network security alert (techvision)biomatiques iris recognition technology is capable of identifying...

15
Network Security Alert (TechVision) April 01, 2016 D983-TV Network Access Control Management: Monitoring Every Layer of the Enterprise Network

Upload: others

Post on 16-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

Network Security Alert

(TechVision)

April 01, 2016

D983-TV

Network Access Control Management: Monitoring Every

Layer of the Enterprise Network

Page 2: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

D983-TV 2

Table of Contents

Section Slide Number

Network Access Control Management—Overview and Trends 3

Access Control Management—Overview 4

Innovative Iris Recognition Technology for Critical Access Management 5

Wearable Vein Recognition-Based Biometric Authentication 6

NLP-Based Mobile Voice Biometric Authentication Solution 7

Context-aware Technology for Access Management 8

Web-based Access Control System 9

Mobile Access Control Application with Photo ID Badging Features 10

Hosted Electronic Access Control Platform for Businesses 11

Wide Scale and Flexible Access Control Infrastructure 12

Key Patents—World 13

Key Patents—United States 14

Industry Contacts 15

Page 3: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

D983-TV 3

Network Access Control Management—

Overview and Trends

Page 4: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

D983-TV

Access Control Management Systems—Overview

Access Control

Management

• Access management is the process of identification, authentication,

authorization, and administration of digital users. Access control management

systems are widely used by large businesses and enterprise organizations to

manage thousands of user identities. However, in recent years, information

technology (IT) mega trends such as mass smartphone adoption and cloud

services have changed how organizations manage identity and access

requirements.

• Changing IT practices create demand for new access control management

systems and generate opportunities for growth by innovative companies.

Key Benefits

Real-time Alarms

Remote

Management

Provide Audit

Trials

Easy

Integration

Controlled

Access

Access control management systems have evolved over the years

embracing emerging technologies to enhance their functionalities and

improve performance. There are several benefits offered by these

solutions. These are as follows:

• Remote Management: These solutions enable lock down of remote

devices to access corporate networks from remote computers. The

administrator could identify the system and deny access rights for

specific devices.

• Real-time Alarm: Access control solutions can send alarms to the

administrators automatically in case of any suspicious activities in

the network.

• Controlled Access: The network administrators are able to grant

access to limited sections of the enterprise network based on the

roles of the employees. This level of customization helps in efficient

management of the attack surface.

• Provide Audit Trial: In-depth report of the access history provides a

clear picture for the loop holes in the system.

• Easy Integration: Cloud computing has enabled easy integration of

these solutions into the corporate network irrespective of its size.

Page 5: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

D983-TV

BIOMATIQUES Iris Recognition Technology

Innovative Iris Recognition Technology for Critical Access Management Biomatiques Identification Solution Pvt. Ltd., India

Why do we need Iris Recognition Technology? Significance of digital identities is increasing, directly impacting the necessity of digital identity and access management technologies that can efficiently identify legitimate users to gain access to critical computing systems and applications.

Biometric technologies such as fingerprint scanning, facial recognition, and voice recognition are being widely used for access security. However, these technologies have limitations pertinent to reliability, accuracy, speed, and cost.

Sophisticated technologies such as vein recognition and body thermal heat mapping are expensive, even with high accuracy and reliability scores. The complexity in integrating these technologies for large-scale identity and access management applications is high.

Which technology can help??

The Biomatiques iris recognition technology offers best-in-

class identity and access management using contactless iris

scanning at an affordable cost of ownership.

Key

Technology

Capabilities

The capability of the Biomatiques iris recognition technology to enable highly accurate biometric recognition solutions at an affordable price will significantly impact every sector. Considering the growing global trend of digitization, the technology’s innovativeness will be a key contributor for accurate digital identity and access management with high adoption rates by 2016.

High

Interoperability High Accuracy Cost Efficiency

Key Benefits from Implementation

Short Term (1-2 Years)

Medium Term (3-4 years)

Long Term (>5 years)

Market Opportunity

High High

Our Thoughts

High

Biomatiques iris recognition technology is capable of identifying the unique

patterns present in the iris of human eye. The technology is empowered

by patented hardware and proprietary mathematical pattern recognition

algorithms that can distinctly identify more than 250 matching points such

as furrows, rings, and freckles within each iris.

The technology uses a small template for storing biometric data, which

allows to store a larger amount of reference data without incrementing

the database size. The availability of more reference data radically

enhances the technology’s reliability factor. The small template enables

lowering the technology cost due to lesser storage requirement.

Biomatiques iris recognition technology can track the iris from a distance of up

to 3 meters with optimum accuracy. This unique aspect of delivering

contactless identification directly impacts the life of the device and the

frequency of maintenance cost. Additionally, the technology is platform

agnostic and suitable to be integrated seamlessly with existing infrastructure.

Page 6: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

D983-TV

Biowatch

Wearable Vein Recognition-Based Biometric Authentication Biowatch, Switzerland

Why do we need Wearable Biometrics? Increase in connected devices’ network and digital identities has made it essential to use robust access management security technologies to prevent unauthorized access.

Considering the high number of contact points of authentication, using personal identification numbers (PIN), access cards, and so on, it is inconvenient for multiple authentication instances. Additionally, there is a high risk of abuse of these cards if stolen.

Biometrics are being used widely for increased touchless and convenient authentication. However, technologies such as fingerprint scanning, facial recognition, and voice recognition can easily be duplicated to create false identities.

Which solution can help??

Biowatch is an innovative wearable identification solution that

can be attached with a wristwatch's band. It can identify

individual users by detecting unique vein patterns of their

wrists and connect with devices and applications granting

access in real time.

Key

Technology

Capabilities

Considering the expected exponential growth of connected devices, and applications that will surge in near future, Biowatch seems to be a dependable solution for applications such as e-payments and mobile access. The convenience and speed of the solution to offer highly accurate biometric authentication will play a key role in driving its popularity by 2017.

Robust Encryption High Accuracy Real-Time

Authentication

Key Benefits from Implementation

Short Term (1-2 Years)

Medium Term (3-4 years)

Long Term (>5 years)

Market Opportunity

High High

Our Thoughts

Medium

The solution consists of a miniature camera that takes photos of an user’s

wrist veins and stores them as reference. The solution leverages

proprietary biometric classification algorithm to match the user’s identity.

The reference information is locally encrypted and stored for future use.

Once the watch is removed from the user’s wrist, identification data are

deactivated to prevent abuse.

The miniature camera is developed using extra-slim optics to make it

suitable to be seamless embedded into a wristwatch band. Based on the

Biometrics Evaluation and Testing (BEATS) platform, the vein recognition

algorithms are specifically developed to have high interoperability with

third party software and hardware environments.

Biowatch has seamless Bluetooth and near field communication (NFC)

connectivity to facilitate real-time communication with connected devices for

authentication. The information transmitted to devices and applications is

encrypted in real time and is secure from attacks such as man-in-the-middle.

Page 7: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

D983-TV

KIVOX Mobile 5.0

NLP-Based Mobile Voice Biometric Authentication Solution AGNITIO, Spain

Why do we need Mobile Voice Biometrics? Increasing usage of mobile phones for carrying out critical jobs such as banking, e-commerce, and so on, is driving the need for efficient mobile authentication technologies and solutions to secure users’ confidential information.

Traditional password-based security techniques are highly unreliable as they can be easily breached. Integration of fingerprint scanners into mobile devices radically increases the device cost making them unavailable for a wider market.

Voice biometrics, although evolved as a preferred and cost-efficient mode of mobile authentication, has limitations restricting wide scale adoption. Accuracy issues and vulnerability to spoofing are major concerns.

Which solution can help??

The KIVOX Mobile 5.0 is an innovative mobile voice

biometrics solution that can accurately identify users by

tracking their voice through normal speech.

Key

Technology

Capabilities

The KIVOX Mobile 5.0 solution, by virtue of its innovative anti-spoofing technology and proprietary NLP algorithms, has significantly enhanced the reliability of mobile voice biometrics. Considering the growing need for accurate and affordable mobile biometrics solutions to secure user data, the solution is expected to attract considerable interest by 2017.

High Accuracy Platform Agnostic On-device

Authentication

Key Benefits from Implementation

Short Term (1-2 Years)

Medium Term (3-4 years)

Long Term (>5 years)

Market Opportunity

High High

Our Thoughts

Medium

The solution is based on AGNITIO’s proprietary Voice ID technology that

leverages unique natural language processing (NLP) algorithms to identify

an user’s natural speech, rather than fixed phrases. Additionally, the

technology has innovative noise cancellation capabilities enabling

accurate identification even in noisy environments.

The solution is equipped with patented anti-spoofing voice biometrics

technology that is capable of detecting specific characteristics of an

user’s voice. This innovative feature allows the solution to distinguish

real voice from recorded voice and thereby prevents spoofing attacks

and frauds.

The KIVOX Mobile 5.0 solution has a significantly small device footprint and

can be seamlessly embedded on the device’s chipset. This negates the

requirement of external servers, thereby minimizing attack surfaces for scaled

attacks. On-device integration allows accurate authentication even without

network connectivity.

Page 8: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

D983-TV

Identity Authentication Services

Context-aware Technology for Access Management Finsphere, USA

Why do we need Context-aware Access Control Systems ? New age security threats that use advanced algorithms are efficiently neutralizing conventional access management systems. This results in loss of sensitive data for organizations.

It is necessary that the encryption algorithms and access management system imbibe learning and real-time adapting capabilities for efficiently mitigating access control threats.

Companies are looking for a solution, which can utilize new age technologies such as machine learning and context aware computing to perform real-time access control threat mitigation.

Which technology can help??

The finsphere identity authentication services offer an

innovative context-aware access management technology

that leverages advanced algorithms to control unauthorized

access to corporate assets.

Key

Technology

Capabilities

The adaptive access security systems are expected to be the future of BYOD (bring your own device) implementation. The use of context aware systems in BYOD organizations would help employees to access relevant data securely without any security breaches.

Mitigates Multi-

pronged Approach

Real-time Social

Behavior Analysis

Improved Security

of BYOD

Implementation

Key Benefits from Implementation

Short Term (1-2 Years)

Medium Term (3-4 years)

Long Term (>5 years)

Market Opportunity

High High

Our Thoughts

High

Access management system uses location awareness system as a

medium for authenticating various system accesses. This is possible by

utilizing electronic gadgets and mobile devices, which carry signatures as

authentication tokens. The location data in real-time enable organizations

to check the physical proximity of the device and grant permission to the

users if data match with the preset location database.

The finsphere solution also utilizes deep learning algorithms for

analyzing an user’s social behavior and uses that as identification for

authenticating an access request. This makes the solution more

adaptive to individual users and helps the system to control access

more accurately.

The use of cloud-based adaptive security systems is expected to help in

diffusing the security network to any number of devices. This helps to reduce

dependency on heavy infrastructure, which in turn enables high cost

efficiency.

Page 9: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

D983-TV

Honeywell, NetAXS®

Web-based Access Control System Honeywell International Inc., USA

Why do we need Access Control Portal? Conventional security system require access management software's to be installed on a dedicated PC post in order to monitor and store information. This method, which consumes time, requires the authorized personnel to travel from post to post just to monitor the premise..

Mostly, access control system runs as an application that is installed on PC. The software must be installed in order to be used. With the current technology development rate, access control systems should be more portable and user-friendly in order to promote efficient security services.

To acquire customized software's, clients are burdened by the staggering costs for software development. Stand-alone software's require highly skilled developers and large amounts of allocated time to complete the development process including beta testing and bug testing.

Which solution can help??

Honeywell, a conglomerate enterprise that manufactures a wide

collection of commercial and consumer commodities, and also is

involved in research and development of personal and machines

security.

Key

Technology

Capabilities

The NetAXS® Web-based access control system is developed with a

user-friendly landing page. The landing page contains functionalities that

require less than 30 minutes of training for end users to learn about

navigating the system. This page is accessible by authenticating into a

designated IP address Web page that will be connected to the system.

Being a key technology developing company, Honeywell has channelled efforts toward the revolution of current and future industries. Honeywel’s NetAXS Web-based access control system provides business and individuals a stable and user-friendly security service. This innovative system would impact the global market by 2017 due to the increased awareness and demand for security services.

Remove Unwanted

Data or

Applications

Mobile Security

Monitoring

Detailed Security

Analysis

Key Benefits from Implementation

Our Thoughts

Medium

Short Term (1-2 Years)

Medium Term (3-4 years)

Long Term (>5 years)

Market Opportunity

High High

Door access modes and options can differ according to each access card holder.

Customized preferences and different levels of access can be assigned to each

access card holder separately. Strict policies and scanning sequences can be

customized to fit clients’ business structure. For instance, by presenting his

access card twice, the supervisor can enable access for his team during a

specified time.

NetAXS is embedded with a dynamic screen update system that

refreshes data automatically. This intervention allows status updates

from NetAXS such as alarms, events, inputs, outputs, and status

screens to be loaded onto the landing page content area without any

user.

Page 10: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

D983-TV

IDenticard PremiSys

Mobile Access Control Application with Photo ID Badging Features IDenticard Systems, USA

Why do we need Mobile Access Control App? Access control systems often use conventional software to fully operate security features. These software are installed onto a dedicated machine that is not portable and cannot be accessed remotely, thus, increasing the importance of implementing mobile access control systems.

Access to doors, facilities, and labs are easy to duplicate and infiltrate. Security access to these facilities can be duplicated and shared among unauthorized members. Intellectual property is at huge risk if infiltration is successful.

With many security providers in the market, many security solutions are based on preconfigured settings that can be used for monitoring but cannot provide full length security assurance. This may cause redundant installations and migrations that may not benefit the organization. Which solution can help??

IDenticard (PA, USA) manufactures and markets various

identification and safety measures to provide security for people

and buildings.

Key

Technology

Capabilities

The PremiSys™ Mobile App enables administrators to manage various

security activities and tasks remotely, including locking down doors or even

acknowledging alarms. A Dynamic Mapping application is also built into the

application in order to provide exact location of doors and alarms.

Also implemented into the application is the Video Management System that

provides flexible and robust access controls followed by video surveillance

solution. The system displays multiple live feeds and recorded videos

simultaneously when acknowledging a single or multiple alarms.

Access Control systems are gaining client awareness in the security industry because of its capabilities in providing panoramic vision of enterprise's physical environments. IDenticard has taken drastic measures to improve current access control systems with the development of PremiSys that increases efficiency in monitoring and threat detections for organizations globally. A great market impact is expected to be achieved by IDenticard in 2017.

Accurate Facial

Detection

Immediate Alarm

Response

Accurate Door

Threat Locator

Key Benefits from Implementation

Our Thoughts

Medium

Short Term (1-2 Years)

Medium Term (3-4 years)

Long Term (>5 years)

Market Opportunity

High High

IDenticard's Cardholder Management Module is integrated in the

PremiSys application to provide a personalised identification badging

system (primarily for security professionals). This module provides

customizable badge designs, screen designs, and database fields along

with Photo Recall system that instantly identifies cards with their

cardholders while being activated or used by a mobile application.

Page 11: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

D983-TV

Protection1 Access Control Security Solutions

Hosted Electronic Access Control Platform for Businesses Protection1 Security Solutions, USA

Why do we need Electronic Access Control Platform? Organizations using old security systems often face malicious threats and increased risk of duplication and infiltration in their environment. Biometric card readers, RFID card systems, and other security materials can be duplicated and shared among unwanted parties.

Regular access control systems that are installed onto dedicated machines lack effective control methods such as providing safeguard services or countermeasures to avoid, reduce, or counteract security threats.

For an organization, information that is scattered and not evaluated is considered wastage of data. However, implementation of electronic access control system can help provide detailed reports using scattered data such as a detailed audit trail report that lets the organization know its personnel’s net utilization and productivity. Which solution can help??

Protection1 is a premier security service provider that

concentrates on providing benchmark level security options and

support for their personal and business clients.

Key

Technology

Capabilities

This security platform is integrated with Brivo, Winpack, and ProWatch

systems combined with special IP-enabled controllers that allow

complete system and network environment management using a

dedicated web portal from one or several different locations.

With the rising needs of security platforms for precaution and prevention of intrusions, Protection1 has developed a sophisticated Access Control System that will impact an organization, institution or business expenses and staff productivity tremendously. The accuracy of providing seamless security will be a key role in driving this platforms popularity by 2018.

In-depth Access

Analytics

Unified Access

Control

Threat Detection

and Response

Key Benefits from Implementation

Our Thoughts

Medium

Embedded with the Visitor Management System, Protection1 also provides

restrictions to connectivity and access within an organization by identifying

unwanted logins from visitors, volunteers, and vendors. These identified logins

are then compared across federal and state crime databases to avoid issues.

The platform also consists of a Web-hosted access control system that

allows administrators or an authorized individual to administer or view

any activity of any kind of format including videos from any device or

machine that is connected to the Internet. The administrator will also be

given authority to administer access control permissions, add/remove

access cards and produce standard reports.

Short Term (1-2 Years)

Medium Term (3-4 years)

Long Term (>5 years)

Market Opportunity

High High

Page 12: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

D983-TV

PCSC Security, LiNC-XS™

Wide Scale and Flexible Access Control Infrastructure PCSC Security, USA

Why do we need Wide Scale Access Control Infrastructure?

In order to provide security for large premises such as multi-tenant office buildings, universities, hospitals and manufacturing factories, advanced technical experts are required to install the system and the cost would be high.

Conventional access control systems suffer from lack of flexibility and control over a particular facility's security infrastructure. This is because they use dedicated PC posts in large facilities, and the person in charge would need to travel a distance to reach the monitoring post.

Common access control systems are not capable to provide users with management options such as cardholder management, analysing reports, receiving alerts from the system, and time & attendance collection. These options are important to provide accurate security analysis and services.

Which solution can help??

PCSC is a company that designs and manufactures high-end access

control solutions. With products ranging from high-end hardware to

sophisticated access control management software, PCSC has been a

prominent participant in the security industry.

PCSC Security has shown immense growth and efficiency in its services and product development. The LiNC-XS™ platform displays many features that would provide complete security monitoring and evaluation for large scale environments. Due to this, and due to the growing need for security systems, the LiNC-XS platform will find wide adoption by 2017.

Large Scale

Adoption

Complete Access

Control

Lower Cost for

Implementation

Key Benefits from Implementation

Our Thoughts

Medium

Short Term (1-2 Years)

Medium Term (3-4 years)

Long Term (>5 years)

Market Opportunity

High High

Key

Technology

Capabilities

The LiNC-XS™ platform uses a 128-bit data encryption security protection

between software modules that contribute to seamless integration of intruder

detection, video surveillance with saved backup, photo for identification

badging, smart cards, and biometrics.

The platform provides many features such as Two Person Minimum Occupancy

Rule (TPMOR), Elevator Cab Control (development stage), Operator Solicited

Open Door, password control functions for each level and also user defined input

or output polarity sensors.

The platform is integrated with PCSC Intellectual Property technology

such as Fault Tolerant (enables an operating system to continue

operating if there were one or more faults within some of it's

components) and IQ Series Controllers (allows migration between other

brand access control systems into a single platform).

Page 13: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

13 D983-TV

Key Patents—World

No. Patent No. Publication Date Title Assignee

1 WO2015128128A1 2015-09-03 Method for storing biometric access data for a

computer system, computer system, and data

memory

Fujitsu Technology Solutions

Intellectual Property Gmbh

The invention relates to a method for storing biometric access data for a computer system (10) having biometric access control. The method

comprises the following steps: recording biometric access data; checking if biometric access data are stored and associated with a user profile

after biometric access data have been recorded; recording and examining non-biometric access data of the user profile if the check was

negative; and storing the recorded biometric access data for the user profile. The invention further relates to a computer system (10) and to a

data memory.

2 WO2015121001A1 2015-08-20 Wireless interaction with access control devices Assa Abloy Ab

A user of a mobile communication apparatus (160) seeks permission to operate an access control device (110) by placing an active mobile

power source unit (150), which is controlled by the mobile communication apparatus (160), within an operation range of a wireless power

transmission interface (116) in the access control device (110). In response thereto, a wireless power transfer link is established between the

mobile power source unit (150) and the access control device (110). Thereafter, a wireless communication link (WL2) is established between the

mobile communication apparatus (160) and the access control device (110). Data are then exchanged between the access control device (110)

and the mobile communication apparatus (160) over the wireless communication link (WL2). The exchanged data pertain to at least one access-

related service implementable via the access control device (110); and provided that the user is authorized, the requested services are effected.

Page 14: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

14 D983-TV

Key Patents—United States

No. Patent No. Publication Date Title Assignee

1 US20150215232A1

2015-07-30 Method for updating message filter rules of a

network access control unit of an industrial

communication network address management unit,

and converter unit

Siemens AG

Method and system of updating message filter rules of a network access control unit of an industrial communication network. At least one

address-based message filter rule is assigned to the first communication device. The first communication device is replaced with the second

communication device, and the second communication device is registered in the address management unit in response to the replacement of

the first communication device with the second communication device. Upon determining that a communication device with an identical

communication device description is already registered, the address management unit transmits a change message to the network access

control unit or to the converter unit. The communication network address of the first communication device is replaced with the communication

network address of the second communication device based on the at least one address-based message filter rule.

2 US20150381661A1 2015-12-31 Method of managing access control in a cloud network Orange

A method which makes it possible to manage access control between a first entity and a second entity belonging to two security domains in a

cloud network is disclosed. In one aspect the method comprises, if the entities belong to security domains implementing different access control

policies, determining whether there exists a first access control rule between the first entity and a virtual entity within the security domain of the

first entity, and a second access control second rule between the second entity and the virtual entity within the security domain of the second

entity. If so, the method may comprise controlling access between the first and second entities as a function of the first and second rules.

Page 15: Network Security Alert (TechVision)Biomatiques iris recognition technology is capable of identifying the unique patterns present in the iris of human eye. The technology is empowered

15 D983-TV

Industry Contacts

Mas Kosaka, President and CEO, PCSC Security, 541 Challenger St, Torrance, CA 90503. Phone: +1-310-303-3600 E-mail: [email protected] URL: http://www.pcscsecurity.com/

Matthias Vanoni, CEO, Biowatch, Rue Marconi, 19, 1920 Martigny, Switzerland. Phone: +41-76-240-90-29 E-mail: [email protected] URL: www.biowatch.ch

Emilio Martinez, CEO, AGNITIO S.L. , Gran Vía 39 - Planta 8, 28013 Madrid, Spain. Phone: +34-91-512-24-17 E-mail: [email protected] URL: www.agnitio-corp.com

Vikas Chadha, Managing Director – India, Honeywell Automation India Ltd., 56 & 57, Hadapsar Industrial Estate, Hadapsar, Pune 411 013. Phone: +91-20-66039400 E-mail: [email protected] URL: http://www.honeywell.com/

Jamie Rosand Haenggi, Chief Marketing & Customer Experience Officer, Protection1, 800 E Waterman St, Wichita, KS 67202-4730 Phone: 877-776-1911 E-mail: [email protected] URL: http://www.protection1.com/

Steve Anderson, SVP, Finsphere, 11747 NE 1st Street, Suite 330, Bellevue, WA 98005. Phone: 425-679-5700. E-mail: [email protected] URL: www.finsphere.com

Aaron Henderson, Security Software Product Manager, Identicard, 25 Race Ave, Lancaster, PA 17603. Phone: 1‐800‐233‐0298; Ext. 338. E-mail: [email protected] URL: http://www.identicard.com/

Pratik Patel, Vice-President, Global Systems Integration, Biomatiques Identification Solution Pvt. Ltd., 1, "Rishi House", Near ICICI Bank, Kargil Chowk, Piplod, Dumas Road, Surat - 395 007, Gujarat, India. Phone: +91-261-2225767. E-mail: [email protected]. URL: www.biomatiques.com