Attacks/Breaches
12/6/2012
02:22 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Integrated Biometrics Introduces Sherlock Fingerprint Sensors

Company receives FBI certification

SPARTANBURG, S.C., Dec. 6, 2012 /PRNewswire/ -- Integrated Biometrics, LLC (IB) today announces another technological breakthrough with the FBI certification of its newest finger print technology. IB's development team created the new product using their patented Light Emitting Sensor (LES) technology along with a thin film transistor (TFT). LES technology utilizes a highly engineered charged polymer film interacting with the specific properties of human skin to luminesce fingerprint images. The TFT captures the image at the FBI's standard 500PPI requirement. The combination of LES Technology and the thin film transistor (TFT) enables size and weight reductions of up to 95% when compared to other products serving the same function.

(Photo: http://photos.prnewswire.com/prnh/20121206/CL23539 )

IB provides custom finger print sensors for markets requiring Appendix F or PIV071006 biometric solutions and unlike other commonly used fingerprint biometric technologies is able to achieve the highest quality of images without compromising device thickness and overall size. This unique capability has produced the world's first TFT based sensor to achieve the FBI's Appendix F Mobile ID certification.

The technologies are being used to produce the world's thinnest, smallest, and lightest Appendix F Mobile ID biometric sensors

About Integrated Biometrics Headquartered in Spartanburg, SC, Integrated Biometrics was founded in 2002 as an alternative solution to the commonly used optical and silicon technologies. Our stable and proven team, work with our patented technologies to create unique benefits and provide solutions that overcome the limitations of other biometric technologies. With facilities in South Korea and South Carolina, Integrated Biometrics continues to grow as a leading global provider of finger print biometric sensors.

"We provide leadership, enabling fingerprint capture technology in both standalone and embedded versions suitable for integration into our partners' solutions."

For more information: www.integratedbiometrics.com, toll free +888.840.8034, or Mike Grimes (864) 313.7111.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9209
Published: 2015-03-30
Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryTalk Services Platform before 2.71.00 and FactoryTalk View Studio 8.00.00 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.