Home » biometric control » Articoli recenti:

The new frontier of biometric access: the body odor

March 27, 2014 Biotechnology No Commenti
biom

The Universidad Politécnica de Madrid has added to the biometric recognition tools already on the market, another ingredient: the body odor. Identification parameter that, according to the researchers may soon be used for a reliable recognition through personal characteristics and biological properties. So we’ll be able to filter people based on the scent they emit.

The challenge is identify and isolate, in the safest way, the odorous signature that characterized each of us. In fact, it isn’t the single odor, but the pattern of odors that characterizes us in the course of life. This smell remains stable and it’s the unmistakable signature that tomorrow will help us to embark on an airplane or go into the bank. Today the control of our identity, in many airports or border crossings, is based on the physical resemblance to the picture of an identity card or a passport. Limit that can be easily crossed. In the future will be increasingly difficult to tamper the new electronic documents, the use of biometric techniques that do leverage on the physical characteristics of a person will increase the levels of safety. On the other hand from many years, the accesses through biometric recognition make the public and private places more confident, drastically raising the level of protection.

At the moment the rate of recognition of the new system is estimated around 85%, in addition the odor of the body can vary over time and the sensors available are not yet very precise. So the new technology isn’t comparable to the reliability of biometric systems as the most advanced iris scanning, the reading of the fingerprint or the facial recognition. We’ll have to wait a little longer to see electronic noses in the areas of access.

The new frontier of biometric controls: the voice

October 29, 2013 Biotechnology No Commenti
voicebiometric

It’s enough pronounce short and simple sentences to be identified uniquely by computer systems. It would seem this, the new generation of biometric recognizers (Voice Biometrics).The voice will replace, as the biometric accesses have done for the locks, pin and password for computers, smartphones and tablets, to make online purchases, enable home banking services and bookings. And also access to personal files, photos and movies stored on the cloud. In this way, there will be less anxiety for the chance to forget the numerical combination or to push the wrong button.

All this will be possible thanks to parameters such as frequency, timbre and extension; through them, the voice becomes an unique element that characterizes each person. Just like the fingerprints and the ocular identification systems through the iris. So, it will be able to bring down the costs for the enterprise control. To realize a voice recognition system is enough a microphone coupled to the software. With Voice Biometrics saying single words or phrases, even meaningless, the system knows the identity through a sophisticated algorithm that analyzes the voice.

According to a survey, many people are stressed by numerical combinations. Each person has about eleven username and password.The new solutions will become more and more as biometrics method of personal authentication, convenient and useful also to prevent fraud and counterfeiting.

From lithium to sugar: unveiled the future of batteries

October 30, 2012 Technology 5 Commenti
batteria-allo-zucchero

The study is gripping scientists from different years, replace the lithium batteries present in smartphones, laptops, tablets, and numerous electronic devices with sugar batteries. Just like that, it seems that the exposure to very high temperatures generates sugar anodes capable of storing energy for batteries. This would have the 20% more than electric storage capacity of the lithium ion. So there would be more duration and considerably lower costs. In addition, the lithium is a non-renewable mineral presents on Earth in very scarce quantity and therefore destined to finish in time. The lack of presence makes it expensive even though it’s harmful to both humans and the environment.

Together with the sugar, sodium may also be a viable alternative at a cost of advantage. To this is added the unlimited availability of the mineral.

In reality, the story of the sugar batteries is a kind of laboratory curiosity that, in recent years, it has enjoyed some fleeting moment of glory. Other hand never before have been achieved so promising results as those obtained by the Japanese giant, Sony, given that the prototypes of this kind previously made were able to produce an amount of energy too small to find a practical use.

If this is true, in a short everyday electronic devices could be powered by batteries economic and completely biodegradable and with environmental impact extremely content.

The researchers think to immetter this technology on the market within 5 years. In a perspective of technological innovation, which in recent times has seen the implementation in everyday life of advanced systems such as biometric access control or GPS tracking systems, batteries sugar could remedy to the increasingly frequent alarms of gradual exhaustion of fossil fuels and add an important element to the incessant search for alternative sources and renewable energy.

From Spain a system to fool biometric scanners.

July 31, 2012 Biotechnology No Commenti
iris scanner

Researchers at the Universidad Autónoma of Madrid and West Virginia University have discovered a way to mislead iris biometric scanners used for access control in certain places.

When security systems based on iris scan create an imprint of the iris itself, they do not store the image to compare it in future with the real iris each time a person try to enter the place put under control. They, in fact, transform the image into a code consisting of about 5000 bits of data. This code is usually based on approximately 240 points of the image and is unique. Each person has his owm and when someone stands in front of the scanner, the code given by his iris is compared with those in the database. If the system finds a correspondence, the door opens.

And what about if a hacker were to gain access to this database, could he somehow reconstruct through the code a sort of artificial iris able to fool the security system? Until recently, this was pure science fiction. Today, as shown by researchers of Madrid and West Virginia University, this is really possible, thanks to a genetic algorithm which allows to reconstruct, after about 200 attempts, the image of an iris very similar to the original one and able to enter in his place.

What was considered one of the safest security systems in the world, based on the uniqueness of each individual, today, thanks to this research, begins to show its weaknesses. And what about if these studies applied to the locks based on fingerprint scanners? Nevertheless, these biometric systems are still the most inaccessible…

Endoacustica Europe

Organized crime wants your personal data

July 28, 2010 Technology No Commenti

According to a report recently published by Verizon, approximately 85 per cent of thefts of personal data and unauthorized access to restricted information (out of which, 38 per cent is represented by theft of usernames and passwords) can be directly or indirectly linked to organized crime.

Always according to this report, more than 70 per cent of these thefts is perpetrated by outside parties, while 50 per cent of attempts comes from insiders, such as for example collaborators, staff members or business partners, or from an improper use of access credentials, which gave staff the opportunity to take a sneak peek where they should not.

If on one hand, external intrusions exploit weak spots in computer systems, which at times may happen to inadvertently leave a backdoor open, which can be accessed by a hacker, on the other hand inside attacks are a breach of the trust relationship between boss and employees, or between partners.

For this reason, it is absolutely vital to adopt an efficient access control system or procedure, which can unequivocally define who has the right to access to certain data or information, and who doesn’t. For example, still according to Verizon’s report, by adopting simple precautions it is possible to thwart up to 96 per cent of data theft or unauthorized access attempts.

These precautions may range from data protection via encryption and encoding at different levels according to the importance of the data stored, to physical measures to limit access to certain rooms in your workplace and allow only authorized people to get through.

For more information on how to maintain security and privacy of information in your office and workplace, and on several data protection options, we advise that you visit the Endoacustica website.

A fingerprint lock, and your office is secure

July 7, 2010 Technology No Commenti

Those who store sensitive data or highly confidential documentation in their office know well that, no matter how cautions you can be, during their absence this information is at risk, either because of curiosity or a simple carelessness, and might leak out.

Therefore, one should be equipped with a protection system that grants access to the room, and of course to the documents and information stored in there, only to selected and authorized personnel. To achieve this result, a normal key lock may not be enough, as even the key might get lost or stolen.

The wisest thing to do is using a 100% secure solution: a biometric fingerprint lock. Such a lock does not need keys which may get lost or end up in the wrong hands, since a key is not needed. All you need to do is run the fingertip of your forefinger and, if your fingerprint was previously stored and authorized, you will gain access to the restricted area.

It is possible to store up to 78 different fingerprints; to add a further layer of security, a PIN opening code can also be set up, to be entered once your fingerprint has been recognized.

Biometric protection is commonly used to protect sensitive areas, for example restricted rooms inside a military installation or a presidential building. Now, such a level of security is available for everyone, at a reasonable price, to protect your office, a place which maybe does not contain military secrets, but where it is certainly vital that confidential information stays confidential!

For more information on fingerprint locks, we recommend that you visit the Endoacustica website.

Calendar

October 2014
M T W T F S S
« Sep    
 12345
6789101112
13141516171819
20212223242526
2728293031  

NEWSLETTER

e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A SpyPhone or GSM Spy cellphone, is a normal mobile phone, where a software has been installed, which allows a third party to monitor the activities of the phone user. To avoid suspicions, a Spyphone must be given either as a present (for family members monitoring) or given as company equipment (for personnel monitoring).

 MICRO DIGITAL RECCORDER
digital video recorder Micro digital recorder with vocal activation have recording time of 1200 hours long. They went out from the big screen to enter by force in the life of every day, in the most diverse situations that until a few years ago even the vivid imagination of a writer of espionage could have imagined.
 WALL MICROPHONES
Wall microphones to listen through walls up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

mendicante-a-semaforo

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Sep 2013

etichettatag

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Jul 2013

furto-cellulare

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Jul 2013

Pipistrelli

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 May 2013

robot_fish

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Jan 2013

locata

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dec 2012

web-3-0

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Hop-595x363

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Oct 2012

ocearch-squali-gps

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Oct 2012

dominic_wilcox_sept_043

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …