SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Microcap & Penny Stocks : Saflink Corp. (ESAF) Biometric Software Provider -- Ignore unavailable to you. Want to Upgrade?


To: art slott who wrote (4229)1/27/1999 9:21:00 PM
From: bob jordan  Respond to of 4676
 
Art,

How much credibility do you assign to that post on Yahoo? Is there any reason to believe this person or the other person (if indeed they are two people and not just one man with two handles) and the assertion about Gateway in general?

Also, I got this blurb:

January 21, 1999

Stamford, CT. - The Gartner Group, Inc. in its annual report published in the Business Technology Journal, once
again identified biometrics as one of the top ten technologies to watch in 1999. The report states that "...Government
agencies and financial services firms will be the leading adopters of biometrics in the next two years." The report also
recognizes that Speech Recognition will be integrated into healthcare, telecommunications and financial services
applications over the next two years.

Sunrise, FL - Sense Technologies Inc., manufacturer and distributor of biometric employee control and
identification equipment, announced that it had been acquired by Century Silver Mines of Idaho.

I wonder what would compliment the Speech Recognition products that are going to be sold... Biometrics being primarily a government thing over the next two years? Maybe. Maybe not.

Regards,
Bob



To: art slott who wrote (4229)1/27/1999 11:43:00 PM
From: bob jordan  Read Replies (2) | Respond to of 4676
 
Art and all:

I got this email and permission to post it:

To whom it may concern,

I was thinking of buying SAFtyLatch for my computer, but I have a few questions I was hoping you could answer. First of all, is just
voice ID used, or can I use fingerprints and Face ID? Secondly, how
secure are these technologies? Could a tape-recording of my voice
suffice to defeat SAFtyLatch? What about a picture of me with face ID (assuming I have a compatible camera)?

Moving on to your other offerings, specifically your web based biometric identification software, how safe is that from being compromised? Is the biometric scan encrypted? Can the biometric scans be fooled (i.e. tape recording)? Finally, how accurate is voice identification as compared to the other forms of biometric identification, and why is SAFtyLatch available with voice and not, say fingerprint ID?


Dear Sir,

Thank you for your inquiry about our SAFtyLatch Data Security for Windows product. The product is also available to corporate purchasers with either fingerprint, voice, or facial image biometric technologies. SAFtyLatch is designed to be compliant with the Human Authentication API specification standard, just as our other network security products are. This provides inherent flexibility to interchange multiple biometric technologies to meet the varying requirements of the enterprise. For the mass distribution market, we have chosen to package our standard product in a retail box with voice authentication technology (and a microphone) to appeal to a broader audience. This provides a low-cost way to experience our products without the user making an additional investment in video camera or fingerprint sensor peripheral devices.

Regarding your question whether a tape recording of your voice would suffice to defeat SAFtyLatch, the answer is that it is theoretically possible but very difficult to achieve. Such a recording would have to be of sufficient fidelity and close proximity to the speaker to be impractical for most clandestine scenarios that we can visualize. A portable tape recorder hidden near to your desktop computer would not likely produce a recording of sufficient quality to defeat the matching algorithm which uses a range of measurements of the speech utterance. When compared to simple passwords that are often written down or which are easy to guess or hack, the improvement in security and privacy is substantial. In addition, the user has the option to change their pass phrase at any time. Also, in the example of a stolen laptop computer, there would be no possibility that the thief would have access to the recorded speech utterance.

You also asked about a picture of a face being able to defeat the facial image recognition algorithm. The technology that we use uses motion video to create a stereoscopic composite of the image from an average of three images. A two- dimensional photo placed in front of the camera should not meet the requirements of the algorithm. Notice that I am careful to avoid saying that it could never happen, just that it is considered to be highly unlikely, according to our facial image technology partner, Visionics, Inc. It is probably fair to say that no information security component (encryption, firewall, intrusion detection, biometrics, etc.) is totally protected from a determined hacker. However, biometrics provides a significantly higher degree of difficulty to info-crooks attempting to gain access to a computer or network when compared to simple passwords.

Regarding our Web-based products (as well as our other network security products) all message traffic between the client and the server is encrypted to prevent interception of biometric data being passed over the network. Regarding the question about accuracy, each biometric technology has its unique set of considerations that can effect accuracy. In a normal environment with a cooperating user, any high quality biometric technology should perform quite well. However, voice technology can be affected by high background noise situations (like in a factory) and face can be affected adversely by significant variations in the lighting. Likewise, the accuracy performance of fingerprint technology can be affected by skin problems, cuts and other injuries, or age. That is why it is important that a biometric solution provide the flexibility to integrate multiple biometric technologies. For example, scientists in a laboratory may not be permitted to use a fingerprint sensor since, by policy, they must wear latex gloves at all times. A user that is handicapped may use voice to control a computer (and also to authenticate). In a scenario where a user has multiple biometric characteristics enrolled in the system, it is possible to revert to a secondary biometric if a primary (normal) biometric fails or is unavailable for some reason. These considerations are all part of the implementation planning process that we go through with our customers. Our commitment to multi-biometric standards and our strategic relationship with a wide range of proven biometric technology suppliers, gives us our discriminator in the market for flexible and robust data security and network security solutions.

I hope that this information is useful to you, and I look forward to your becoming a satisfied user of SAFtyLatch.

Best regards,

Walter Hamilton
Director, Business Development
SAFLINK Corporation
2502 Rocky Point Dr., Suite 100
Tampa, Florida 33607

I know you are wondering. Yes, I ordered it.

Regards,
Bob