvements to wearable technology. Over the two decades that have followed saw the connection of an increasing number of wearable technology devices to smartphones, they include; Hearables (e.g. wireless headsets) Smartwatches Fitness &activity trackers Smart clothing Head-mounted devices (VR/AR) Skin patches While many of the devices are constantly improved and redesigned for aesthetics and performance, one function that is being developed further is the use of biometrics in wearable technology. It\’s now common to have within smartphones sensors that enable fingerprint scanning to be used as a security measure for the phone itself but also for some of our daily functions that take place on the phone such us banking authentication and payment approval. Another type of biometric measure is the information that can be collected about a person relating to their health; heart rate, blood pressure, oxygen saturation levels, sleep data. This information can be used in remote healthcare solutions, where a patient\’s overall health is monitored in their normal environment with them having to come into a clinic/hospital for check-ups. The advantages of such technology will have benefits for both patients and healthcare providers. It won\’t be just the smartwatches and fitness trackers that will become more popular, \’smart\’ clothing will have even better scope to collect biometric data as it\’s worn closer to the skin and covers a wider area. While its already in the market, its expected the advancement in technology and potentially lower costs will over time make it more popular. The global wearable technology market size is estimated to be at over $32 billion in 2020, and it\’s expected to more than double by 2027. Much of the growth is expected to be driven by IoT and connected devices coupled with an increasingly tech-savvy population, while the advantages are clear to see there are also concerns relating to data privacy. Wearable Technology Data Privacy The large volume of data being collected by the devices brings with it the concern of how data is being stored and used by the companies. The way these companies manage their data is crucial as poor data management will potentially lead to the data being breached by a malicious third party. It is crucial for companies to continue to improve both software and hardware to reduce vulnerabilities and increase data security. The other issue that is often a concern is ownership of the data, the privacy policy of the company collecting the data should indicate this. However, most users of the services are unaware of this as the policy is not likely to be read often. The issue of data privacy has yet to be solved and settled, and it is also the issue that can potentially hold back the growth of the market, with some consumer resistance to adopting wearable technology for this reason despite the advantages it brings.

What is Wearable Technology and what are the concerns? Read More »

`Password

Do Complicated Passwords Help Us Be More Secure?

We use passwords everywhere these days, not just on our computers but the various electronic devices and the endless accounts we seem to accumulate. With increased security measures on many websites and accounts to try to protect our sensitive data, we are being asked increasingly to create complex passwords, but are we benefiting? Where did passwords come from? Passwords have been around in one form or another for centuries. Its thought that the Roman military used passwords to distinguish friend from foe and there are documented uses of cyphers throughout history.  However, the first use of passwords for computers happened in 1960at MIT. Fernando Corbato developed the password as a way to protect individual files from being accessed by other people on a compatible Time-Sharing System (CTSS) that several researchers had access to. Until the 90’s when the World Wide Web boom happened the need for computer passwords was not a significant issue. Suddenly there needed to be a way to protect the increasing volume of sensitive data that was being collected about people. When did passwords become complex? In 2003 the US National Institute of standards and Technology (NIST) released an official guidance that was written by an engineer named Bill Burr. This guidance is the basis on which password requirements are dictated. In his 8 page document Burr outlined the need for passwords to have mix of lower and uppercase, use of numbers and special characters and even that passwords should be of minimum length. He also advised that passwords should be changed regularly. Did it improve security? Well there is no doubt that longer more complex passwords are better choice than short easy to guess passwords. There are draw backs to using long passwords. Due to limitations of human memory the ability to recall a long string of letters and numbers can be difficult, which leads most people to either write them down, creating a security issue itself, or they often use the same password to access all their accounts. The problem is that if a hacker guesses the password then they have access to every account. Yet this is still a very common problem. Due to the large number of accounts a person holds they would struggle to create and remember a unique strong complex password for each they create an easy to remember password, which would be fine except that so many people think similarly and use the same password. Research has shown that globally the most popular password is ‘123456’. So the concept was promising but the problem was that most people didn’t understand the reasoning and so just didn’t follow guidance when creating the password and instead opted for convenience. What is the advice now? In 2017 NIST overhauled their advice document completely and now actually recommend the use of passphrases that are much harder to guess than a string of non-sense characters that can be more easily decoded by a computer. So using a string of unrelated words will give you better security on your accounts. Although the current trend is moving to using 2-step authentication by way of password and biometric which will see security improved while maintaining the convenience. NIST also no longer recommend||| that passwords should be changed regularly and instead advise that only done so should there be a need e.g. a breach occurs.

Do Complicated Passwords Help Us Be More Secure? Read More »

IoT, IT of Things

What Does IoT Really Mean?

Internet of things (IoT) is simply a system of devices that are connected to the internet and can transfer data between them across a network without the need for human interaction. Devices can be digital devices, mechanical/digital machinery, objects, implantable medical devices, or aminal biochips. IoT can bring together the devices within closed private internet networks together and allowing them to communicate even if they are on different network types. These will include sensors, smartphones and wearables. Each device collects data from their environment and either send the data to the cloud or analyse it locally, which will enable them to act/respond. IoT can also make use of AI technology to make the data collection process more straightforward. Most of the processes will take place without the need for human intervention, but they can interact to set them up or input the instructions or access the data. IoT is still in its infancy, and some devices and networks can suffer from security issues but what it provides is a future of opportunity. Once the weaknesses can be overcome, for increased efficiency in the way things are done, so saving time and money. The benefit will reach to allow companies, governments and public authorities to reconsider how they deliver their services and produce goods. It will offer the potential to automate many more processes and reducing manufacturing and delivery costs. Some of the potential benefits of IoT in different sectors and industries include; IoT in Farming – the use of sensors to collect information on environmental factors such as; rainfall, humidity, temperature and soil content, would all go towards the automation of farming techniques. Smart home – use of smart devices to control lighting, heating, security systems will help people to use energy with increased efficiency by automating the shut off such devices while also providing convenience for consumers around their home. Medical and Healthcare IoT – will include features such as remote healthcare monitoring, emergency notification systems, smart beds. Wearables – the industry that has quickly embraced IoT and deployed it for its services is that of wearable technology. Smartwatches, virtual glasses, heart rate monitors and even glucose monitors are widely available. Smart Cities – will have IoT applications in waste management and control, traffic control, smart parking, and fleet management. Smart Retail – use of IoT by retailers to communicate directly with consumers to enhance the in-store experience and improve the design and layout based on consumer paths through the store. Currently, the issue with IoT devices is that there is no international standard for the manufacture, which means that compatibility is an issue when it comes to devices from different manufactures communicating with one another. There are also privacy concerns raised to the amount of data collected by the various devices and how that data can be used by companies for their own purposes and also potentially access by criminals. So the security of such networks is a paramount issue to be considered and applied by manufactures of the devices. Even with the weaknesses that IoT is currently showing the potential applications for the future are vast, and this technology is set to change the way we live our lives entirely.

What Does IoT Really Mean? Read More »

The Technologies That are Revolutionising Healthcare

Technological advances in the last 20 years have revolutionised the healthcare industry and have given tools to create truly amazing solutions. Below is an exploration of some of the technologies that have created the most significant impact in recent times.   3D Printing   Since the birth of 3D printing technology in 1983, we have come a long way in a relatively short time. 3D printing technology has given new and innovative solutions to many different human problems over the last ten years. The applications across many industries are endless, and the possibilities are still being realised. With just the medical 3D printing industry is s estimated that by 2027 will be worth more than $6 billion. With a vast array of applications, including; Pre-op planning – creating 3D models of organs to help surgeons plan surgeries to a higher level of accuracy, and so reducing surgery time and recovery. Prosthetics and implants – to design prosthetic limbs and implants that will be specific and the best fit for individuals. Surgical tools and instruments – they can be designed and manufactured with increased precision and even customised for surgeries. Dentistry – printing of customised dental implants can be done quickly and on-site. Bioprinting – 3D printing human tissue to make skin grafts for burn victims and eventually print organs for patients requiring transplants.   Robotics   Since the 1980’s when the first experimental surgical robots were introduced into hospitals, to the present day, that sees the potential applications for the healthcare sector continue to grow, we can see how they will not only improve what exists but even extend the services that are provided. Robots will help carry the burden of repetitive and monotonous tasks so that, staff can deal with the more critical issues and carry out the tasks that require human decision-making skills. One application of robotics in healthcare that is currently expanding, with less of the difficulties in implementation into settings, and propelled even more so with the current COVID-19 pandemic, is their use for disinfection. One way self-driving robots are being used is to disinfect patient rooms is by using UV light. Such technology is highly effective at killing viruses and bacteria without the use of chemicals, a process known as Ultraviolet Germicidal Irradiation (UVGI). Using such technology will reduce the risk for staff to come into contact with infectious viruses and bacteria. The further development of the robotic and AI technology will reveal further what roles they will play in the healthcare sector, as the roles of healthcare professionals will adapt to embrace their presence.   Wearable technology   Recent developments in wearable technology with advances in the sensors that can be incorporated has seen the potential of remote vital sign monitoring become much closer to reality. Healthcare providers would be able to monitor patients in real-time as outpatients, so saving the healthcare system millions. It would decrease the need for hospital admissions and detect vital signs abnormalities sooner, avoiding more complex health issues. The devices providing features such as heart rate, blood pressure, oxygen saturation monitoring along with side health and lifestyle patterns and chronic condition monitoring makes it possible and often better for clinicians to monitor and diagnose patients.  The potential of wearable technology becoming an aid for the medical profession is in part helped by the acceptance of wearable technologies by consumers, a survey showing that usage increased from just 9% in 2014 to 33% in 2018.   Virtual Reality and AI   Even though virtual reality (VR) is a technology generally known for entertainment and gaming industry, it has proved to have some incredibly useful applications. The healthcare industry is one of those that has adopted this technology. The use of VR in surgery simulation and skills training has proved to be an invaluable tool. It is allowing for training in a safe environment but also for skill refreshing. VR has also been used in robotic surgery, which enables the surgeon to use a robotic arm to perform surgery. With the main beneficial feature is providing force feedback allowing the surgeon to gauge the pressure required when performing delicate procedures. VR also has uses in the rehabilitation of patients, the treatment of pain, and even to help treat phobias.     The major advantage of all of these technologies and others like them is the flexibility they provide with the potential for them to be adapted to many sectors and niches of medicine. The wide range of potential applications available to both improves healthcare for the patients and the ability of healthcare professionals to provide it.

The Technologies That are Revolutionising Healthcare Read More »

data breach, IT security, hackers, keep data safe

What is a Data Breach and How to Prevent It

Many people are unaware of how vulnerable they are to data breaches. Anyone is at risk of experiencing a data breach from a single individual to corporations and governments. It is the person or organisation’s responsibility to protect their data. Since the introduction of GDPR, it is a legal liability for companies that carry fines up to €20 million or 4% of turnover. What is a Data Breach, and how do they occur? A data breach can be defined as a security violation in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual unauthorised to do so. The compromisation of data can have adverse effects for both the party that has had their data breached but also the people or organisations who have had their data stolen/exposed. Breaches will happen due to weakness in either the technology or user behaviour. Data breaches are not always from the outside of an organisation; it can come from inside. An accidental data breach can occur when an unauthorised person views sensitive data. Even if the data is not shared, it would still be considered a breach of data because a person saw it with no authority to do so, and this could have many repercussions. A malicious insider data breach is when sensitive data is purposely accessed by an unauthorised individual and shared/exposed with intent to cause harm to the company/organisation. Another form of a data breach is when an unencrypted and unlocked device containing sensitive data is lost/stolen. Most data breaches will come externally to the organisation and commonly by a cyberattack, which can happen by way of different methods; Phishing Brute force attack Malware How to prevent data breaches? Companies and organisations need to take the necessary steps to protect the data they hold. Protecting data of customers/clients is crucial for building trust between the company/ organisation and the customer/client. There are several practices to consider when looking to protect a company’s data from breach; Patching & updating software to help ensure any known vulnerabilities are repaired and secured. High-grade encryption on all devices to protect the sensitive data it contains should it be stolen or lost. Ensure all devices connected to the network/servers have adequate antivirus protection and business-grade VPN, including any “bring your own devices” employees have been allowed to use in any way to access company data. Use strong credentials and multi-factor authentication to protect data from being accessed by password guessing. Educating employees on the importance of data protection and potential vulnerabilities. Increasing awareness will help reduce the possibility of mistakes that can lead to data breaches. Also giving them the tools to recognise possible malicious behaviour in others. Using intruder detection on any systems that are accessible to the internet such a servers and email systems, to protect the data contained within them. Backing up to the cloud will eliminate the risk of sensitive data being stolen from backup drives and data backup tapes. Systems should be very regularly scanned and checked for vulnerabilities. Security can only be as strong as the weakest point in the system. So a regular risk assessment will minimise the risks of data breaches. Implement automated safeguards such as password checking and assess firewall configuration. Automated safeguards will aim to reduce human error, which accounts for most cases of data breaches. By following these practices, organisations and individuals can significantly reduce the chance of a data breach and in turn protect your company and personal data.

What is a Data Breach and How to Prevent It Read More »

Innovative Biometric solutions for the education sector

The current global pandemic has led to shifts in the biometric security industry. Accelerating the demand and shifting the focus on to contactless access control and security systems. The future involves a move away from touchpad systems for fingerprinting, palm scanners, and such technology. Instead, there will be a move towards contactless fingerprint scanners and face recognition solutions.   Why does the education sector need biometric solutions? Education institutions will have different levels of need for biometric solutions depending on their set-up and size but generally, their use can enhance the student experience. Biometric systems can more efficiently record student attendance while streamlining administrative tasks for the teachers, thus increasing the time they are available to teach. The added benefit is the attendance data is more readily available with increased accuracy, as it can\’t be forged and human error risks are removed.   The more obvious need for biometric systems is for access control to provide safe and controlled environments for both staff and students. Facilities installing a biometric system at the main entrance will produce an accurate record of who enters and leaves the premises as well as preventing unauthorised access to the building. A biometric system can also be extended to include allowing students to access different facilities such as the library, canteen, printing, equipment allocation, specific classrooms/labs, or even to prevent access to certain areas.   What are the potential Biometric Solutions? Arana Security can provide customised solutions to the education sector that is tailored to their specific needs and requirements. There are 3 potential systems that can be of benefit;   1. IDEMIA VisionPass Face Recognition   One innovation anticipated to have wide use before the end of the new decade is facial recognition. VisionPass is the most powerful facial recognition device in the current market. The newest addition to IDEMIA’s range of frictionless biometric access control devices. This robust and reliable device provides near-motion 1-second verification through multiple angles and in all light conditions and is resistant to all kinds of spoofing attempts. This is the ideal solution for contactless access control to facilities     2. Contactless enrollment/access control with IDEMIA Morphowave Compact   IDEMIA created their patented, contactless 3D fingerprinted technology, to accurately and quickly capture fingerprints with a single hand movement. Convenient and simple to use whilst removing surfaces that act as potential germ transmission. The Morphowave Compact can also be used with the VisionPass for access control solutions.     3. Biobox enrolment   Using Arana Security’s Biobox enrollment and verification system, with an integrated biometric application and hardware, to capture and store biometric data. A trusted, and flexible biometric enrolment system will help create a much more efficient, accurate, and faster enrollment process for students.  The biometric data can include face recognition, fingerprints, Iris, and signature. The quality of biometric data is such that it can be printed and ID cards even created should there be a need. The system is easily customised with various types of biometrics and peripherals to create the required enrollment workflow.   The Future of Biometrics in the Education sector is here   Education facilities are continually implementing the use of new technologies, to both support and enhance the learning experience. Using technology such as tablets, laptops and smart-boards are a common sight in education institutions. A step towards biometrics can bring further benefits. Not only will using biometrics assist the daily operations but also bring aspects such as accountability, security, and authentication. As well as student attendance, the system can be used for staff time and attendance. To control access with biometrics to restricted areas will ensure that confidential documents are kept secure.

Innovative Biometric solutions for the education sector Read More »

data security, biometrics, keeping data safe

Biometric Data Security – How Safe is Biometric Data

Biometric data is the unique information that can be used to identify a person with accuracy. With every industry being enrolled into the use of biometric authentication, the concerns and reluctance of consumers with regards to the safety of their biometric data becomes ever more important to address them. In 2019 survey showed that 56% of Europeans expressed concern over the security of biometric data.   Although data security has always been an issue, hacking and stolen information has caused many issues for companies/businesses over the years, once a breach is known then passwords and usernames can be changed. However, biometrics cannot be changed as they are unchangeable human features which adds to the complication of securing the data.   To use biometrics for authentication, the data must first be collected, analysed and converted to data, in the form of a biometric template. This will help to keep the biometrics in a more secure format.   The biometric data can be stored in different ways:   Hardware based recognition system  The data is stored locally onto a hardware that will work with the Biometric device to recognize the data. This will give a rapid response as it doesn’t require an external response, instead the data is stored locally. This is one of the more secure methods for storage of the data, as it doesn’t need to be transferred.   Portable Token System The biometric data is stored within a token and be part of a 2-part authentication process, using ID card and the token. This can be a more costly method but as you need 2 step verification, then security is increased, reducing risk of compromise and fraud.   End-user Device Most commonly smartphone device, stores the data on a chip, separate to the device network. This method means that the implementer or the biometric data has no control over it. This is a more secure method as the data is not stored on large database and little risk of hacking.   Biometric Server A cost-effective but potentially susceptible method. The biometric data is held on an external server and should be encrypted when transfer is happening to protect it. It is more susceptible to hacking.   Distributed Data Storage This uses both a server and device to store the data. This system is makes it more difficult for data to be compromised and gives the business complete control of the data. Business must continuously look to the security of their data and improve processes. Also, to opt for the solutions that gives the most secure options for the biometric data and to meet their responsibility to the consumer whose data they must protect.

Biometric Data Security – How Safe is Biometric Data Read More »