Biometrically Secured Crypto Wallet Gets a UI Upgrade
Having been live in the App Store for only a few weeks, ZenGo has updated its eponymous cryptocurrency app. Most of the enhancements concern the app’s redesigned user interface, with […]
Having been live in the App Store for only a few weeks, ZenGo has updated its eponymous cryptocurrency app. Most of the enhancements concern the app’s redesigned user interface, with […]
“…FaceTec’s ZoOm is particularly notable for its highly advanced liveness detection capability, which can detect spoofing attempts aimed at mimicking valid user biometrics.” FaceTec has made one of the world’s […]
“The lion’s share of credit for this achievement goes to FaceTec, which provided the ZoOm authentication software used by ZenGo.” Toward the end of June, cryptocurrency wallet provider ZenGo challenged […]
ID R&D has announced a new biometric authentication system based on facial recognition that is entirely passive, requiring no special effort from the end user. Called IDLive Face, the solution […]
“…the subject of the testing was PalmID, Redrock’s Artificial Intelligence-powered software designed to leverage a high-resolution camera with an LED or flash light in order to take high-quality palm images […]
“HID Global’s multispectral imaging technology is designed to capture image data from both the surface of a fingerprint and its subsurface, helping it to detect presentation attacks that do no […]
“With this technology now integrated into one of the most popular and successful mobile onboarding and authentication solution on the market, client organizations and end users will have access to […]
iProov has more proof of its anti-spoofing capabilities. The company has announced that it has met the requirements for Level B ISO/IEC 30107-3 certification, which means that its facial verification […]
“It comprehensively lays out the growing proliferation of biometric security, the serious risks that presentation attacks pose, and the consequent importance of independent, accredited industry testing…” Toward the end of […]
“Phase 2 of Thor will see a higher concentration of software work, building upon the prototype scanners developed in Phase 1. The work includes developing PAD algorithms based on biometric […]
Follow Us