Skip to main content

Biometrics Institute addresses safety and security issues at CARTES

The use of biometric technology has spread rapidly in recent years, as it offers customers a simple and secure solution, whether they use it to identify themselves on smartphones, ATMs or bank branches. At CARTES SECURE CONNEXIONS 2014, international experts will discuss the most promising and innovative initiatives in this field.
November 5, 2014 Read time: 2 mins

The use of biometric technology has spread rapidly in recent years, as it offers customers a simple and secure solution, whether they use it to identify themselves on smartphones, ATMs or bank branches.

At CARTES SECURE CONNEXIONS 2014, international experts will discuss the most promising and innovative initiatives in this field.

According to this year’s Industry Survey from the Biometrics Institute, mobility is regarded as the most significant development in the field in the next few years. The second most important factor is the adoption of its use in mobile payments and m-commerce.

“I personally think we are going to see biometrics evolve in many places where secure transactions are needed,” says Isabelle Moeller, the Biometrics Institute’s chief executive. “Biometric authentication has the potential to ease the burden of security, given its simplicity and usability.

“We have seen many successful implementations where biometrics have helped to transform identity management, privacy protection and identity security, like electronic passportsÖor large-scale identity management systems such as the Indian Unique Identity scheme, which facilitates the delivery of government’s services to the poor and marginalised.

“If we get the privacy and vulnerability issues addressed and create trust and control for the consumer, I think biometrics have a great future.”

The privacy issue will be the subject of a presentation on a live biometric trial in Norway, where Zwipe technology has been used as a payment card with real transactions.

The biometric payment card used in the trial contains the owner’s fingerprint. The fingerprint data is all stored and processed on the card. The user knows that their fingerprint is not stored on a database or server that may be compromised by a hacking attack.

‘Biometrics Applications’, 09:30 - 17:00 , Room 3

Contactless biometric payment – Experience from live trial’, Susanne Hannestad, executive board director, Zwipe,
10:10 -10:40 , Room 3.

Related Content

  • Revealed: the SESAMES Awards 2013 winners in full
    November 18, 2013
    Ten companies are celebrating this morning after the winners of the SESAMES Awards were announced at a gala reception in the Automobile Club de Paris (pictured) last night. The purpose of the 11 awards – the Oscars of the secure payments industry – is to recognise and reward the sector’s best innovations every year.
  • Moscow Metro ticketing: your face here
    January 18, 2022
    Metro users in Russian capital Moscow no longer need a card to pay for travel – they just need their face. So does the system actually work? And what about security concerns? ITS International sent Moscow Metro a series of questions – and here are the answers…
  • Smart Insights: ‘TEE will increasingly displace other security solutions’
    October 28, 2014
    Software- or hardware-only mobile security solutions will increasingly be displaced by TEE (Trusted Execution Environment), according to new research. TEE is essentially a secure area that resides in a mobile device baseband processor and provides security against software attacks.
  • The rise of V2X: it’s time for ITS to put up the shields in cyberspace
    May 14, 2018
    Traffic management has largely been shielded from the sort of malicious hacking that is commonplace in other industries – but with billions of connected devices in the world it won’t stay that way, warn internet experts Keith Golden and Brandon Johnson. Traditionally isolated from networks and the internet over most of its history, the traffic management industry has largely been shielded from malicious hacking and system intrusion that have become commonplace in other industries. However, as the rate of