Blog Archives

Over 30,000 healthcare providers will gather at the HIMSS 2015 event in Chicago over the next few days.   They will be scouring over the hundreds of products and solutions all promising to deliver some tangible benefit to the provider, patient or organization.  How many companies will be championing the Big Three; workflow, security and compliance? When the federal government decided to mandate the use of electronic health records, they created an entire ecosystem of EMR / EHR service providers.  There’s …

Privacy versus Anonymity – The Price you Pay

Protecting one’s privacy is a concern for everyone.  Yet in today’s environment of mobile devices and 24/7 electronic communication it’s virtually impossible to not feel exposed and somewhat vulnerable to the potential of someone or something compromising your privacy. There was a record 13.1 Million victims of identity theft in 2013 (Up 26.1% from 2012). That’s a new victim every two seconds. Our society requires that we share our personal information with others and we do so every time we …

Does Apple or FIDO care about a Trusted Source?

How does Apple or FIDO know you are the person that is authorized to access that phone? Or, how does the 3rd party applications (apps) that are accessed through the phone know you are the person authorized to have access? The fingerprint sensor? Well, what if that mobile fingerprint authentication capability isn’t very accurate? What if it’s spoofable because the technology doesn’t use enough data to authenticate the user with a high degree of assurance?  Given both Apple and Samsung’s …

Apple’s Announcement Validates BIO-key’s Mobile Strategy, but Disappoints in Terms of Leadership

With a little time to contemplate Tuesday’s announcement of Apple’s iPhone 5S, featuring a fingerprint scanner as the central new innovation in their flagship device, it is clear that Apple has given BIO-key two wonderful gifts: 1) validation of our patient belief that mobile devices are, in and of themselves, the “killer app” for fingerprint biometrics, and 2) always on, cloud-connected end user touch-points with integrated fingerprint scanners – lots and lots of them! Finally, the world will understand “first hand” fingerprint authentication’s value proposition, thanks to …

The Evolution of Fingerprints from the Device to The Cloud

Central to any Privilege Entitlement Access Control negotiation is the concept of “risk”.  The level of potential risk to the asset or service determines the required level of security, including strong user authentication, before access is granted.  Further, the binary decision to deploy strong authentication, including biometrics, is also risk based and, specifically economic risk-based, which can also be viewed as economic feasibility.  Stakeholders won’t deploy it if they lose money at it. The reason industry stakeholders and technology leaders …