In 2014 ‘Internet of Things’ advances in merging with biometric devices and services



For years, the ‘Internet of Things’ has evolved as a game-changer movement. The Swedish Telecom giant Ericsson envisions 50 billion connected devices by 2020. Many sources, including a few I gathered below, predict it as a main trend for 2014: The Rise of ‘Internet of Things’, IoT.

‘Internet of Things’ impact biometric-based applications? It already has: just look at the growing market for networked biometric capture devices for e.g. Physical Access Control applications; and PAC is the beginning.

International standards:
For core biometric Web services, OASIS and its members have been leading the way with published standards and reference implementations. For a general IoT introduction, see TED/OASIS videos.

Next development:
More than a decade ago we laid the foundation for our company, Optimum Biometric Labs, with our Web services-based operational monitoring and reporting tool, BioUptime. Today, we are moving forward our pioneering function by partnering with biometric vendors…

View original post 116 more words

Very exciting product, I am curious if its founders have thought about adding any biometric modality (as an additional factor)?


Scout is a wireless security system that starts at $120 and is completely removable. The handsomely-designed units can protect windows and doors in your home and you can program reactions to various events including and up to calling the police.

I’ve seen a number of home alarm systems come and go over the years and this one, at least, has that Nest quality that we all know and love. The units come in three different finishes – white, black, and the afore-mentioned wood trim – and each installation is customizable online.

Service over Wi-Fi is free and the system will send alerts and even dial the police for you on your connected phone. However, the units also contain a 3G radio that can be activated for $10 a month and which will connect to a monitoring service that, in turn, will call the police, you, or a loved one.



View original post 244 more words

I think this multi-factor authentication method can successfully combine security (in different degrees) with user-friendliness thanks to the flexibility and adjustability of the method: identifying objects/persons in one or more images (read: security, multi-factor authentication) with the choice of one (of several) user-input methods (read: user-friendliness) where one of these input methods (e.g. voice recognition) even can increase both convenience and security (addition of 1 more authentication factor). A pretty useful combination of: something you know, something you have, something you are.


Apple had a new patent application published by the USPTO today, describing an unlocking method for digital devices that uses image identification to properly recognize an authorized user. The system would present a user with photographs from their iPhoto or iCloud collections, and then ask them to identify who or what the subject is in order to unlock the device. The item in question could also be an object or series of images.

The authentication process would work by displaying at least one image to be identified from the user’s library, though it could also display a number in succession if users are looking for more security. It’s highly likely that someone close to you will recognize another individual depicted in photos on your phone, for instance, but if you’re worried about granting access even to that inner circle of acquaintances, it becomes increasingly unlikely they’ll be able to…

View original post 209 more words

Premiere – read Detektor International online for free!

I just received this email from Henrik Söderlund, Editor-in-Chief, AR Media International AB:

From today, Europe’s leading security technology trade magazine – Detektor International – will be distributed digitally to 37,000 readers. Please click on the thumbnail to the right to read the brand new issue of Detektor International No. 3 online.
I hope you will enjoy it.

Best regards,
Henrik Söderlund, Editor-in-Chief

Read your digital copy of Detektor International here >>



Optimum Biometric Labs has developed and launched a comprehensive series of BioUptime Partner Programs. A working partnership is essential for business growth and for creating customer success stories which are the principles behind the design of these programs.

The BioUptime Partner Programs are Integrator & Solution Partner, Value-Added Reseller (VAR) Partner, Original Equipment Manufacturer (OEM) Partner, Managed Service Provider (MSP) Partner, BioUptime Ready™ Partner, and Deployment & Consulting Partner. BioUptime is a monitoring software that simplifies management of Reliability, Availability, Maintainability, and Performance of infrastructure components such as devices, applications and end-to-end services. It uses real-time data to detect, diagnose, and report issues in order to assist customers to meet or exceed their business goals and requirements such as meeting the target metrics in Service Level Agreements.

The company has also designed a BioUptime Referral Partner Program with the objective to reward and recognize BioUptime Referral Partners who receives a…

View original post 41 more words

Apple’s intention with buying AuthenTec?

Apple’s intention with buying AuthenTec? An exciting question to answer to. What do you think? It has several dimensions of course. One of them I think, like TechCrunch, has to do with iPad and iPhone and the entire iOS environment. I have always said that when Apple starts with biometrics that will be a great news for the biometric users and industry.


Amid fierce smartphone competition between Samsung and Apple that has spilled into a multinational patent battle, it looks like Apple may have opened yet another front on the M&A side: it is buying mobile security company AuthenTec — which had only just signed a deal with Samsung for Android devices — for $356 million.

AuthenTec, among other things, makes fingerprint sensor chips that are used for security and identification purposes; these are embedded in computing devices. The news was first reported by Reuters; the full announcement was filed with the SEC.

Just earlier this month AuthenTec had inked a deal with Samsung to cover security and device management services to cater to the “BYOD” trend — that is, workers taking their own handsets into their enterprise environment. The AuthenTec service would let IT managers quickly secure and authenticate those devices.

Reuters reported the deal as $356 million —…

View original post 442 more words


Big Data for Biometrics

CIOs and CTOs like it; Enterprises like it; Startups like it; Investors like it; Researchers like it; Users like it. They invest in it, promote it, deliver it, research in it, refine it, and use it [ex. 1-12]It is our time’s most profound machine to explore with; to explore everything. Now, why should the biometrics market and industry take a closer look at it? Read on and Welcome to The Era of Big Data and Metrics!

Hype, Hope, or History goes Mainstream

The hype aside, it has been there for years: Big Data and its use cases. For ages, the diversity and scale, not to mention the necessity, of its applications and advantages have been tremendous: Aerospace industry has used it to monitor and protect spacecrafts and crews; Formula One teams have applied it to optimize car performance and racing strategies; Rotating machine industry has implemented it to predict…

View original post 2,016 more words

%d bloggers like this: