access

TDSi?s EXgarde 4.2 Adds Full Integration With ASSA ABLOY?s Aperio Wireless Locking Technology

EXgarde (used for 4.2) (Custom) (2) By TDSi on December 11, 2013 TDSi, security solutions manufacturer, has launched the latest version of its access control software, EXgarde PRO 4.2, which incorporates full integration with ASSA ABLOY’s Aperio TM wireless locking technology. TDSi’s powerful EXgarde PRO software combines many elements of physical security in a centralised security portal, enabling the operator to monitor and control physical access whilst incorporating CCTV feeds and emergency alarm triggers. Additionally EXgarde 4.2 also allows an organisation to synchronise its employee database and IT security protocols, via integration with Microsoft Active Directory ® , with these physical security systems to ensure a fully integrated approach and complete visibility over the assets of the whole business. TDSi’s Managing Director, John Davies, commented, “EXgarde 4.2’s integration with Aperio TM offers a new level of remote lock functionality with a global leader in door opening solutions. Furthermore, TDSi is proud to be the first globally to integrate directly to Aperio’s new wireless IP hub. Using Aperio alongside TDSi’s core systems allows greater flexibility in remote areas where access control may be more difficult to implement. Working together, the two solutions offer highly precise site activity reporting, centralised alarm management, real-time event and alarm updates, and evacuation reporting – which is vital in the event of an emergency. EXgarde 4.2 and Aperio TM also offer an excellent time and attendance reporting solution and door monitoring (forced door and time open) facility that gives a highly accurate view of the […]

SALTO integrates with Milestone XProtect

Northern Ireland-based Ambar Systems, a SALTO Certificated Partner, has developed a plug-in integration that combines SALTO Systems access control with XProtect software. It is estimated that more than 10 million people rely on SALTO each day to provide access control over who is able to access what, where and when. Ambar’s plug-in integrates SALTO Systems directly into XProtect Smart Client, enabling users to control access and monitor video surveillance from a single interface. Integrating the two systems eliminates the need to run two separate applications and enables the user to open doors while simultaneously viewing video footage of the doors. The SALTO plug-in captures critical events from the SALTO software and registers them as alarms in XProtect Smart Client. These alarms are automatically linked to relevant video footage from corresponding cameras. Other key features include: Users can seamlessly control cameras in their surveillance system, such as starting/stopping recording, changing video frame rate and moving cameras to focus on a door Monitoring events are issued by the Salto system and automatically registered as alerts within the alarm manager in XProtect Smart Client. Full details of the event, card holder, location and time are captured along with the video footage to provide a complete package of surveillance information Allows users to open doors remotely from the XProtect Smart Client.

Axis Cameras Help Secure Korean Airport Customs Workload

Source: Axis Communications | Date: 11/14/2013 Related tags: AXIS , airport management solution , X-ray scanners , airline security management Mission Gimhae Customs, located in Gangseo-gu, Busan, has jurisdiction over Gimhae International Airport, the gateway to Korea’s southwestern area which handles an average of 75 airplanes, including Korean Air and Japan Airlines, carries 9500 passengers. Gimhae Customs imports repair parts, communication devices and marine engines, small quantities of urgently needed samples and advertising items, exporting agricultural and marine products. The nature of the air cargo needs to be handled efficiently and rapidly while blocking the inflow of illegal items. Separate reading rooms are used for each of the 4 X-ray scanners without surveillance cameras caused difficulty for workforce management, with no separate monitoring system, leading to frequent disputes about lost and damaged items. To resolve these problems and proactively respond to changes in environment of the airport, Gimhae Customs introduced a suitable monitoring system to enhance surveillance competency Solution Gimhae Customs wanted a solution to minimize civil complaints and enhance speed and accuracy of monitoring and tracking, Gimhae Airport surveillance system is using Axis P5534 and Axis P3304 for capability of smoothly interfacing for more unified operations while providing high-definition video surveillance for clear and intuitive monitoring. The International Arrival Hall’s special environment and low ceiling height, a camera with ability to monitor a wide area is required for each carousel. Axis partner Darwin System used high-definition network cameras and built an effective system capable of monitoring all processes […]

Mirasys Agile Virtual Matrix And Mirasys Geospatial Mapping To Launch At FinnSec 2013

Tue, Nov 12, 2013 02:00 EST Mirasys Ltd., one of the leading suppliers of open platform Video Management Solutions, will launch the Mirasys Agile Virtual Matrix and Mirasys Geospatial Mapping applications at the FinnSec 2013 fair. Designed for the need of large surveillance systems, Mirasys Agile Virtual Matrix and Mirasys Geospatial Mapping make it vastly easier to design and run large scale security centers. Mirasys Agile Virtual Matrix Mirasys Agile Virtual Matrix allows large scale video surveillance systems to use a multitude of monitors arranged in a synchronized matrix. The monitors managed via Mirasys operator console can be used to view thousands of static and dome cameras, camera tours, IP cameras, analog cameras, I/O devices and virtual cameras in an adaptable and user-friendly environment. Mirasys Agile Virtual Matrix is a powerful and easy-to-use solution for intelligent video surveillance of corporate networks, industrial processes, commercial centers, and multi-office environments – both locally as well as remotely. Mirasys Geospatial Mapping Mirasys has developed a new service to enhance and complement situational awareness systems such as maps in Mirasys VMS. This application allows for easy management of e.g. large-scale video surveillance systems with the help of multi-level maps and CAD pictures – also when the surveillance is done remotely. All administration is done within the system: coordinates and reference data relating to maintenance can be defined for all components of the surveillance system, monitors can be arranged, and layouts can be customized separately for each monitor. This makes their maintenance a lot […]

BIO-key To Integrate Biometric Platform Into AMD Security Solutions

bio-key logo November 12, 2013 –  BIO-key International  has announced that the company is working with AMD to ensure compatibility of its WEB-key biometric management platform with AMD’s upcoming security solutions. As a result of this work, the company says device manufacturers will be able to use the BIO-key algorithm to match fingerprints on compatible AMD devices, with or without a server, or in the network or cloud. Specifically, AMD customers will be using BIO-key’s scanner independent algorithm. “BIO-key is honored to be working with AMD toward this uniquely valuable TrustZone integration,” said Jim Sullivan, BIO-key’s VP of Strategy and Business Development said. “With this solution, OEMs will be insulated from the rapidly changing fingerprint scanner marketplace by having a single best-of-breed, interoperable platform to interface with. Online service providers and enterprises will benefit from a standardized, securely configured WEB-key client on their users’ devices, made available by device manufacturers or through the ARM TrustZone technology ecosystem. This will allow enhanced security for online transactions and BYOD security. Fingerprint scanner manufacturers benefit by being part of a secure cloud infrastructure allowing remote and cloud authentication, which significantly enhances the core value proposition of fingerprint authentication beyond unlocking the phone or other device. Our existing patents on securing biometric data and keys using Trusted Execution Environments (TEE) make this a natural evolution of our product strategy.” Tomorrow, November 13, 2013, BIO-key will present at the 2013 AMD Developer Summit with its presentation titled, “Leveraging fingerprint biometric authentication to streamline secure access.” […]

SALTO?s Access Control System Chosen To Protect St Paul?s College In Sydney

Published on 4 Oct, 2013 SALTO’s GEO RIM cylinders proved the ideal solution as it has been specially designed and developed for use with doors where normal escutcheons cannot be fitted GEO locks can be fully integrated with the full SALTO platform, and are a versatile, cost effective solution The customer St Paul’s College in Sydney, Australia, is an all-male Anglican residential college and affiliated with the University of Sydney. Founded in 1856, it is Australia’s oldest university college and has nearly 200 residents, of whom about 150 are undergraduates; with the remainder being graduates undertaking further study or holding university positions. The college has a substantial tutorial programme and uses the principle of peer tutoring, a development of the idea of ‘peer assisted study’. Nearly all tutors are students in college, and most of them are undergraduates, at most a year or two further advanced than their class. As a result university work is drawn to the centre of college life, and teaching and intellectual leadership is part of the mainstream conversation. The organisation of the tutorial system is largely in the hands of students, under the supervision of the Senior Tutor. Social networking is also used by the students to supplement teaching. Background The buildings at St Paul’s College date from the late 1850’s up through to those constructed in the 1960’s, 1970’s and 1990’s. There had been many changes to the locking installations over the years meaning the college had ongoing problems with students loosing keys […]

Analyst View: CSC?s Acquisition Of ServiceMesh

John Madden Following the announcement of CSC’s acquisition of ServiceMesh,  John Madden, Practice Leader, IT Services at Ovum has the following initial comments: “CSC announced more than a year ago that it would reorganize and reinvest in strategic areas to spark additional growth, and the company has been true to its word. The vendor’s announced acquisition of ServiceMesh, a 140-person, privately funded cloud management and brokerage company, is CSC’s third deal in as many months – made possible by cost-cutting and shedding some business in order to build up resources and free cash. This deal augments CSC’s overall cloud initiatives, particularly in how it accelerates CSC’s own internal IP efforts around cloud orchestration and management. ServiceMesh, with its Agility Platform, allows enterprise and public sector clients to identify which workloads should be deployed and managed in either private or public cloud models, and provides a single management and brokerage layer for hybrid cloud environments.  The platform, which is used by customers such as Swisscom and the Commonwealth Bank of Australia, also provides a single point for enterprise-wide access, control and governance of cloud services. With this deal, CSC will now have capabilities to address two key elements that must be addressed as the cloud services market continues to grow: the ability to size, deploy, scale and manage hybrid cloud environments, and the need for enterprises to have proper cloud governance within their organizations . ” —ENDS— NOTE TO EDITORS To arrange an interview or for further details regarding this […]

Opening New Doors: Smartphone Access Control

Smartphone Access Control Smartphone access control, as we identified in our previous blog on the access control industry , is set to create amazing new possibilities for secure entry systems. Smartphones are already being used to allow the remote monitoring and control of smart home security systems . If all goes to plan, we should soon see the retirement of those clunky access key cards and fobs that are always getting lost, left at home or worse; falling into the wrong hands. Instead, we’ll be able to get in and out securely, simply by waving our smartphone at the door or automated gate of our businesses and homes. The irreplaceable smartphone It’s amazing how quickly smartphones have become an essential part of most people’s lives. A quirky video study made by cyber security company Norton attempted to show the psychological importance of our phones and their contents. Members of the public were offered cash to throw their phone into a river. The expression on the individuals’ faces says it all. With the growth of BYOD (Bring Your Own Device) , our personal smartphones are also increasingly being used not just for socialising with friends and family but for work purposes too. The upshot of all this of course, is that we very rarely leave our phones at home. I myself have a long-standing mantra I repeat every time I leave the house: “keys, wallet, phone”. Thanks to new smartphone access control technology, the days of there being three things on that […]

Vision-Box Deploys Biometric eGates At Lisbon International Airport

vision-box November 7, 2013 –  Vision-Box  has announced that it has set up biometric Automated Border Control eGates at the Lisbon International Airport. In particular, the gates that have been deployed are the company’s vb i-match 5, which can process the Portuguese ePassports as well as the Portuguese National Citizen Card and holders of diplomatic or special passports as part of recently implemented pilot projects for Brazilian and Angolan nationals. To verify the identity of users passing through the gates, vb i-match 5 uses biometrics, including iris, fingerprint and facial recognition. This particular gate design has been in production since 2007. “Today, as in 2007, Portugal continues in the forefront of automated border control and Vision-Box is delighted to continue to support SEF and have a positive impact in keeping Portuguese borders safe while at the same time providing a good passenger experience,” Miguel Leitmann, Senior Vice President of Vision-Box said. Reported previously , Vision-Box also recently deployed eGates at the Hamad International Airport in Qatar. Earlier this year, Vision-Box launched what it was calling a ‘ biometric periscope ,’ for long distance capture of face and iris in self-service eGates. The device is capable of capturing biometrics from a distance of 1 metre. Leave a Comment comments

Biometric Technology: Curbing Fraud In Banks

biometric Mukosha mulenga By MUKOSHA MULENGA BANKS and other financial institutions hold the key to one of our most treasured assets: our money. Most banks are now looking at using biometrics to protect against identity fraud and comply with government regulations. The use of biometric technology is becoming widely recognised in the banking industry as a viable means to prevent identity fraud, safeguard data, improve ease-of-use, and save money from lost or stolen passwords. When you consider that approximately 84 percent of bank fraud is committed by in-house staff, or that nearly 40 percent of all help desk calls are for forgotten passwords, it is no surprise that many banks are turning to biometric technology for increased security and convenience.  Banks therefore now have the challenge of integrating fingerprint functionality into existing in-house applications or their core banking applications. Banks can use solutions such as ) from M2SYS, for safeguarding enterprise data and reducing costs. EBS supports active directory, and can enable banks to secure login to their network and replace user names and passwords with something that you cannot share, lose, or forget: Your Fingerprint! With an ever-increasing number of security breaches, the pressure on banks to implement methods of password management, identity management, data and network security, and two factor authentication has never been stronger. The sharing or theft of user passwords still remains the most popular reason that corporate data is compromised. Biometrics solves this problem by allowing businesses and banks to implement a centralised biometric […]

The Future Of Electronic Access Control: Two Perspectives

As part of our continuing coverage of the future of access control, Ledger technical editor Jerry Levine asked both a representative from an electronic access control company and an experienced locksmith to share their perspectives on the future of electronic access control (EAC). Following are the Ledger’s questions and answers from Bruce Lindstrom, Northeast regional sales manager for Salto Systems, and Glenn Younger, co-owner of Grah Safe and Lock.   Q & A: Bruce Lindstrom What do you see as the future of electronic access control? Please discuss new products, credentials and software. Salto will continue to develop new locking devices to help reduce the number of mechanical keys required in a facility so that everyone uses their credential instead of metal keys. Salto has released a number of new products, which utilize a low- cost electronic cylinder for use in mortise and rim cylinders and electronic padlocks. Recent releases include a wireless cylinder, a rack server handle and an electronic cam lock. Electronic locks have been released for securing many smaller cabinets and lockers. For new credentials, the obvious pick here is the expansion of Near Field Communications (NFC) technology into the U.S. market. This Smartphone technology has been utilized in Europe and the Pacific Rim where Salto has been shipping NFC-capable locks for over half a dozen years. Here in the United States, it means your Smartphones with enabled NFC will replace credentials and credit cards. This is a technology shift. After all, who leaves home without […]

Washington Naval Yard Shooting – Case Analysis – Utica College

On 16 September 2013, Aaron Alexis conducted a mass shooting in Building 197 at the Washington Navy Yard. He was a lone shooter killed by police after killing 12 and injuring 8. There were former instances of misconduct and mental issues. These are not considered in issuance of Common Access Card (CAC) or clearance. There were poor installation access control and building security procedures seen as contributing factors. The Attack and Defense Scenarios analyze two main issues. Issue 1: • Could the attack have been substantially more lethal if the shooter had pre-planned and preositioned additional key attack elements thereby increasing the efficiency of the attack? • Could the attack be a diversionary tactic to draw attention away from the true reason, data breach of classified information? Issue 2: • Could the risk of an attack been reduced through a layered defense implementation of X-ray machine/metal detector suites, more security cameras with facial recognition capabilities, and increased access controls (biometrics or improved identification badging)? Analysis of the issues result in the following risk assessment values: • Initial Risk Assessment (Baseline) = 18% • Attack Boost (Worst Case) = 12% increase • Defense Boost (Best Case) = 14% decrease • After applying the Ryan-Nichols Equation the NET value  requires $2.28Million dollars to mitigate the risk of the attack • Implementation of multilayered defense with enhanced access control systems and procedures are recommended Read the rest in the downloadable PowerPoint show file here:   http://treadstone71llc.files.wordpress.com/2013/11/washingtonnavalyardshooting-caseanalysis.ppsx  http://programs.online.utica.edu/programs/masters-cybersecurity.asp

China Installed More Than 60 Security Cameras On One Street Pole

News Bot   Thanked 0 Times in 0 Posts Paranoid much, China? Cause it sure as hell looks like it when you have more than sixty security cameras strapped onto a single street light. This photograph, taken at an intersection in Shanghai by NetEase , hilariously captures the personal privacy be damned, big brother monster attitude that everyone imagines China to have. It’s perfect, really. Read more… More… News Bot   Thanked 0 Times in 0 Posts Remember that PC streaming feature Mad Catz’ MOJO is supposed to be getting sometime after launch? It might be powered by NVIDIA’s GameStream technology. “We’re talking to NVIDIA and we hope to enable GameStream soon after the launch of the console,” Alex Verrey, Mad Catz’ Global PR Director told … More… There are no threads newer than the previous one. Click the back button in your browser to return to it.

Diebold Secures Pueblo Viejo Gold Mine

Advanced security solutions protecting one of world’s largest mines October 31, 2013 — NORTH CANTON, Ohio , Oct. 31, 2013 /PRNewswire/ — Diebold, Incorporated (NYSE: DBD) is helping secure one of the largest gold mines in the world. Operated by Pueblo Viejo Dominicana Corporation (PVDC), the Pueblo Viejo mine, located in the Dominican Republic , has proven and probable gold reserves of 25.0 million ounces. To secure this high-value site, Diebold installed and implemented advanced video surveillance , access control , intrusion detection and perimeter monitoring systems. The company integrated these systems via a customized software application, enabling on-site security personnel to efficiently monitor the entire property in real time. (Logo: http://photos.prnewswire.com/prnh/20080725/DIEBOLDLOGO ) PVDC is a joint venture between gold producers Barrick Gold Corporation and Goldcorp Inc. It achieved commercial production in January 2013 and has a projected life of more than 30 years. Diebold Secures Pueblo Viejo Gold Mine “As a vast gold reserve, the Pueblo Viejo mine requires numerous electronic security solutions to protect the site’s assets,” said Marshal Valentine , country security manager. “Diebold’s integrated solutions have provided a way to actively and intelligently monitor the entire site, enhancing security from the perimeter to individual locations inside the property.” For the site’s video surveillance system, Diebold installed more than 300 cameras and multiple digital video recorders. In addition, Diebold created a fully equipped command center where security personnel can monitor video images from across the site and automatically view video feeds associated with any alarm event. […]

CSC Continues Acquisition Track With ServiceMesh Deal

John Madden Summary CSC announced more than a year ago that it would reorganize and reinvest in strategic areas to spark additional growth, and the company has been true to its word. The vendor’s recently announced acquisition of ServiceMesh, a 140-person, privately funded cloud management and brokerage company, is CSC’s third deal in a year – made possible by cost-cutting and shedding some business in order to build up resources and free cash. This deal augments CSC’s overall cloud initiatives, particularly in how it accelerates CSC’s internal IP efforts around cloud orchestration and management. Acquisitions focused on building capabilities in strategic growth areas CSC unveiled its acquisition of ServiceMesh as part of its mixed Q2 earnings announcement. This is the second deal for the outsourcer in the last three months, and its third deal in a year – which is notable, as CSC has been very acquisition-averse in the past. All of these deals are to bolster CSC’s IP and capabilities in its strategic growth areas, which include cloud and Big Data/analytics as top priorities. The first two deals were focused on Big Data. First, in October 2012, CSC acquired 42Six Solutions, a software development company specializing in data processing and analytics for US government intelligence agencies and for the US Department of Defense. Secondly, in August 2013, CSC enhanced its Big Data practice with a deal for Infochimps, a small, privately held company known for its automated framework for elastic scaling of Hadoop, NoSQL, and stream processing analytics […]

Biometric Market To Flourish By 2018

Biometric market to flourish by 2018 – Goode Intelligence Goode Intelligence has predicted mobile security products and services will grow within the next five years, generating more than US$8.3 billion revenue by 2018. HumanIPO reported earlier this month on the National Cyber Security Alliance’s preferred smartphone security survey. Focusing on the mobile biometric security market, Goode believes the industry is driven by Apple’s release of Touch ID. “Apple has disrupted everything and has again disrupted a market and rebranded biometrics as a convenient method of  communicating with consumer technology,” the report stated. Within five years, 3.4 billion users are predicted to engage with biometrics on their mobile devices, alluding to a collective revenue of US$8.3 billion. Fingerprint sensors are forecasted to become a standard feature for high-end smart mobile devices by  2015, serving as a replacement with “cumbersome and inconvenient” methods currently available on mobile devices. With regards to mobile commerce, mobile devices are predicted as the primary mode for digital commerce. However, Goode reasons its progress is currently being hampered by identity verification and payment authorisation yet to be updated. Biometrics is suggested as a replacement for payment authorisation, as well as serving its goal in the authentication of products as supported by the Field Integrated Design Operations (FIDO) Alliance, among others. It will also contribute to scale security in the protection of sensitive information and transactions with services such as Mobile Device Management (MDM), secure containers and Mobile Application Management (MAM) succeeding in the creation of a […]

Biometric ID Cards For Foreigners Studying In Malaysia

Home Minister Datuk Seri Dr Ahmad Zahid Hamidi. Home Minister Datuk Seri Dr Ahmad Zahid Hamidi. KUALA LUMPUR: The Home Ministry is in talks with the Education Ministry on the proposed implementation of security featured biometric identity cards for foreign students studying in local institutions of higher learning said Home Minister Datuk Seri Dr Ahmad Zahid Hamidi on Wednesday. “We do have some problems with regard to foreign students. “We are currently in discussions with the Education Ministry to adopt the biometric identity card with security features such as barcode and RIFD chip for foreign students here,” he told reporters at a press conference in Parliament lobby. He said the identify card would serve as the students traveling permit when in the country rather than the students having to carry passports where ever they go. “Several countries, namely Saudi Arab, Yemen and several Middle East countries have indicated interest in adopting such a card for their students students here,” he added. Based on ministry’s records, there were some 80,000 international students in the country last year. The aim is to attract 200,000 foreign students by 2020. In a related issue, Ahmad Zahid said that a pilot project is currently underway to implement the biometric identity card for the 2.116mil foreign workers in the country by the end of next year. He added that cards would be issued according to the sectors employing the foreign workers to allow immigration officials to keep tabs. “By end of next year, all foreign […]

Oil and Gas Security Market – Including Physical Security Forecasts & Analysis (2013 – 2018)

[October 28, 2013] Oct 28, 2013 (M2 PRESSWIRE via COMTEX) — Oil and gas security market is expected to experience significant growth over the coming years due to the growing demand for energy. It has thus forced the companies to expand their existing infrastructure and also deal with a variety of security challenges such as terrorist attacks, criminal activities and global competition. This report on oil & gas security focuses on such technologies and products that are needed to protect the existing and future infrastructure. Few of the unconventional technologies mapped in this report include over & under water surveillance, long range sonar and radar systems and video surveillance using thermal cameras. Oil & gas pipeline security and the transportation security are required to ensure the smooth operation of energy industry, and are expected to drive the oil & gas market. This report focuses on the protective measures and solutions that need to be taken to protect the energy providers and resources against the threats such as attacks on supply infrastructure, accidents, natural and unnatural disasters and rising terrorism and cyber attacks. It also provides insights into the various intelligent security solutions which enable the providers to integrates collect and analyze the network through the data generated by their Supervisory Control and Data Acquisition (SCADA) networks and grids. The report broadly comprises of oil and gas security segments: physical security solutions, network security solutions; by types of applications: exploration and drilling, refining and storage and transportation, pipeline and distribution; […]

HID Global Sees Gradual Shift From Smart Cards to NFC

With NFC on access control, it will be able to drive to a level of critical acceptance Interviews | by Sharath Kumar BANGALORE, INDIA: We are about to embark on a new generation of access control technology in which mechanical keys – and even plastic smart cards – are either replaced – or at least, augmented — by digital keys and portable digital identity credentials that can be securely provisioned onto NFC-enabled smartphones and other mobile devices. In an interaction with CIOL, Ranjit Nambiar, director of sales, India and SAARC, HID Global shared insights on applications of NFC technology day-to-day businesses that are set to take off in India. Excerpts: CIOL: Can you share with us your journey from RFID cards to NFC Ranjit Nambiar: HID Global comes with an identity security background, which means, we are into the business of basically securing identities. Identities could be in any form. It could be in biometrics, access control, IT authentication, card control. If you look at the core of our technology, most of the solutions of what we have, Radio-frequency identification (RFID) is one of them. We extensively use RFID with respect to secure identity solution. We have other businesses also, which are non RFID centric. It’s a secure identity business with RFID as a core technology is what we use. We have come out with a new series of physical access control readers which are NFC enabled. The platform is called the ICLASS SE. ICLASS is a brand of […]

SmartMetric Biometric Activated ATM & Credit Card To Fight $8.6 Billion A Year In USA Card Fraud

SmartMetric, Inc. SmartMetric Biometric Card Solution Targets Fraudsters and Has Potential to Save Card Industry Billions per Year BAY HARBOR, FL–(Marketwired – Oct 25, 2013) – SmartMetric, Inc. ( OTCQB : SMME ) – Speaking today from the companies offices in Bay Harbor, SmartMetric™ Inc. President & CEO Chaya Hendrick said credit card industry figures show Card fraud costs the U.S. card payments industry an estimated US$8.6 billion per year*. Fraud comprises 0.4% of the US$2.1 trillion in total yearly U.S. card volume*. Using a person’s fingerprint to activate the “EMV” ATM or Credit Card will protect both financial institutions and card holders against significant fraud.  SmartMetric has developed a fingerprint reader that sits inside a person’s ATM or Credit Card. It is self powered allowing it to perform a fingerprint match while a person is standing at a retail checkout or on the street at an ATM. A person simply swipes their finger across the SmartMetric sensor on the surface of the card and the card’s internal computer processor performs a match with the person’s fingerprint that is pre-stored in the memory of the card itself. For added security a person’s fingerprint is always stored and encrypted inside the card and IS NOT stored on a bank’s computer. When a match occurs, the card’s EMV surface mounted chip is then turned on allowing a transaction at the millions of ATM and retail card machines around the world. Banks don’t have to retrofit existing retail ATM’s or POS retail card readers […]