Finger On The Pulse Of Identity

6
LogError writes “The contours of the finger, the patterns of the iris and the shape of the hand can all be used to provide strong authentication, but are these – and other – biometric technologies sufficient to provide good security while also ensuring the privacy and trust of end users?”

Link: net-security.org

Category:

  • Security