Skip to main content

Biometrics Institute addresses safety and security issues at CARTES

The use of biometric technology has spread rapidly in recent years, as it offers customers a simple and secure solution, whether they use it to identify themselves on smartphones, ATMs or bank branches. At CARTES SECURE CONNEXIONS 2014, international experts will discuss the most promising and innovative initiatives in this field.
November 5, 2014 Read time: 2 mins

The use of biometric technology has spread rapidly in recent years, as it offers customers a simple and secure solution, whether they use it to identify themselves on smartphones, ATMs or bank branches.

At CARTES SECURE CONNEXIONS 2014, international experts will discuss the most promising and innovative initiatives in this field.

According to this year’s Industry Survey from the Biometrics Institute, mobility is regarded as the most significant development in the field in the next few years. The second most important factor is the adoption of its use in mobile payments and m-commerce.

“I personally think we are going to see biometrics evolve in many places where secure transactions are needed,” says Isabelle Moeller, the Biometrics Institute’s chief executive. “Biometric authentication has the potential to ease the burden of security, given its simplicity and usability.

“We have seen many successful implementations where biometrics have helped to transform identity management, privacy protection and identity security, like electronic passportsÖor large-scale identity management systems such as the Indian Unique Identity scheme, which facilitates the delivery of government’s services to the poor and marginalised.

“If we get the privacy and vulnerability issues addressed and create trust and control for the consumer, I think biometrics have a great future.”

The privacy issue will be the subject of a presentation on a live biometric trial in Norway, where Zwipe technology has been used as a payment card with real transactions.

The biometric payment card used in the trial contains the owner’s fingerprint. The fingerprint data is all stored and processed on the card. The user knows that their fingerprint is not stored on a database or server that may be compromised by a hacking attack.

‘Biometrics Applications’, 09:30 - 17:00 , Room 3

Contactless biometric payment – Experience from live trial’, Susanne Hannestad, executive board director, Zwipe,
10:10 -10:40 , Room 3.

Related Content

  • Transportation infrastructure technology continues its advance
    July 17, 2012
    It is now 20 years since publication of the Strategic Plan for Intelligent Vehicle Highway Systems. A select group of luminary figures of the ITS industry give their assessment of progress to date This year the IVHS Strategic Plan turns 20, signaling the graduation of the field of Intelligent Transportation Systems from its tumultuous teens to young adulthood. After two decades tethered by the cords of youth and protected by the strict control of adult institutions, ITS has reached a turning point. Its y
  • Transportation infrastructure technology continues its advance
    July 17, 2012
    It is now 20 years since publication of the Strategic Plan for Intelligent Vehicle Highway Systems. A select group of luminary figures of the ITS industry give their assessment of progress to date This year the IVHS Strategic Plan turns 20, signaling the graduation of the field of Intelligent Transportation Systems from its tumultuous teens to young adulthood. After two decades tethered by the cords of youth and protected by the strict control of adult institutions, ITS has reached a turning point. Its y
  • Transportation infrastructure technology continues its advance
    July 17, 2012
    It is now 20 years since publication of the Strategic Plan for Intelligent Vehicle Highway Systems. A select group of luminary figures of the ITS industry give their assessment of progress to date This year the IVHS Strategic Plan turns 20, signaling the graduation of the field of Intelligent Transportation Systems from its tumultuous teens to young adulthood. After two decades tethered by the cords of youth and protected by the strict control of adult institutions, ITS has reached a turning point. Its y
  • Social media mooted for traffic management
    November 13, 2012
    SQLstream’s Ronnie Beggs discusses with Jason Barnes the potential and pitfalls of using social media for traffic monitoring and management. cataclysmic events such as hurricanes and tsunami have challenged perceptions of what constitutes robust traffic management infrastructure in recent times. Presumptions that only fixed systems could offer high levels of unbroken service, accuracy and communication bandwidth, have been taught some hard lessons by nature. In many respects wireless systems now represent t