From Casinos to 'Multi-cards'

DeBerry, Ron
July 2005
Security: Solutions for Enterprise Security Leaders;Jul2005, Vol. 42 Issue 7, p18
Trade Publication
Discusses the different security system methods that center on multi-technology cards including biometrics and smart chips. Personal computer-based approach; Standalone approach; Portable database approach; Integrated template management approach. INSET: Wedded to Embedded.


Related Articles

  • Palm-print Verification Using Optimized Cepstrum Blocks. Kekre, H.B.; Vig, Rekha; Pranay, Arya; Aashita, Irani; Saurabh, Bisani // International Journal of Research & Reviews in Computer Science;Mar2011, Vol. 2 Issue 2, p470 

    Using biometrics to verify a person's identity has several advantages over the present practices of personal identification numbers (PINs) and passwords. Minutiae-based automated identification systems are more popular, but they are more computationally complex and time consuming. In this paper...

  • TOUCH AND GO. Couch, Christina // PM Network;Feb2016, Vol. 30 Issue 2, p9 

    The article reports that the biometric security market is expected to be worth 25 billion dollars by 2020. The biometric technologies have existed for a few decades, but they are surging in popularity to combat high-profile security breaches. As the biometric systems enter new markets, the...

  • The Money is on Security. Ritchey, Diane // Security: Solutions for Enterprise Security Leaders;Sep2009, Vol. 46 Issue 9, p106 

    The article focuses on the use of smart card and biometric technologies to provide security for banks and financial companies in the U.S. The use of smart card is efficient to prevent administrative errors and medical errors. This works with a microcontroller with internal memory because it...

  • 10 Strategies to Prevent Tailgating. Morton, Jennie // Buildings;Dec2011, Vol. 105 Issue 12, p25 

    The article discusses several anti-tailgating strategies in order to stop undocumented building entry. It says that the strategies are easy to retrofit and complement most security systems. According to the author, the systems that can be combined include biometrics, laser sensors, turnstiles,...

  • Secure and Privacy Preserving Management of Biometric Templates. ALIMI, Vincent; BELGUECHI, Rima; ROSENBERGER, Christophe // Norwegian Information Security Conference / Norsk Informasjonssi;Nov2010, p134 

    Privacy and security are one of the most important challenges in biometrics. We propose in this paper an architecture for the secure storage and verification of the biometric template. We propose to use at the same time a trusted architecture based on Global Platform and an algorithmic solution...

  • 2 factor authentication. Bowers, Tom; Damore, Kelley // Information Security;Aug2006, Vol. 9 Issue 8, p30 

    The article identifies the strengths and weaknesses of various user identification and authentication technologies used in the U.S. Regulatory requirements such as the Health Insurance Portability and Accountability Act are forcing organizations to implement authentication and identity...

  • SECURITY WATCH. LORENZI, NEAL // Health Facilities Management;Jan2014, Vol. 27 Issue 1, p31 

    The article reports on innovations for increased safety and security in healthcare facility operations as of January 2014. It states that two access control trends include multipurpose smart cards for providing access control, identification, and time and attendance functionality, and systems...

  • Let's get physical. Mayne, Mark // SC Magazine: For IT Security Professionals (UK Edition);Mar2009, p36 

    This article discusses the need for physical security and presents a range of available products. It advises to use an identification (ID) card with a centralized human resource (HR) database. It notes that such a database allows the issuing of a card or token that users can employ to access...

  • The Comparison of Iris Recognition using Principal Component Analysis, Log Gabor and Gabor Wavelets. Patil, Pravin S.; Kolhe, S. R.; Patil, R. V.; Patil, P. M. // International Journal of Computer Applications;Apr2012, Vol. 43, p29 

    With an ever growing emphasis on security systems, automated personal identification based on biometrics has been getting extensive focus in both research and practical over the last decade. The methods for iris recognition mainly focus on feature representation and matching. As we known...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics