TITLE

SARGENT BioFob

PUB. DATE
March 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p94
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article features Sargent's BioFab, a handheld, wireless biometric fob that uses fingerprint-based biometrics to authenticate the identity of the fob owner before granting access to locks computers or other prox card/radio frequency-enabled equipment. It can also be easily integrated with radio frequency infrastructures.
ACCESSION #
20081224

 

Related Articles

  • An Authentication Protocol Based on Combined RFID-Biometric System. Chikouche, Noureddine; Cherif, Foudil; Benmohammed, Mohamed // International Journal of Advanced Computer Science & Application;Apr2012, Vol. 3 Issue 4, p62 

    Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, ...). Our work...

  • DESIGNING A NOVEL APPROACH FOR FINGERPRINT BIOMETRIC DETECTION: BASED ON MINUTIAE EXTRACTION. Jadidoleslamy, Hossein // International Journal on Bioinformatics & Biosciences;Dec2012, Vol. 2 Issue 4, p11 

    People authentication based on fingerprint is one of the most important people authentication techniques which it used biology specifications. The main purpose of this paper is discussing on minutiae-based extraction methods for fingerprints comparison and presenting a new pattern matching...

  • Combining Biometrics with ESSO.  // Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p46 

    The article presents the advantages of combining a biometrics with ESSO solution. A biometric-enabled ESSO solution matches each user by correlating against known set of references taking into account. The solution captures images at higher speeds resulting in less image blur distortion. The...

  • Robust Security Model for Biometric Template Protection using Chaos Phenomenon.  // International Journal of Computer Applications;Jun2010, Vol. 3, p10 

    The article presents a study on modern biometric technologies as an alternative solution to existing authentication processes. The authors design a security model for biohashing using Session key and the Chaos phenomenon. It also presents biometric processes and various protection techniques...

  • Spurious Fingerprint Minutiae Detection Based on Multiscale Directional Information. Popović, B. M.; Mašković, Lj.; Banđur, M. V. // Electronics & Electrical Engineering;2007, Issue 79, p23 

    Amongst available biometrics, personal identification based on fingerprints is still considered for one of the most reliable identification method. Most AFIS available today uses distinctive fingerprint features called minutiae for fingerprint comparison. Conventional feature extraction...

  • A MA ÉS A HOLNAP BELÉPTETŐ RENDSZEREINEK AUTOMATIKUS SZEMÉLYAZONOSÍTÓ ELJÁRÁSAI BIZTONSÁGTECHNIKAI SZEMPONTBÓL. Ákos, Bunyitai // Hadmérnök;2011, Vol. 5 Issue 1, p22 

    This article gives a brief summary of well known, widely used and user friendly identification methods, which can be the basis of the future's access control systems. It is about the main specifics of information-, object- and biometry based methods. The purpose is demonstration via logical...

  • TRANSCORE COMBINES BIOMETRICS AND RFID TO IDENTIFY VEHICLES, DRIVERS FOR HIGH-SECURITY.  // Canadian Transportation & Logistics;Apr2005, Vol. 108 Issue 4, p60 

    The article reports that TransCore Inc. has introduced a secure access control system that combines radio frequency identification (RFID) and biometrics to identify--both vehicles and drivers from the vehicle lane as they attempt to enter a facility. The system is wireless, and includes a...

  • 4 Ways to Improve Facility Security. Kempfer, Lisa M. // Material Handling Management;Mar2007, Vol. 62 Issue 3, p29 

    The article suggests several ways to improve security of factories and distribution centers. They include network security, keeping an electronic eye on assets, access control and security of containers. Several security technology that can be employed include biometric access-control and radio...

  • Selection of Authentication Systems for Hungarian Health Care, Based on Physiological Study Part II. The RFID Systems. Artur, BARÁTH // AARMS: Academic & Applied Research in Military & Public Manageme;01/01/2015, Vol. 14 Issue 2, p201 

    The actuality of the topic indicated in the title comes from more and more events where the verification of identity might be required. Health-care is an important part of critical national infrastructures. A primary task of the protection of critical information infrastructures consists in the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics