Categories

Body field communication
Can you imagine locking or unlocking a door simply by touching the doorknob? Or being able print a document by placing one hand on the copy machine and …
Ironing out the NFC wrinkles
Near Field Communication (NFC) could soon become a part of most people's lives, but it's not there yet. Although Peter Preuss, Chairman of the NFC Forum …
Protecting the privacy of others
With every action you take in our wired world, whether making an Internet purchase or posting a blog, you leave a digital footprint, a record of who you …
Access control and video surveillance unite
While access control and alarm systems have been common features with most companies for a long time, video surveillance has often proved too costly to …
Unleash the power
New technologies have emerged that can power up security systems without wires or batteries. Solar, wireless power transmission and energy harvesting solutions …
Extending ethernet capabilities
Hailed as a watershed innovation when first standardized in 2003, Power over Ethernet (PoE) offers a way of supplying electricity to network devices over …
Anything to declare?
The main impulse for e-passports is security. As the British passport authority says on its website: “The increasing threat of identity fraud means …
A familiar voice
With all types of biometric applications on the rise, voice-based authentication is one approach that seems to engender less resistance among users than …
Watch your (digital) step!
Maybe you cover your PIN number when you enter it into an ATM. Perhaps you change and strengthen your computer passwords often. You may even refrain from …
Fraud fighters
Seven percent of GDP was lost to fraud in 2008, according to the US Association of Certified Fraud Examiners. That's $994 billion a year. But new technology …
Never forget a face
In early 2008, the media picked up on research results coming from Glasgow University that had huge implications for controlling access in all sorts of …
No limits for intelligent readers
Card readers were once highly proprietary and difficult to install, and they mainly served the single purpose of granting access to a building or a section …
Bridging two worlds
Previously, the physical and virtual worlds couldn’t be further apart when it came to security. You entered a building using a physical token like …