Security Market Segment LS
Wednesday, 25 March 2020 10:17

Firm develops single biometric credential for all access points

By
Firm develops single biometric credential for all access points Image by OpenClipart-Vectors from Pixabay

A Sydney-based biometric identity start-up has launched what it claims is a industry-first security solution that provides a unified biometric credential which can be used for authentication across all physical and digital access points.

Daltrey's solution creates a verified biometric credential which has been given the moniker DaltreyID. This process can be done by remote users or onsite with an operator.

Daltrey co-founder and managing director Blair Crawford told iTWire in response to queries that the solution could be deployed in the cloud or as a hybrid cloud deployment. "The access points can be mobile phone, laptops, dedicated biometric devices like fingerprint scanner or CCTV cameras for seamless access control using facial recognition," he added.

Crawford said depending on a site's security requirements, a defined level of confidence would need to be achieved before access was granted.

"One of the methods used to measure this confidence level is FAR (false accept rate) and each biometric modality has a different mathematical probability of false acceptance," he said. "This is driven by criteria including quality or biometric matching algorithm, quality of image capturing device, quality of biometric template and positive acceptance threshold.

"We also need to consider the environment for things like direct sunlight, lighting, heat, cold and humidity. When we talk about the application in this context we're referring to the access scenario - for example, access to a medication cabinet or access to a data centre terminal or access to your email via your mobile."

Regarding the single biometric parameter which could be used for this, Crawford said it was the unique parts of one's physical self. "With the DaltreyID you can turn up at an office and use your face to enter, or at a data centre you can use your finger, or in a Federal Government department you could use your eyes to access a secure room and then your face to access sensitive information on a workstation," he said.

"The idea is that a person can use either their voice, iris, face or fingers (known as biometric modalities) to access anything that they need to as part of their job. These modalities, along with other personal information, make up the DaltreyID."

Asked about the recent scandal around Clearview AI - Australian police were caught using a free trial version of the company's facial recognition technology - Crawford said Clearview AI had not obtained consent for what it was doing and there was a significant ethics and moral discussion to be had re: this situation/ use of data/privacy/ and so on.

"There is a huge difference between using biometric technology for identification purposes and using biometric technology for authentication purposes," Crawford said. "Daltrey is involved in the latter. Our business is about the protection and privacy of users and businesses. Consent is the fundamental first step of a person creating a DaltreyID for authentication purposes."

He said when consent was given, user acceptance was high. "I think we'd struggle to find a person that doesn't use face or fingerprint technology on their smartphones in many countries. Locally, we can also look at how widely opted into voice recognition was with the ATO.

"In all of that, it's critical that we discuss encryption, application security, infrastructure security in the context of ensuring personal information is safe and secure. However, I agree that because that data got hacked, it puts a spotlight on facial recognition but perhaps not for the right reason. I think I really interesting question to is to discuss how Clearview could do what they did and what enabled the police departments using it to do so in the first place."

An overview of the DaltreyID solution is here.

DIGITAL MARKETING HAS NO SOCIAL DISTANCING OR TRAVEL RESTRICTIONS

As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email andrew.matler@itwire.com

CONTACT US!

LAYER 1 ENCRIPTION A KEY TO CYBER-SECURITY SOLUTION

Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.

DOWNLOAD!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments