Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:00 PM
Dark Reading
Dark Reading
Products and Releases

Biometric Leader Helping Develop Contactless Fingerprint Tech for U.S. Government

NEW YORK, NY – February 16, 2016 – Hoyos Labs, Inc., the global leader in biometric authentication, today announces a partnership with the National Institute of Standards and Technology (NIST) to develop new methodologies for measuring the image fidelity of contactless fingerprint capture devices, to support evaluation of these devices for future inclusion on the U.S. government’s Certified Product Lists.

From local police stations to government agencies, today’s law enforcement organizations utilize fingerprinting for a variety of screening and identification purposes. The most commonly used scanning devices digitally capture a fingerprint pressed on a glass surface with live-scan technology.

However, the disadvantages to this process include added time – particularly when capturing rolled prints – as well as hygienic concerns. Law enforcement officials are now exploring contactless fingerprint readers as a more effective and efficient alternative.

Following up on earlier programs of the Department of Homeland Security (DHS) and National Institute of Justice (NIJ) to evaluate contactless fingerprint capture technology, NIST – under sponsorship of the Federal Bureau of Investigation’s (FBI) Biometric Center of Excellence – initiated its Contactless Fingerprint Capture Device Measurement Research Program. The NIST program requires direct interaction with emerging technologies to address the following industry challenges: data format standards and best practices, development of methods for certification testing, as well as interoperability assessment with legacy contact-based devices.

Through a Cooperative Research and Development Agreement (CRADA) with NIST, Hoyos Labs has offered up the company’s touchless mobile biometric application, called 4F, for blind pilot testing. Hoyos Labs joins NIST’s other CRADA partners, including 3M Company and MorphoTrack, in contributing its touchless fingerprint acquisition technology to ensure the performance metrics emerging from the collaboration will be suitable for a broad range of devices.

“Our participation in NIST’s research program is mutually beneficial,” said Hector Hoyos, founder and CEO of Hoyos Labs. “Not only are we playing a critical role in building a worldwide standard for testing contactless fingerprint scanners, but NIST researchers are also providing us with new scenarios that we have been previously unable to test using human subjects – to help us better understand any limitations to our product and make the necessary improvements.”

Hoyos Labs’ 4F identification technology simultaneously captures all four fingerprints by leveraging high-resolution camera capability and flash lighting mode on modern smartphones. Hoyos Labs conducted tests in accordance with the FBI’s 2D image quality standards, which demonstrated 4F is capable of producing images that exhibit outstanding geometric fidelity, sharpness, detail rendition and grayscale dynamic range with low noise characteristics.

4F eliminates many of the distorting variables present with today’s hardware scanners, such as elastic deformation when pressing a finger on the scanner surface, and delivers a biometric template that is a precise copy of the captured finger impression. For the protection sector, in particular, 4F presents law enforcement agents with the opportunity to cross-reference an individual’s fingerprints against existing federal databases and confirm a person’s identity within minutes.

Under the CRADA, results of the program’s tests will be shared with Hoyos Labs scientists to be considered in future 4F technology research and development.

For more information on Hoyos Labs and its portfolio of biometric authentication solutions, please visit: http://www.hoyoslabs.com/


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-23
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse...
PUBLISHED: 2021-04-23
Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after t...
PUBLISHED: 2021-04-23
Overly relaxed configuration of frontend resources server in Vaadin Designer versions 4.3.0 through 4.6.3 allows remote attackers to access project sources via crafted HTTP request.
PUBLISHED: 2021-04-23
Wowza Streaming Engine through 4.8.5 (in a default installation) has cleartext passwords stored in the conf/admin.password file. A regular local user is able to read usernames and passwords.
PUBLISHED: 2021-04-23
Wowza Streaming Engine through 4.8.5 (in a default installation) has incorrect file permissions of configuration files in the conf/ directory. A regular local user is able to read and write to all the configuration files, e.g., modify the application server configuration.