First Tech Federal Credit Union announced a pilot program with MasterCard that will enable First Tech employees to authenticate and verify transactions using facial recognition and fingerprint biometrics.
A new study finds that shoppers think it is cool to get digital help finding relevant products and information – and navigating the store. But they are creeped out by digital capabilities that identify, track and use location and demographics.
Researchers at the University of North Carolina – Wilmington are helping law enforcement groups find real-world uses for facial recognition technology. One specific example is “MIDO” or “Multiple Image Dataset Organizer,” which researchers believe could have helped law enforcement compile that mass amount of information and images that flooded in after the Boston Marathon bombings. After the data is compiled, facial recognition technology could takes effect.
For high-traffic locations, this biometric identification system can be integrated into existing security systems, adding face capture and dual-iris recognition components to turnstiles, infrastructures or entrances.
Security experts at Unisys Corporation predict that the coming year will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data traffic inside enterprises is vulnerable to detection from outsiders.
Facebook, Wal-Mart and other companies planning to use facial-recognition scans for security or tailored sales pitches are working to build the rules for how images and online profiles can be used, according to Newsday. The U.S. Department of Commerce will start meeting with industry and privacy advocates in February to draft a voluntary code of conduct for using facial recognition products, and the draft will be ready by June.
Facial biometric recognition works well on clear images with a good view of the face, but much additional data is often discarded due to the fact that the face, or the full face, is not clearly visible. The discarded data contains “soft” biometrics, such as height, gait and other features, such as ears.
Not all employees are saboteurs or malicious actors, but without education, unwitting employees could cause just as much damage as a targeted data theft in the long run. Read how to prevent this in the August 2015 issue of Security. Also read how building stronger relationships with local and national law enforcement can aid in school security awareness and response, learn about the dangers of continuing to use old credit card terminals, and see the ASIS International 2015 product review.