Skip to main content

DigitalPersona buys biometrics ID business Identity Stream

California-based biometric identity verification specialist DigitalPersona has bought Identity Stream, whose focus is using biometrics to ensure positive identification in banks and other financial institutions. Identity Stream’s software is currently marketed with Temenos – a relationship that will continue - as T24 Biometrics and provides “one touch” identification for any transaction in the TEMENOS T24 core banking system. The solution identifies customers and employees by scanning their fingerprints an
October 29, 2013 Read time: 1 min
Agostinelli: ‘Tremendous potential’
California-based biometric identity verification specialist DigitalPersona has bought Identity Stream, whose focus is using biometrics to ensure positive identification in banks and other financial institutions.  

Identity Stream’s software is currently marketed with Temenos – a relationship that will continue - as T24 Biometrics and provides “one touch” identification for any transaction in the TEMENOS T24 core banking system. The solution identifies customers and employees by scanning their fingerprints and matching that unique identifier with an identity profile stored on a secure server. “Integrating this software with our biometrics-based solutions will expand its functionality and give financial institutions more choices,” said Richard Agostinelli, DigitalPersona president and CEO.

“We see tremendous market potential for solutions like this on a global basis.” He added that there was growth in the sector due to increasingly sophisticated security threats and a need to improve service levels without increasing operating costs.
%$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 oLinkExternal www.DigitalPersona.com http://www.digitalpersona.com/ false http://www.digitalpersona.com/ false false%>

Related Content

  • Deadline looms for papers for Smart Urban Mobility Solutions 2017 conference
    December 9, 2016
    The deadline for submissions for paper s for the inaugural Smart Urban Mobility Solutions (SUMS) conference is looming and closes on 15 December. SUMS is co-located with the renewable and low carbon energy exhibition and conference - All-Energy 2017 at SECC, Glasgow from 10 to 11 May 2017). The organisers are looking for papers on a wide range of smart mobility subjects, including autonomous vehicles and the necessary infrastructure, connected vehicles, highly and fully automated driving, open data,
  • US parking tools refreshed
    March 9, 2018
    The US Institute of Transportation Engineers (ITE) and National Parking Association have agreed to work together on updating their respective Parking Generation Manual and Shared Parking tools, last revised in 2010 and 2009. Fresh analyses in the former will differentiate levels of demand in rural, general urban/suburban, dense multi-use urban and core city centre locations, said ITE CEO Jeffrey F Paniati
  • CARTES 2013 CITC-EuraRFID video story correction
    November 20, 2013
    The video item about innovative Smart Shopping Solutions in day two of the Daily Video at CARTES 2013 interviewed two people: Romain Tribout, R&D Project Manager at CITC-EuraRFID and Romain Toulotte of Natural Security. Unfortunately their names were transposed. The first interviewee speaking about the smart fitting room was Romain Tribout, CITC-EuraRFID’s R&D Proeject Manager; and the second, speaking about biometric payment, was Romain Toulotte, Product Manager at Natural Security. We apologise for the
  • FASTR consortium releases Automotive Industry Guidelines for Secure Over-the-Air Updates
    November 9, 2017
    A non-profit research consortium dedicated to automotive cyber security, Future of Automotive Security Technology Research (FASTR), has announced the availability of the Automotive Industry Guidelines for Secure Over-the-Air Updates. These guidelines are intended to assist automotive manufacturers and others involved in evaluating platforms for secure updates, describing the threat models, providing recommended cryptographic algorithms and detailing a step-by-step checklist for evaluating state of the art