The Money is on Security

Ritchey, Diane
September 2009
Security: Solutions for Enterprise Security Leaders;Sep2009, Vol. 46 Issue 9, p106
Trade Publication
The article focuses on the use of smart card and biometric technologies to provide security for banks and financial companies in the U.S. The use of smart card is efficient to prevent administrative errors and medical errors. This works with a microcontroller with internal memory because it contains an integrated circuit (IC).


Related Articles

  • From Casinos to 'Multi-cards' DeBerry, Ron // Security: Solutions for Enterprise Security Leaders;Jul2005, Vol. 42 Issue 7, p18 

    Discusses the different security system methods that center on multi-technology cards including biometrics and smart chips. Personal computer-based approach; Standalone approach; Portable database approach; Integrated template management approach. INSET: Wedded to Embedded.

  • Smartcards will be the key to everything.  // Travel Weekly (UK);2/9/2007, p5 

    The article focuses on the use of smartcard and biometric technology to revolutionise travel experience and speed up security checks. Biometric technology will be put on chip and go microchip cards that could act as passports and include booking details. Improved cameras could scan airport...

  • It's All in the Cards. D'Alto, Nick // Odyssey;Oct2007, Vol. 16 Issue 7, p36 

    The article presents information on the use of smart cards in biometric systems in the U.S.

  • Two 'Faces' of Biometrics. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Aug2007, Vol. 44 Issue 8, p56 

    The article discusses the business applications of biometrics in the U.S. According to Frost and Sullivan Research Analyst, Janani Sankaran, biometrics is emerging as the fastest growing segment of the North American electronic access control (EAC) market, benefiting tremendously from...

  • Biometrics -- Getting Personal and Liking It. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Feb2011, Vol. 48 Issue 2, p42 

    The article focuses on the use of biometrics-based system integrated with access controls in handling homeless individuals. It says that the integration of biometrics to any existing access control application was simplified; thus, eliminating extra network infrastructure costs. It also states...

  • Security Enhancements of a Password-Based Mutual Authentication Scheme Using Smart Cards. Younghwa An // International Journal of Multimedia & Ubiquitous Engineering;Apr2012, Vol. 7 Issue 2, p53 

    Password-based authentication scheme is one of the efficient authentication mechanics to protect resources from unauthorized access. Chang-Lee, in 2008, proposed a password-based mutual authentication scheme to overcome the security drawbacks of Wu-Chieu's scheme. In this paper, we have shown...

  • Family Card Security System Using Biometric Device. Prasanth, R.; Balamurugan, V.; Roubavaan, S.; Suresh, E.; Purushothaman, N. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 2, p1533 

    This system mainly focuses on Designing and Implementation of Security System for a family card using fingerprint that has been used to the Civil Supply Corporation. In recent scenarios, all public and private sectors using smart card systems to provide security. Still, it is not up to the...

  • Banks to embed scheme in cards.  // Marketing (00253650);7/11/2007, p2 

    The article reports that Selektpoints, a loyalty programme that will operate via the chip embedded in bank cards, is to be launched in Great Britain before Christmas. The scheme, which made its debut in the Middle East earlier this year, is in partnership discussions with several British banks,...

  • Plan now to beat 2007 password 'breakdown', Gartner advises. Goodwin, Bill // Computer Weekly;9/13/2005, p8 

    The article reports that according to the analyst group Gartner Group PLC, by 2007 80% of organisations will have reached "password breaking point" and will have to turn to more sophisticated technology to protect their systems and data. Businesses need to put a roadmap in place now that will...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics