Cryptoplex Integrates FujitsuCryptoplex Integrates Fujitsu
Fujitsu MBF200 fingerprint touch sensor IC integrated with new Mobio handheld biometric device from Cryptolex Trust Systems
January 2, 2007
SUNNYVALE, Calif. -- Fujitsu Microelectronics America, Inc. (FMA), an industry leader in fingerprint sensor technology, today announced that its MBF200 single-touch sensor IC has been integrated into MobioR, a handheld biometric security device developed by Cryptolex Trust Systems, Inc.
Mobio is a universal ID that replaces passwords, tokens, cards and personal identification numbers (PINs), using biometrics and cryptography to convert individual fingerprints into dynamic numbers called Biocodes. A Biocode is built using algorithms that convert biometric data from an individual's fingerprint into a random number that can be securely transmitted over any network, even if the network itself is not secure.
Mobio is about the size of a typical pager and can be used for corporate employees or government agency personnel to verify their identities when accessing documents or files, or when entering a corporate facility. Mobio runs on Cryptolex's proprietary Universal ID System (u.ID*), which combines biometrics and cryptography to provide authentication for building and door access, network access and access to VPN and web applications. Only the fingerprints of a Mobio's owner, which are recorded using the MBF200 fingerprint sensor, can generate the user's biocodes. Lost or stolen Mobios cannot be unlocked or misused by anyone, so their owners are protected from identity theft and fraud.
"Choosing the right fingerprint sensor was critical to the development of Mobio. By working with Fujitsu, we were able to create a portable biometric device with the highest level of security, making identity verification a cost-effective and simplified process for customers, administrators and end users." said Clovis Najm, CEO and founder of Cryptolex Trust Systems.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware