Face Recognition Systems For Facility Access

Identity card issued by the employer is the typical mechanism to identify an employee. However, verifying each and every card presented by personnel requires a dedicated person or an automated system. Credentials, such as an identity card, are more effectively verified using an automated system. However, most of the verification systems are incapable of verifying if the person who presented the credential is actually its owner. Similar is the case where passwords or PINs are used as credentials.

Buddy punching, otherwise known as ghost punching or proxy punching, is an activity where tardy and absent employees will have their co-workers “punch” the time clock for them. This activity alone will significantly impact the profitability of a company that ends up paying wages of employees who never showed up for work. The company not only get ripped off, but the entire operation may be degraded by a shortage of personnel.

There is always a chance of sharing any type of information or material, which the employee is required to know or carry, granting unauthorized access to employer facilities. Use of biometrics will avoid such chances as the verification of the credential is what the employee is – not on what they know or have. Fingerprint, hand print, face, and eye are some of the popular biometrics used for personnel identification.

Continue reading “Face Recognition Systems For Facility Access”

Fraud Using Facebook

Facebook Logo via Wikipedia

Ever found your bank statements on Facebook? How about your health records and business plans? That’s what happened to a friend-of-friend of mine. My friend found her friend’s family pictures, health records, business plans and bank statements on Facebook.

The friend-of-friend engaged me to help her out from this as she had no clue how all these information ended up on a Facebook wall. Apparently the friend-of-friend is a business woman and a millionaire who travels a lot to Asian countries such as Malaysia, Singapore and India.

She recently had to undergo a brain surgery in India for which a lot of information was exchanged to her doctors and friends via Gmail. Information includes her health records and bank statements from Canada. She also used this account to exchange business plans with her partners as well as family pictures with her friends.

Continue reading “Fraud Using Facebook”

Risk Based Authentication

The technique that uses both contextual and historical user information along with data supplied during an internet transaction to assess the probability of whether a user interaction is authentic or not is called risk based authentication.

Traditional username and password along with information such as who the user is, from where the user is logging in (IP address and information of the location from where the user is actually in at the time of transaction), velocity of the transaction (the process of verifying if its possible for a person who recently logged in from location 1 could login from location 2) and the type of device the user is using are considered as contextual information.

Continue reading “Risk Based Authentication”