SlideShare a Scribd company logo
In the 1970s, biometric technology
was made available for the first time for:
•	 Granting physical access within 	
restricted premises
•	 Recording attendance and
verifying employees
•	 Providing personal identification
and verification
Since it was first introduced in 1858, biometric technology has come a long way.
Today, highly advanced, highly accurate biometric technologies can authenticate
identity using a person’s fingerprint, iris/eye, facial features, and voice, to name a few.
With the rise in identity and data theft, the global financial services industry is ramping
up its use of biometrics to provide convenient, reliable, and highly secure protection.
With identity theft, data breaches, and financial fraud on the rise, the financial services
industry has turned to biometrics as a security method that far exceeds existing
approaches in strength, accuracy, and ease of use. At a time when customers are
demanding stronger security to protect their information, yet still want convenience
and a great customer experience, biometrics is a smart addition to any company’s
security strategy.
For more information on biometric authetication solutions for financial services,
visit www.samsungsds.com
@SamsungSDSA/SamsungSDSA
Sources:
https://securityintelligence.com/momentum-picks-up-for-biometric-security-in-the-financial-sector/
http://authenticid.co/blog/2014/09/30/evolution-of-biometrics-as-an-identity-authentication-technology/
http://celent.com/reports/biometric-atms-japan-fighting-fraud-vein-pattern-authentication
http://www.cnn.com/2010/WORLD/europe/07/05/first.biometric.atm.europe/
https://www.theguardian.com/business/2016/feb/19/hsbc-rolls-out-voice-touch-id-security-bank-customers
Copyright © 2016 Samsung SDS America, Inc. All rights reserved.
Biometric Identification Evolves to Provide
Unprecedented Security & Reliability
FIRST
GENERATION
DRAWBACKS: The technology
was only available through
physical devices, and results were
time-consuming to generate and
lacked accuracy. Additionally, the
technology required data storage.
Since intranets were at their
nascent stages, access to
biometric technology was limited
and inefficient.
In the 1990s, popularity of
biometrics gave rise to improved
technology and faster, more accurate
results. The first semi-automated facial
recognition system was deployed in
1991, but still required use of an on-site
physical device. Computers were used
to store data and records without direct
involvement in the process.
SECOND
GENERATION
DRAWBACKS: While accuracy
improved, the technology was still
dependent on a user’s physical
presence and availability limited
to government agencies, FBI, and
police departments.
1992
Biometric Consortium is established within
US Government
1994
First iris recognition algorithm is patented
2002
ISO/IEC standards committee on biometrics
is established
2003
Formal US Government activities begin; ICAO
adopts blueprint to integrate biometrics into
machine readable travel documents
2004
Presidential directive drives government-wide
personal identification card for all federal
employees and contractors
Bank of Tokyo-Mitsubishi UFJ introduces
biometrics at ATMs, using hand and finger
scans to authenticate customers
1995
Iris prototype becomes available as a
commercial product
1998
FBI launches DNA Index System (CODIS) to
digitally store, search, and retrieve DNA markers
for forensic purposes
1999
FBI’s large-scale ten-fingerprint (open-set)
identification system becomes operational,
allowing fingerprints to be searched against
data on another system
In the 21st century, use
of biometrics expands significantly as the
technology improves and availability of
mobile phones and laptops goes mainstream.
However, mobility for biometrics is only
available through handheld and other
connected devices. Demand for stronger
security pushes a worldwide drive to
implement biometrics across a variety of
governmental agencies and industries,
including financial services, fueling the next
wave of technology improvements.
THIRD
GENERATION
DRAWBACKS: Technology still
doesn’t achieve 100% accuracy
and requires a physical presence.
Increased access to technology
creates threats from Internet
hackers.
Smartphone advances and widespread
Internet connectivity generate a
significant evolution of biometrics as
an identity authentication solution
enabling the verification of anyone
from anywhere.
CURRENT
GENERATION
2010
Poland’s cooperative BPS bank installs first
biometric ATM in Europe
2011
Motorola introduces first smartphone with
fingerprint scanning capabilities
2012
The FIDO (Fast IDentity Online) Alliance is formed to
deliver standards for simpler, stronger authentication
2013
Apple introduces Touch ID, a fingerprint recognition
feature stored on a user’s local device, rather 		
than on Apple services or iCloud
Barclays Wealth becomes first financial services
firm to deploy voice biometrics to authenticate 		
customers to their call centers
2016
HSBC and its Internet-based retail bank First Direct
announce they will offer 5 million customers access 	
to online and phone accounts using their fingerprint
or voice
Banks are testing and adopting biometrics
to secure mobile apps
Many banks already offer fingerprint
authentication, and fast movers have
also adopted or are testing other modes.

More Related Content

What's hot

Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
Top 10 trends of internet of things in 2020
Top 10 trends of internet of things in 2020Top 10 trends of internet of things in 2020
Top 10 trends of internet of things in 2020
Claritus Consulting
 
Internet Of Things (IoT)
Internet Of Things (IoT) Internet Of Things (IoT)
Internet Of Things (IoT)
kiran kumar
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
 
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...Rob Douglas
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Investorideas.com
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
ijtsrd
 
IoT Challenges ZLotfi
IoT Challenges ZLotfiIoT Challenges ZLotfi
IoT Challenges ZLotfi
Zahra L
 
IoT Business Reality & Patent Development
IoT Business Reality & Patent DevelopmentIoT Business Reality & Patent Development
IoT Business Reality & Patent Development
Alex G. Lee, Ph.D. Esq. CLP
 
IoT ppt
IoT pptIoT ppt
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital Transformation
Larry Kluger
 
Security Protocols for Mobile Banking Application
Security Protocols for Mobile Banking Application Security Protocols for Mobile Banking Application
Security Protocols for Mobile Banking Application
IJCSIS Research Publications
 
IoT Innovation Fund for Business Growth
IoT Innovation Fund for Business GrowthIoT Innovation Fund for Business Growth
IoT Innovation Fund for Business Growth
Alex G. Lee, Ph.D. Esq. CLP
 
Acacia’s patent monetization operating subsidiaries
Acacia’s patent monetization operating subsidiariesAcacia’s patent monetization operating subsidiaries
Acacia’s patent monetization operating subsidiaries
Alex G. Lee, Ph.D. Esq. CLP
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometrics
Manzurul Hassan Zumman
 
Patent Insights: Connected Car Innovations
Patent Insights: Connected Car InnovationsPatent Insights: Connected Car Innovations
Patent Insights: Connected Car Innovations
Alex G. Lee, Ph.D. Esq. CLP
 
Survey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In MalaysiaSurvey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In Malaysia
FICO
 
Iot ppt
Iot pptIot ppt
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Priyanka Aash
 

What's hot (20)

Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Top 10 trends of internet of things in 2020
Top 10 trends of internet of things in 2020Top 10 trends of internet of things in 2020
Top 10 trends of internet of things in 2020
 
Internet Of Things (IoT)
Internet Of Things (IoT) Internet Of Things (IoT)
Internet Of Things (IoT)
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
 
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
Keynote Speaker Janice Kephart - Founder and CEO of The Secure Identity and B...
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
IoT Challenges ZLotfi
IoT Challenges ZLotfiIoT Challenges ZLotfi
IoT Challenges ZLotfi
 
IoT Business Reality & Patent Development
IoT Business Reality & Patent DevelopmentIoT Business Reality & Patent Development
IoT Business Reality & Patent Development
 
IoT ppt
IoT pptIoT ppt
IoT ppt
 
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
Patenting in Mobile Application (App) & Software Based Technology | How to Pa...
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital Transformation
 
Security Protocols for Mobile Banking Application
Security Protocols for Mobile Banking Application Security Protocols for Mobile Banking Application
Security Protocols for Mobile Banking Application
 
IoT Innovation Fund for Business Growth
IoT Innovation Fund for Business GrowthIoT Innovation Fund for Business Growth
IoT Innovation Fund for Business Growth
 
Acacia’s patent monetization operating subsidiaries
Acacia’s patent monetization operating subsidiariesAcacia’s patent monetization operating subsidiaries
Acacia’s patent monetization operating subsidiaries
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometrics
 
Patent Insights: Connected Car Innovations
Patent Insights: Connected Car InnovationsPatent Insights: Connected Car Innovations
Patent Insights: Connected Car Innovations
 
Survey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In MalaysiaSurvey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In Malaysia
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
 

Similar to Biometric Identification Evolves to Provide Unprecedented Security & Reliability

Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
IJARIIT
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
NEC Public Safety
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
Bahaa Abdulhadi
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
mercatoradvisory
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
Tony Adjuder, C.P.S.
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
IVR Technology Group
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
IRJET Journal
 
The Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity VerificationThe Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity Verification
FTx Identity
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
VLink Inc
 
02-05-15 - Evolution of Biometrics
02-05-15 - Evolution of Biometrics02-05-15 - Evolution of Biometrics
02-05-15 - Evolution of BiometricsHector Hoyos
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety
 
Iris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdfIris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdf
SachinSadgir1
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Jigisha Aryya
 
The How of Biometrics
The How of BiometricsThe How of Biometrics
The How of Biometrics
Peachy Essay
 
Identiy Authentication White Paper
Identiy Authentication White PaperIdentiy Authentication White Paper
Identiy Authentication White PaperHector Hoyos
 
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter LeeNEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety
 
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) PresentationNXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
Investorideas.com
 
Data Protection in Smart Cities Apps
Data Protection in Smart Cities AppsData Protection in Smart Cities Apps
Data Protection in Smart Cities Apps
Bahaa Al Zubaidi
 

Similar to Biometric Identification Evolves to Provide Unprecedented Security & Reliability (20)

Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
The Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity VerificationThe Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity Verification
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
02-05-15 - Evolution of Biometrics
02-05-15 - Evolution of Biometrics02-05-15 - Evolution of Biometrics
02-05-15 - Evolution of Biometrics
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
Iris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdfIris Recognition Market PDF.pdf
Iris Recognition Market PDF.pdf
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
The How of Biometrics
The How of BiometricsThe How of Biometrics
The How of Biometrics
 
Identiy Authentication White Paper
Identiy Authentication White PaperIdentiy Authentication White Paper
Identiy Authentication White Paper
 
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter LeeNEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
 
Pwc.pptx
Pwc.pptxPwc.pptx
Pwc.pptx
 
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) PresentationNXT-ID, Inc.'s (OTCQB:NXTD) Presentation
NXT-ID, Inc.'s (OTCQB:NXTD) Presentation
 
Data Protection in Smart Cities Apps
Data Protection in Smart Cities AppsData Protection in Smart Cities Apps
Data Protection in Smart Cities Apps
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Biometric Identification Evolves to Provide Unprecedented Security & Reliability

  • 1. In the 1970s, biometric technology was made available for the first time for: • Granting physical access within restricted premises • Recording attendance and verifying employees • Providing personal identification and verification Since it was first introduced in 1858, biometric technology has come a long way. Today, highly advanced, highly accurate biometric technologies can authenticate identity using a person’s fingerprint, iris/eye, facial features, and voice, to name a few. With the rise in identity and data theft, the global financial services industry is ramping up its use of biometrics to provide convenient, reliable, and highly secure protection. With identity theft, data breaches, and financial fraud on the rise, the financial services industry has turned to biometrics as a security method that far exceeds existing approaches in strength, accuracy, and ease of use. At a time when customers are demanding stronger security to protect their information, yet still want convenience and a great customer experience, biometrics is a smart addition to any company’s security strategy. For more information on biometric authetication solutions for financial services, visit www.samsungsds.com @SamsungSDSA/SamsungSDSA Sources: https://securityintelligence.com/momentum-picks-up-for-biometric-security-in-the-financial-sector/ http://authenticid.co/blog/2014/09/30/evolution-of-biometrics-as-an-identity-authentication-technology/ http://celent.com/reports/biometric-atms-japan-fighting-fraud-vein-pattern-authentication http://www.cnn.com/2010/WORLD/europe/07/05/first.biometric.atm.europe/ https://www.theguardian.com/business/2016/feb/19/hsbc-rolls-out-voice-touch-id-security-bank-customers Copyright © 2016 Samsung SDS America, Inc. All rights reserved. Biometric Identification Evolves to Provide Unprecedented Security & Reliability FIRST GENERATION DRAWBACKS: The technology was only available through physical devices, and results were time-consuming to generate and lacked accuracy. Additionally, the technology required data storage. Since intranets were at their nascent stages, access to biometric technology was limited and inefficient. In the 1990s, popularity of biometrics gave rise to improved technology and faster, more accurate results. The first semi-automated facial recognition system was deployed in 1991, but still required use of an on-site physical device. Computers were used to store data and records without direct involvement in the process. SECOND GENERATION DRAWBACKS: While accuracy improved, the technology was still dependent on a user’s physical presence and availability limited to government agencies, FBI, and police departments. 1992 Biometric Consortium is established within US Government 1994 First iris recognition algorithm is patented 2002 ISO/IEC standards committee on biometrics is established 2003 Formal US Government activities begin; ICAO adopts blueprint to integrate biometrics into machine readable travel documents 2004 Presidential directive drives government-wide personal identification card for all federal employees and contractors Bank of Tokyo-Mitsubishi UFJ introduces biometrics at ATMs, using hand and finger scans to authenticate customers 1995 Iris prototype becomes available as a commercial product 1998 FBI launches DNA Index System (CODIS) to digitally store, search, and retrieve DNA markers for forensic purposes 1999 FBI’s large-scale ten-fingerprint (open-set) identification system becomes operational, allowing fingerprints to be searched against data on another system In the 21st century, use of biometrics expands significantly as the technology improves and availability of mobile phones and laptops goes mainstream. However, mobility for biometrics is only available through handheld and other connected devices. Demand for stronger security pushes a worldwide drive to implement biometrics across a variety of governmental agencies and industries, including financial services, fueling the next wave of technology improvements. THIRD GENERATION DRAWBACKS: Technology still doesn’t achieve 100% accuracy and requires a physical presence. Increased access to technology creates threats from Internet hackers. Smartphone advances and widespread Internet connectivity generate a significant evolution of biometrics as an identity authentication solution enabling the verification of anyone from anywhere. CURRENT GENERATION 2010 Poland’s cooperative BPS bank installs first biometric ATM in Europe 2011 Motorola introduces first smartphone with fingerprint scanning capabilities 2012 The FIDO (Fast IDentity Online) Alliance is formed to deliver standards for simpler, stronger authentication 2013 Apple introduces Touch ID, a fingerprint recognition feature stored on a user’s local device, rather than on Apple services or iCloud Barclays Wealth becomes first financial services firm to deploy voice biometrics to authenticate customers to their call centers 2016 HSBC and its Internet-based retail bank First Direct announce they will offer 5 million customers access to online and phone accounts using their fingerprint or voice Banks are testing and adopting biometrics to secure mobile apps Many banks already offer fingerprint authentication, and fast movers have also adopted or are testing other modes.