<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[SVORT - Medium]]></title>
        <description><![CDATA[The neural-biometrics access management system - Medium]]></description>
        <link>https://medium.com/svort?source=rss----f56a5a327b6b---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>SVORT - Medium</title>
            <link>https://medium.com/svort?source=rss----f56a5a327b6b---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Mon, 06 Apr 2026 08:13:23 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/svort" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Pulsation for liveness detection]]></title>
            <link>https://medium.com/svort/pulsation-for-liveness-detection-c3244b3529cb?source=rss----f56a5a327b6b---4</link>
            <guid isPermaLink="false">https://medium.com/p/c3244b3529cb</guid>
            <category><![CDATA[security-services]]></category>
            <category><![CDATA[authentication]]></category>
            <category><![CDATA[biometrics]]></category>
            <category><![CDATA[neural-networks]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Kristina Margulec]]></dc:creator>
            <pubDate>Mon, 04 May 2020 19:33:34 GMT</pubDate>
            <atom:updated>2020-05-04T19:33:33.851Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*5CWQ0OG9wuPHZOgbDIOWKA.png" /></figure><h4>Check how we use some skin properties combined with cutting-edge technologies to enhance the way Svort recognizes users.</h4><p>While attackers invent new ways to trick defense systems, on the other side we roll with their punches. There are many kinds of spoofing attacks but have you ever heard that your skin can reduce the probability of a successful attack to zero? This article explains how and why the skin can act as the liveness marker.</p><h4>What is pulsation in terms of biometrics?</h4><p>First of all, let’s define the term “pulsation”. By using this word we do not refer to heart rate and ways to track it. This authentication method would not withstand the slightest criticism.</p><p>The term “pulsation” designates the human skin’s ability to reflect light. When there is a constant source of light, the skin reflects it evenly. But if the light flashes and goes out then, this spark is reflected by the skin also as a flash.</p><blockquote><em>Repulses obtained differ depending on the skin&#39;s individual features and the flash color. This is because the skin is penetrated by the thinnest vessels filled with blood. The blood of a living person pulsates due to a heartbeat. It is this pulsation of blood that allows the reflection of even slightest changes in skin color highlighted by a flash. Humans can’t see these changes, but a camera will pick it up.</em></blockquote><h4>Here is how it works:</h4><ul><li>Svort analyzes some face parameters and then highlights an object on a user’s face. Any part of the face (the nose, eyebrows, eye, cheeks, etc.) can act as an object.</li><li>The parameters obtained during the flash outbreak are compared with the initial parameters obtained before the flash.</li><li>At the same time camera detects whether the image is three-dimensional.</li></ul><p>Three-dimensional volume and relevant pulsation parameters indicate that the person in front of the camera is alive. That is how Svort performs liveness detection through pulsation.</p><h4>Why is it safe?</h4><p>The method is combined and consists of 2 parts: obtaining and comparing parameters before and during a flash and detection of three-dimensional volume. But there are also trained neural networks that enhance security.</p><p>For granting access, it is not enough just to obtain and compare face parameters. It is also important to reflect the individual characteristics of every user’s skin, its texture, and reactions to flashing light. This is possible due to neural networks trained to catch patterns of how users’ skin reacts on pulsation.</p><p>Altogether these components allow Svort to accurately detect liveliness. It sounds simple but actually we’ve done a tremendous amount of work to make the process of liveness detection through pulsation precise and smooth. The matter at hand is the synthesizing and collecting the huge dataset needed for neural networks deep learning. But for enthusiasts like us, nothing is impossible so we coped, and now everything works as it was expected to work.</p><p>If it looks like what you’ve been looking for, drop us a line on founders@svort.io, and let’s stay in touch: <a href="https://www.linkedin.com/company/svort/"><strong>LinkedIn</strong></a><strong>, </strong><a href="https://www.facebook.com/pg/svort.me/"><strong>Facebook</strong></a><strong>, </strong><a href="https://twitter.com/svort_me"><strong>Twitter</strong></a><strong>, </strong><a href="https://svort.me/"><strong>Website</strong></a>. We are ready to discuss the technology and answer the questions.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c3244b3529cb" width="1" height="1" alt=""><hr><p><a href="https://medium.com/svort/pulsation-for-liveness-detection-c3244b3529cb">Pulsation for liveness detection</a> was originally published in <a href="https://medium.com/svort">SVORT</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Smart and secure travel: how and why apply facial biometrics in airports]]></title>
            <link>https://medium.com/svort/smart-and-secure-travel-how-and-why-apply-facial-biometrics-in-airports-7e1cec19dd89?source=rss----f56a5a327b6b---4</link>
            <guid isPermaLink="false">https://medium.com/p/7e1cec19dd89</guid>
            <category><![CDATA[neural-networks]]></category>
            <category><![CDATA[identity-management]]></category>
            <category><![CDATA[biometrics]]></category>
            <dc:creator><![CDATA[Kristina Margulec]]></dc:creator>
            <pubDate>Tue, 21 Apr 2020 21:07:51 GMT</pubDate>
            <atom:updated>2020-04-22T09:27:07.032Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*kg-95tSATuDj-T9O0j1byA.png" /></figure><p>Before the pandemic destroyed our way of life, <a href="https://airport-world.com/global-passenger-traffic-continues-to-rise/">global passenger traffic used to rise</a> and force air transport hubs to invent new methods aimed to increase airport capacity. One of such methods is to replace passport and boarding pass by biometrics at all the journey stages from check-in to boarding. This article covers using biometrics for passenger verification &amp; identification within transport hubs and explains its benefits.</p><h4>How do biometrics identification &amp; verification work?</h4><p>Biometrics identification is the process of recognizing a person through the facial image. It is advantageous to both users and businesses as using biometrics cuts hardware expenses, reduces the time of customer service, prevents fraud, automates business processes and increases profit.</p><p>The main purpose of biometrics verification is to make sure that the human in front of a camera is the very that person he pretends to be. So the first step of this process is to compare a passengers’ passport with his image which can be done at the reception during self-check-in. Meanwhile, Svort neural network learns to recognize this particular passenger and transfers his biometrics data to all other touchpoints. Since this moment all the passenger needs for passing the journey steps is his face.</p><p>It is possible due to a particular neural network algorithm combined with infallible liveness detection that determines whether it interacts with a human being and prevents spoofing attacks employing photo, video, or mask. Although our liveness detection tests excellent we reiterate that its efficiency also depends on hardware characteristics like computer or webcam specifics, depth sensors in the camera, etc.</p><h4>What are the benefits of Svort biometrics and what tasks does it resolve?</h4><p>Unlike existing systems with one or several standards, Svort basically has no standards/references (photos or other human-interpretable data on face parameters). Svort is the 3D reconstruction of the user’s face, which is irreversible, non-human interpretable, and anonymous. It also recognizes passengers in the most precise manner even from those angles where current systems are experiencing difficulties.</p><p>No sensitive data like facial images are stored or transferred. Svort stores and transfers only neural networks that are trained to recognize passengers. These networks are depersonalized and anonymous as they do not contain any data on passengers and it is impossible to clarify some person’s face features (like eyes color, face geometry, etc.) using it. Such data can be transferred to any transport hub as it does not contradict GDPR.</p><p>Svort is not just a biometric identification system, but also the liveness detection that mitigates face-spoofing and is able to take advantage of cameras capable of constructing depth maps. Yet, Svort can with the same effect perform all its functions using GB/smartphone/notebook/etc. cameras. Svort does not have strong requirements for hardware and can be scaled horizontally if necessary to increase productivity. It is backward compatible with installed systems of both video surveillance and access control.</p><blockquote>Svort<em> is faster, more reliable, and safer than other biometrics solutions with facial recognition. Neither sunglasses, beards, and makeup nor face masks would not significantly impede its functions.</em></blockquote><h3>How Svort neural-biometric verification and identification work</h3><p>Biometrics verification can be integrated at all steps where using a passport or boarding pass is supposed: check-in desks, bag drop units, gates, boarding, etc. The main idea is to replace documents with passenger’s face once his identity was verified. Facial biometrics can also enable airports to create lists of suspicious people or criminals and swap these lists to all transport hubs. Let’s clarify in detail how exactly neural-biometrics identification occurs.</p><h4>Online neural-biometric registration for a flight</h4><p>Actually, such registration can be used for everything that implies buying and checking tickets. After completing registration (on the website or in the application) a client is offered to pass neural-biometrics registration.</p><ul><li>A user needs to provide his ID and complete the registration process on his smartphone. For this purpose, he will be offered to pass a rotational challenge. He will also have to escape a virtual maze to confirm liveness.</li><li>During the rotational challenge, the camera scans the passenger’s face comparing the image with the photo in ID, building its 3D face model, and training neural networks to recognize this passenger.</li></ul><p>This action can be performed as a one-time registration or issuing a kind of biometrics ID. During these processes, Svort extracts some non-human interpretable vectors. Using a neural network, Svort converts these vectors into a biometric key realizing the concept “You Are The Key”.</p><p>Actually the key is a neural network that is trained to recognize a particular user. It is irreversible that makes it similar to password hashes. This allows to store and transfer it according to the same requirements as exist for hashes. Note that the neural network is neither a reference image nor other data that would provide specific characteristics of a registered user’s face.</p><p>After the neural network is saved in storage, it can be used for subsequent identification, authentication, and verification of a previously registered user.</p><h4>Offline neural-biometric registration for a flight</h4><p>For offline registration, a passenger uses a terminal or camera at registration desks in the airport instead of their own device. There are two ways of biometrics registration at the airport.</p><ol><li>The video stream is continuously transmitted to a data center where it is processed. It creates a significant load on the network.</li><li>In the case of local processing, already trained neural networks or biometric vectors are transferred from the terminal or the camera at the registration desk to the data center. It significantly (up to 99%) reduces traffic and load on the network.</li></ol><p>One more peculiarity of offline registration is that using public terminals instead of personal devices leads to either queues or low quality of biometrics registration. The way out is the dynamic registration, that completes neural network training. Dynamic registration collects missed biometrics data while a passenger moves through the airport until the neural network won’t be trained to recognize this passenger (or until another trigger emerges).</p><p>In summary, Svort biometric solution can:</p><ul><li>improve analytics of passenger traffic and customer service;</li><li>help monitor overburdened areas within transport hub and reorganize its work;</li><li>enable airports to make personalized offers to passengers in duty-free stores and service desks;</li><li>increase the safety of air travel with the support of international crime control organizations (like INTERPOL, Europol, etc.) by comparing passengers with the databases of these organizations, identifying unwanted persons, and sending notifications to the staff.</li></ul><p>Although air carriers are currently experiencing challenging times due to the pandemic, after everything is over and the borders open, airports will experience even greater load. That is, they will have to adapt, but increasing bandwidth will not be enough. The touch-free trend is gaining momentum and public places are already starting to implement the technology to protect people from diseases spreading through human-to-surface contacts. <a href="https://medium.com/svort/touch-free-not-a-trend-but-market-disruptor-8f95a1c88100">Here</a> you can learn more about how Svort implements touch-free technology.</p><p>Svort is faster, more reliable, and safer than other biometrics solutions. We are open to discussion, collaboration, and new opportunities.</p><p><strong>Let’s stay in touch: </strong><a href="https://www.linkedin.com/company/svort/"><strong>LinkedIn</strong></a><strong>, </strong><a href="https://www.facebook.com/pg/svort.me/"><strong>Facebook</strong></a><strong>, </strong><a href="https://twitter.com/svort_me"><strong>Twitter</strong></a><strong>, </strong><a href="https://svort.io/"><strong>Website</strong></a><strong>.</strong></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7e1cec19dd89" width="1" height="1" alt=""><hr><p><a href="https://medium.com/svort/smart-and-secure-travel-how-and-why-apply-facial-biometrics-in-airports-7e1cec19dd89">Smart and secure travel: how and why apply facial biometrics in airports</a> was originally published in <a href="https://medium.com/svort">SVORT</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Touch-free: not a trend but market disruptor]]></title>
            <link>https://medium.com/svort/touch-free-not-a-trend-but-market-disruptor-8f95a1c88100?source=rss----f56a5a327b6b---4</link>
            <guid isPermaLink="false">https://medium.com/p/8f95a1c88100</guid>
            <category><![CDATA[facial-recognition]]></category>
            <category><![CDATA[biometrics]]></category>
            <category><![CDATA[identity-management]]></category>
            <category><![CDATA[authentication]]></category>
            <dc:creator><![CDATA[Kristina Margulec]]></dc:creator>
            <pubDate>Fri, 17 Apr 2020 21:28:09 GMT</pubDate>
            <atom:updated>2020-04-17T21:27:42.351Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*yhh76g5_XDIZcendgvgd8w.png" /></figure><p>Epidemics trigger the world’s response no less than wars impacting and changing people’s ways of life. It was outbreaks of different diseases that taught humanity to wash hands, clean foods thoroughly, and deal with pests in the yards. Now it is time to get used to cover our mouths when sneezing or coughing, stop touching faces and implement touch-free technologies wherever it is possible to protect people from touching dirty surfaces.</p><p><a href="https://www.cdc.gov/coronavirus/2019-ncov/need-extra-precautions/what-you-can-do.html?CDC_AA_refVal=https%3A%2F%2Fwww.cdc.gov%2Fcoronavirus%2F2019-ncov%2Fneed-extra-precautions%2Fget-ready.html">CDC recommends</a> us to stay at home, wash our hands, and disinfect surfaces thoroughly. Pandemic will stop sooner or later but humanity will never be the same again. The new habits like sanitizing hands and avoiding touching surfaces in public places will remain with us for the rest of our lives. That is why those who are able to provide their customers with touch-free experience will succeed. Implementation of contactless interactions and interfaces is a trend that gaining momentum right now, so enterprises will have to adapt or lose customers and reputation.</p><h4>Where touch-free technology can be implemented?</h4><p>It can be used literally in any process that implies the user’s authentication or identification. The idea is to replace traditional meanings of performing some actions to touch-free technology without touching surfaces. For example, open doors, check out at the counter, confirm the identity, etc.</p><p>Why humanity will apply touch-free technologies widely? Actually, there are just 2 reasons: it is convenient and it is safe. Pandemic has exposed deficiencies of the existing tools. Imagine how many people have already touched a fingerprint scanner by the moment you need to place your thumb on it? It has never been safe but in the circumstances of the global pandemic, it is even less safe than ever. Replacing outdated methods of getting access like traditional keys, cards, documents, and passes with users’ faces opens new vistas in terms of usability and user-friendliness.</p><h4>How does Svort perform touch-free within access management?</h4><p>Svort combines biometrics, neural network, and liveness detection to provide users with touch-free access to their offices, homes, premises, buildings, and workstations. It can be used for payment, identity confirmation, getting access, verification, registration, and whatever else. All necessary hardware is a system of video surveillance or even a single camera. Svort scans the user’s face then recognizes its biometric features and therefore performs the action needed.</p><p>Note that there are no special requirements for cameras so Svort can be integrated into any existing video security system. It is possible due to its flexibility and the certain algorithms of users’ recognition that identify people by some biometrics features of their faces and grants users access in less than a second.</p><ul><li>Imagine that you do not need to bring with you documents as your face is the only ID card you need.</li><li>You also will not have to use card keys to get access to office as Svort integrated into the existing security system will recognize and grant you access even before you get your card key out of the bag.</li><li>And you won’t even have to use Apple Pay or Samsung Pay to check out at the counter as your face can serve as a credit card.</li></ul><p>There are many ways to implement Svort to provide your clients and employees with passwordless and touch-free access to whatever. If you want to know more check <a href="https://medium.com/svort/neural-biometrics-access-management-system-the-new-age-of-one-notable-technology-267d6e1c04ce">this article, </a>it covers in detail how exactly Svort performs users’ recognition and why it is safe and fast. And <a href="https://medium.com/svort/svort-vs-coronavirus-can-protection-from-covid-19-impede-neural-biometrics-a3cf7ce04ca0">this one</a> demonstrates that Svort successfully recognizes even half-covered faces what is especially important now when we all have to protect ourselves with masks.</p><p>Now it is pretty clear that we’d better avoid touching surfaces in public places to prevent disease spreading through human-to-surface contacts. Facial recognition technology makes it possible, but how to implement it in places like airports that need to perform huge bandwidth? The trick is that a correctly selected tool will not only not slow down the established processes, but also accelerate them along with improving people’s safety. Stay in touch, we will soon tell you how to use Svort to identify and verify passengers at airports to improve services, optimize processes and increase aviation safety.</p><p>If you want to know more on how Svort can perform the touch-free trend within authentication and identification solutions, please drop us a line on founders@svort.io. Take care now and let’s stay in touch: <a href="https://www.linkedin.com/company/svort/"><strong>LinkedIn</strong></a><strong>, </strong><a href="https://www.facebook.com/pg/svort.me/"><strong>Facebook</strong></a><strong>, </strong><a href="https://twitter.com/svort_me"><strong>Twitter</strong></a><strong>, </strong><a href="https://svort.me/"><strong>Website</strong></a><strong>.</strong></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8f95a1c88100" width="1" height="1" alt=""><hr><p><a href="https://medium.com/svort/touch-free-not-a-trend-but-market-disruptor-8f95a1c88100">Touch-free: not a trend but market disruptor</a> was originally published in <a href="https://medium.com/svort">SVORT</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Virtual maze for liveness detection]]></title>
            <link>https://medium.com/svort/virtual-maze-for-liveness-detection-770a0ad091bb?source=rss----f56a5a327b6b---4</link>
            <guid isPermaLink="false">https://medium.com/p/770a0ad091bb</guid>
            <category><![CDATA[access-control]]></category>
            <category><![CDATA[data-privacy]]></category>
            <category><![CDATA[biometrics]]></category>
            <category><![CDATA[identity-theft]]></category>
            <category><![CDATA[identity-management]]></category>
            <dc:creator><![CDATA[Kristina Margulec]]></dc:creator>
            <pubDate>Mon, 13 Apr 2020 20:27:14 GMT</pubDate>
            <atom:updated>2020-04-13T20:26:54.240Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*QuiGIRLnWZ44M5RZNueXYQ.png" /></figure><h4>Learn how Svort Liveness Detection prevents identity farming</h4><p>The environment is rapidly changing, and here at Svort, we’re making progress too. We continuously improve our technologies to meet the security requirements and offer our customers the most advanced solutions.</p><p>Infallible liveness detection is one of our core features that was created to provide users with the full anonymity, and user-friendly interface is our priority along with unprecedented safety. That is why we use virtual maze for liveness detection. This article explains how we perform this process and what makes it anonymous and accurate.</p><h4>What is a virtual maze?</h4><p>It is a kind of rotational challenge that allows Svort to recognize whether is it a live person in front of a camera. A user is supposed to turn his head in certain directions escaping the virtual maze. At the same time, Svort scans the user’s face and then grants or prohibits access according to the results. I.e. virtual maze is used to both authenticate the user and detect his liveness. It is convenient due to using a single action instead of separate steps for authentication and liveness detection.</p><h4>How does it work?</h4><p>During registration, a user has to turn his head in different directions. At this moment certain parameters of his face are scanned at different angles. Then our networks recreate a three-dimensional model of the face and learn to authenticate the user. And when the training is completed, the neural network is able to recognize whether it is a live person in front of the camera. I.e. after the registration and training the neural network detects liveness without the necessity to store sensitive users’ data.</p><h4>Why is it secure?</h4><p>We needed to make our liveness detection system secure and resistant to spoofing attacks. But we also did not want to overload it with some time-consuming details as passing the system was supposed to be simple or even enjoyable. That is how we decided to implement it in the form of a virtual maze. It is easy to use and hard to be evaded.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*QuiGIRLnWZ44M5RZNueXYQ.png" /></figure><p>To complicate spoofing attacks, we make our maze unpredictable. I.e. a user never knows what action he is supposed to perform next time to escape it as the number of maze escape options reaches 127 132 672 867 200. Using face-tracking systems reduces the probability of successful photo or video spoofing attack almost to nothing as for hacking such a system in its most simple kind intruders have to possess billions of photos and videos of the user’s face taken in different conditions.</p><p>All of the above resulted in the convenient, precise and user-friendly liveness detection method. Yet we know that there are things to be improved so we are working hard to make the technology impeccable. If you want to know more about Svort Liveness Detection, please drop us a line on founders@svort.io. And let’s stay in touch: <a href="https://www.linkedin.com/company/svort/"><strong>LinkedIn</strong></a><strong>, </strong><a href="https://www.facebook.com/pg/svort.me/"><strong>Facebook</strong></a><strong>, </strong><a href="https://twitter.com/svort_me"><strong>Twitter</strong></a><strong>, </strong><a href="https://svort.me/"><strong>Website</strong></a><strong>.</strong></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=770a0ad091bb" width="1" height="1" alt=""><hr><p><a href="https://medium.com/svort/virtual-maze-for-liveness-detection-770a0ad091bb">Virtual maze for liveness detection</a> was originally published in <a href="https://medium.com/svort">SVORT</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Facial Biometrics In The Banking Industry]]></title>
            <link>https://medium.com/svort/facial-biometrics-in-the-banking-industry-f9aaeed23466?source=rss----f56a5a327b6b---4</link>
            <guid isPermaLink="false">https://medium.com/p/f9aaeed23466</guid>
            <category><![CDATA[banking]]></category>
            <category><![CDATA[data-security]]></category>
            <category><![CDATA[facial-recognition]]></category>
            <category><![CDATA[identity-management]]></category>
            <category><![CDATA[biometrics]]></category>
            <dc:creator><![CDATA[Kristina Margulec]]></dc:creator>
            <pubDate>Tue, 17 Mar 2020 18:15:30 GMT</pubDate>
            <atom:updated>2020-03-17T18:15:02.509Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*g1AGxMltiFrf9xDqTfSqJg.png" /></figure><h4>Password replaced with face and using banking services without visiting the bank: how Svort takes our interactions with financial institutions to a new level.</h4><p>Biometrics continues conquering the world helping businesses improve their services along with saving money. So it’s reasonable that financial institutions become to integrate the technology into their services. Read on to learn how users’ faces replace passwords and IDs, why it is good and how exactly biometrics will hold money in our accounts.</p><h4>4 key benefits of using neural-biometrics</h4><p>When it comes to using technology in the banking sector, it’s all about striking a balance between convenience and security. Facial biometrics is the precisely right solution to meet both requirements. It is convenient for banks and their customers for the following reasons:</p><ul><li>It is generally dependent on a single action of biometric scanning, rather than having to input a long and complex password (it really has to be long and complex to be safe).</li><li>Forging biometric features is much harder and expensive than other fraud methods. By the way, forging someone’s face is not enough as hackers also have to override anti-spoofing systems that reduce the likelihood of success.</li><li>Facial biometrics improves service and reduces the time spent on it. It also increases the accessibility of banking services by making all interactions remote.</li><li>Integration facial biometrics does not imply extra spendings on hardware because usual cameras in branches can be used as well as clients’ smartphones.</li></ul><p>Using facial biometrics in financial institutions is not only convenient but safe as well. Read on to learn, why the client’s face protects bank account better than the most complex password.</p><h4>How facial biometrics combats fraud</h4><p>The most important feature of using facial biometrics is increasing the security level. People lose billions of dollars because of stolen passwords and identity frauds. And here is when facial biometrics comes in.</p><ul><li>It replaces passwords with the user’s face making the loss impossible.</li><li>It prevents identity fraud due to liveness detection.</li><li>It also impedes the creation of fake accounts and drawing credit using someone else’s document.</li><li>It protects banks from insider fraud by establishing secure employee authentication.</li></ul><p>If you’d like to know more on neural-biometrics reliability check <a href="https://medium.com/svort/neural-biometrics-access-management-system-the-new-age-of-one-notable-technology-267d6e1c04ce">this article </a>to clarify the core features of Svort and its principal advantages in comparison with other solutions.</p><h3>4 ways to employ facial biometrics in the banking sector</h3><p>There are many ways neural-biometrics can be used in banking opening new vistas for the industry, let’s address the principal ones.</p><h4>Remote verification</h4><p>Verification is the process of recognizing whether a person is really that one he/she pretends to be. It is essential for the banking sector due to being included in many processes:</p><ul><li>opening an account in a bank;</li><li>drawing a credit;</li><li>withdrawals;</li><li>other financial activities; etc.</li></ul><p>Until recently people have to be physically present in a bank branch and bring their passports or other documents to be verified. With the advent of facial biometrics, verification became more convenient and simple. Now to be verified a user just has to possess a smartphone with a camera. <a href="https://medium.com/svort/using-svort-for-verification-7d58af66277b">Here</a> you can know more on how Svort remote verification works.</p><p>Employing remote verification comes in handy not only for routine operations but also reduces frauds of the bank’s manager and client collusion to draw credit using someone else’s document. The document’s owner is protected reliably as he is the only person who is able to pass verification to perform some action that implies confirming identity. It is possible due to the liveness detection system that prevents spoofing attacks employing photos, videos, and masks. <a href="https://medium.com/svort/neural-biometrics-access-management-system-the-new-age-of-one-notable-technology-267d6e1c04ce">Here</a> you can learn in detail how liveness detection performs.</p><h4>Passwordless access</h4><p>Svort neural-biometrics provides both customers and employees with passwordless access to the bank’s application and internal services. Using a password is not secure enough as <a href="https://medium.com/svort/billions-of-passwords-are-exposed-online-check-if-yours-were-compromised-5cdcd7f8185d">billions of them are already exposed online</a> and leaks won’t stop. Replacing traditional authentication methods with passwordless access through biometrics significantly increases data security as forging an identity for passing Svort is highly unlikely. No stranger would get access to private data even if he possesses the password as he is also required to pass the liveness detection challenge along with using biometrics. Here it is a detailed explanation on <a href="https://medium.com/svort/using-svort-for-authentication-bcc1b1dbaaa9">how passwordless access within authentication works</a>.</p><h4>Multi-factor authentication</h4><p>MFA has become routine in enterprises since the importance of cybersecurity architecture had been recognized. Now there are 2 ways to employ MFA: to use U2F tokens or one-time codes (OTPs). The first is inconvenient and the second is insecure, so there is the raising need in a multi-factor authentication method that is both convenient and reliable.</p><p>Using biometric authentication as the additional security factor essentially reduces the probability of successful hacking accounts due to the multi-layered protection. Firstly hackers have to compromise the password, then to obtain biometric data, and finally to pass authentication with this biometric data that is impossible due to the liveness detection system. This multi-layered structure is impenetrable and impassable for perpetrators.</p><p>Another feature of biometrics within MFA is the absence of a database that can be useful for hackers. No sensitive data like facial images are stored or transferred. Only neural networks trained to recognize users are stored and processed on the customer’s servers. These networks are depersonalized and anonymous as they do not contain any data on users. So even if a bank’s cybersecurity architecture is hacked such networks won’t come in handy for hackers as it is impossible to clarify some person’s face features (like eyes color, face geometry, etc.) using it.</p><h4>You Are The Key, of a face instead of all other means of access</h4><p>The integration of Svort neural-biometrics into existing security infrastructure means replacing keys, cards, and all other means of access by face. Employees can get safe access to their workspaces and internal services, and customers can be authenticated in the bank’s application, request for a loan and perform all types of operations remotely.</p><p>Even bankcards can be removed since the face is the only needed tool to get withdrawal in ATM or pay at counters. Another exciting thing on employing biometrics is that it does not require special hardware. Regular video surveillance systems can be used along with webcams on desktops or smartphones equipped with a camera.</p><p>Biometrics relieves the burden on bank branches, speeds up the time of customer service along with increasing their loyalty and cut expenses through optimization of internal business processes, let alone significantly increasing the security. Drop us a line to clarify what value Svort can place to your business.</p><p><strong>Stay in touch with us: </strong><a href="https://www.linkedin.com/company/svort/"><strong>LinkedIn</strong></a><strong>, </strong><a href="https://www.facebook.com/pg/svort.me/"><strong>Facebook</strong></a><strong>, </strong><a href="https://twitter.com/svort_me"><strong>Twitter</strong></a><strong>, </strong><a href="https://svort.me/"><strong>Website</strong></a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f9aaeed23466" width="1" height="1" alt=""><hr><p><a href="https://medium.com/svort/facial-biometrics-in-the-banking-industry-f9aaeed23466">Facial Biometrics In The Banking Industry</a> was originally published in <a href="https://medium.com/svort">SVORT</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[SVORT vs. Coronavirus: can protection from COVID-19 impede neural-biometrics?]]></title>
            <link>https://medium.com/svort/svort-vs-coronavirus-can-protection-from-covid-19-impede-neural-biometrics-a3cf7ce04ca0?source=rss----f56a5a327b6b---4</link>
            <guid isPermaLink="false">https://medium.com/p/a3cf7ce04ca0</guid>
            <category><![CDATA[biometrics]]></category>
            <category><![CDATA[facial-recognition]]></category>
            <category><![CDATA[neural-networks]]></category>
            <category><![CDATA[health]]></category>
            <dc:creator><![CDATA[Kristina Margulec]]></dc:creator>
            <pubDate>Thu, 12 Mar 2020 14:51:02 GMT</pubDate>
            <atom:updated>2020-03-12T14:13:27.208Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*PiaGalkHxpdpivQGTv0LLg.png" /></figure><p>There are currently <a href="https://www.worldometers.info/coronavirus/">129,589 confirmed cases</a> of the coronavirus as of March 12, 2020. For thousands of people, the epidemic means altering their behavior by wearing masks to protect themselves. Some of them complain, that their <a href="https://www.insider.com/facial-recognition-tech-isnt-working-for-those-wearing-face-masks-2020-2">devices’ facial recognition doesn’t work</a> properly because of the half-covered face. Others are dissatisfied with facial recognition software that is used at some train stations, airports, retail stores, and hotels that become annoying and inconvenient because of face-mask wearing.</p><p>Does it mean the universality of biometrics is in doubt? Actually, it just brings to light imperfections of the existing solutions. While other providers of biometric identification attempt to fix their software and increase its accuracy, SVORT is not much concerned as it recognizes users in masks exactly in the same way as without them. The details are covered below, but first, take a look at these pictures. Spoiler: neither hat nor mask impedes the accuracy of SVORT as it still recognizes the user.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/931/1*sf_SlGH37sYrCqTje5XBOg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/931/1*zLi8rt43QgkMbUzxKphRyQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/931/1*0O1nOk_3y2G49jLN5ditOQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/931/1*pyiz4rQVyVVQztMw4qz_iA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/932/1*tIkFdMoJGzY55xbRHs4s-w.png" /></figure><p>To conduct neural-biometric matching we take two images. The first is a standard that is available from previous registration, ID, internal database, etc. The second image is taken in real-time when a user performs biometric identification and deleted immediately after extracting biometric vectors. SVORT compares biometric vectors from both images and indicates (the number in the middle) how similar are people on the left and right.</p><h4>What makes SVORT non-sensitive to wearing face masks?</h4><p>The core lies in the approach to recognition. SVORT does not rely on facial images but builds a 3D model and extracts biometric vectors that are responsible for recognition. That is how it goes:</p><ul><li>During the user’s registration, SVORT takes 40+ photos at certain angles.</li><li>Biometrics vectors are extracted.</li><li>Neural networks are trained to recognize the user.</li></ul><p>By ‘biometrics vectors’ we mean a non-human interpretable identifier that has the biggest possible <em>cosine similarity</em>* for one person and the biggest inequality for different persons. And this poses SVORT’s unique ability to identify people wearing face masks.</p><p><em>*Cosine similarity is a measure of similarity between two non-zero vectors of an inner product space that measures the cosine of the angle between them (source: </em><a href="https://en.wikipedia.org/wiki/Cosine_similarity"><em>Wikipedia</em></a><em>).</em></p><blockquote><em>Do not be defensive about the pictures above, they were taken to demonstrate SVORT’s accuracy when user’s face is half-covered. Note that we do not take photos and there is no sensitive data like facial images stored or transferred. SVORT enables clients to store and transfer only neural networks that are trained to recognize users. These networks are depersonalized and anonymous as they do not contain any data on users and it is impossible to clarify some person’s face features (like eyes color, face geometry, etc.) using it.</em></blockquote><h4>Conclusion</h4><p>Some argue that the coronavirus epidemic will lead to a massive technology rollback and will return humanity if not to the Stone Age then at least to the use of a fingerprint. Here in SVORT, we think that COVID-19 will open up new opportunities for truly working solutions and give a boost to new players in the biometrics market if old ones are failing. If you are interested in testing our neural-biometrics, leave your request <a href="https://svort.me/">here</a>.</p><p><strong>Stay in touch with us: </strong><a href="https://www.linkedin.com/company/svort/"><strong>LinkedIn</strong></a><strong>, </strong><a href="https://www.facebook.com/pg/svort.me/"><strong>Facebook</strong></a><strong>, </strong><a href="https://twitter.com/svort_me"><strong>Twitter</strong></a><strong>, </strong><a href="https://svort.me/"><strong>Website</strong></a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a3cf7ce04ca0" width="1" height="1" alt=""><hr><p><a href="https://medium.com/svort/svort-vs-coronavirus-can-protection-from-covid-19-impede-neural-biometrics-a3cf7ce04ca0">SVORT vs. Coronavirus: can protection from COVID-19 impede neural-biometrics?</a> was originally published in <a href="https://medium.com/svort">SVORT</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[How biometrics modifies retail and impacts customer service]]></title>
            <link>https://medium.com/svort/how-biometrics-modifies-retail-and-impacts-customer-service-86012c1acacd?source=rss----f56a5a327b6b---4</link>
            <guid isPermaLink="false">https://medium.com/p/86012c1acacd</guid>
            <category><![CDATA[technology-trends]]></category>
            <category><![CDATA[biometrics]]></category>
            <category><![CDATA[retail]]></category>
            <category><![CDATA[customer-service]]></category>
            <category><![CDATA[data]]></category>
            <dc:creator><![CDATA[Kristina Margulec]]></dc:creator>
            <pubDate>Tue, 25 Feb 2020 06:46:55 GMT</pubDate>
            <atom:updated>2020-02-25T06:44:39.126Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*lAxNfONOaljwobTWU3vTig.png" /></figure><p>The power of data in the retail context cannot be overemphasized. Such information on customers like purchase history, behavioral patterns in stores, their preferences, and the ways they move through stores enables retailers to adopt balanced decisions that improve customer loyalty and increase revenue.</p><p>The use of biometrics is gaining popularity in retail. Businesses implement the technology to identify customers providing them with personal communication during shopping. There are plenty of ways to employ the technology of customer identification in the retail industry, but this text is dedicated to facial biometrics as it becomes the most demanded among retailers and convenient for consumers. Read on to learn why to employ biometrics in retail, how does it impact customer service, and what are its benefits for businesses.</p><h4>How does facial biometrics recognition work and what benefits are there for retailers &amp; consumers?</h4><p>It is the method of identification of people through some special features of their faces features like textures and shapes. That is possible due to artificial intelligence and special neural network algorithms. The camera captures a customer’s image, compares it with the database, and then identifies him. All you need is cameras and integrated software solution yet there are some requirements on hardware features that depends on every particular case.</p><p>Biometrics in retail tackles the following challenges:</p><ul><li>customer identification;</li><li>counting visitors traffic;</li><li>tracking consumers’ behavior and the ways they move through stores;</li><li>the shopping histories;</li><li>loyalty cards replacement;</li><li>improving customer service and increasing engagement by providing them with personalized offers and discounts based on their preferences;</li><li>cutting costs and automation;</li><li>data collection and analysis.</li></ul><p>All the aforementioned solutions can be successfully resolved with a scope of separate tools. But the competition between retailers has reached an impressive scale so to win it they have to invent new approaches and modernize &amp; automatize current business solutions. Biometrics has become a safe and proven tool providing retailers with an easy win across improving customer services. It enables business to:</p><ul><li>cut expenses on the scope of marketing tools by replacing them;</li><li>increase consumers’ engagement making them return so it increases revenue;</li><li>make ads targeting more precise and effective that also leads to cutting expenses and increasing revenue;</li><li>improve shelf spaces and plan procurement thoroughly on the basis of consumers behavior and preferences;</li><li>reduce losses caused by shoplifters and prevent employees theft;</li><li>enable business owners to control employees eliminating time and attendance fraud and making workforce management processes transparent at all stages;</li><li>access the quality of service provided by employees;</li><li>protect storage facilities and staff entrances from outsiders;</li><li>reduce operational cost as it replaces all kinds of traditional keys, loyalty cards and passwords.</li></ul><h4>Notable cases of biometric facial recognition</h4><p>It is always hard and risky to be a pioneer in implementing new technology. Fortunately, we do not have to learn on our own mistakes as gigantic players have already tried the technology for us and demonstrated its efficiency clearly. Here is a list of the companies that had already implied biometrics and not going to stop:</p><ul><li>A chain of luxury department stores Saks Fifth Avenue has been using facial recognition since 2016 to identify VIPs and capture shoplifters.</li><li>Mastercard introduced selfie pay that enables customers to verify online payments by looking at their smartphone cameras.</li><li>KFC China uses biometrics facial recognition to identify customers and predict their orders. The predictions are based on a customer’s gender, age, and mood.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*R_5W8Dah9vfEqEIY.png" /><figcaption>Photo credit: The Verge</figcaption></figure><ul><li>South Korea uses AI and facial recognition to help enterprises interview and hire people.</li><li>South Korea also identifies people in front of kiosks to provide them with personalized, interactive advertisements for restaurants and stores.</li><li>American airports use biometrics to screen passengers on international flights.</li><li>The US government is using facial recognition technology to surveil Americans (here is an interesting article that covers <a href="https://www.vox.com/recode/2019/7/18/20698307/facial-recognition-technology-us-government-fight-for-the-future">how widespread the use of facial recognition technology has become</a> in the US).</li></ul><p>Using biometrics in retail is gaining momentum and going to replace the whole pool of marketing and security tools. Though some consumers concern about digital privacy and security. They fear that facial recognition will undermine privacy so preference will be given to the solutions like SVORT that do not store any sensitive data. Meantime both businesses and customers are getting ready for the technological renaissance in retail as shopping services and experience need constant improvement to remain competitive.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=86012c1acacd" width="1" height="1" alt=""><hr><p><a href="https://medium.com/svort/how-biometrics-modifies-retail-and-impacts-customer-service-86012c1acacd">How biometrics modifies retail and impacts customer service</a> was originally published in <a href="https://medium.com/svort">SVORT</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[4 cybersec trends to watch in 2020]]></title>
            <link>https://medium.com/svort/4-cybersec-trends-to-watch-in-2020-e8087e111ef6?source=rss----f56a5a327b6b---4</link>
            <guid isPermaLink="false">https://medium.com/p/e8087e111ef6</guid>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[5g]]></category>
            <category><![CDATA[phishing]]></category>
            <category><![CDATA[mfa]]></category>
            <dc:creator><![CDATA[Kristina Margulec]]></dc:creator>
            <pubDate>Thu, 20 Feb 2020 07:04:41 GMT</pubDate>
            <atom:updated>2020-02-20T07:04:14.284Z</atom:updated>
            <content:encoded><![CDATA[<h4>By 2021, the value of cybercrime damage is expected to reach $6 trillion per year according to <a href="https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/">Cybersecurity Ventures</a>, which is nearly 10% of the world economy.</h4><p>The cybersecurity market will soar along with developing new data protection tools. We’ve conducted a kind of research and chosen 4 cybersecurity trends as we regard the most interesting to watch in 2020.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*gXDgevaCO2R3OZnZY1gg4g.png" /></figure><p><strong>Mobile devices will become the principal target for phishing attacks</strong></p><p>Desktop Internet use is declining steadily along with increasing usage of mobile devices. That is the reason fraudsters’ focus shifts to attacks on mobile.</p><p>But smartphone manufacturers improve protection constantly, making it difficult to hack a modern device. The weakest link is smartphone owners, and this fact has been used successfully for attacks, the number of which will only increase. Phishing attacks aimed at smartphones owners can lead to the following:</p><ul><li>employees identities theft, getting access to corporate resources, compromising the corporate network and sensitive (commercial/confidential) data theft;</li><li>forcing to install a program for remote control, stealing money from a bank account;</li><li>compromising user credentials for a bank mobile app and stealing money by OTP interception; etc.</li></ul><p>This topic deserves separate research, but users must remember that their safety is up to them. Do not click links from strangers, protect your device by PIN code, do not open suspicious e-mails, and be attentive when downloading an application.</p><p><strong>2FA becomes a thing of the past being replaces by MFA</strong></p><p>2FA is not that safe as it is expected to be. It can be bypassed by phishing, third-party login, or a simple token theft. The new trend is multi-factor authentication (MFA), including biometrics. To prevent data breaches, enterprises increasingly take biometric authentication that improves security architecture.</p><p>It also positively affects the users’ experience. Here is an article on <a href="https://medium.com/svort/how-biometrics-will-accustom-people-to-use-multifactor-authentication-3-scopes-of-the-most-trendy-5b95f0a8072a">how biometrics will accustom people to use multi-factor authentication</a>. In 2020, MFA is expected to become widely disseminated and implemented to protect both corporate and personal data.</p><p><strong>Adoption of 5G and IoT devices will make us more vulnerable</strong></p><p>With the 5G network implementation and development, the amount of attacked connected IoT devices will increase substantially. Some experts estimate 5G and IoT devices to be hackers’ paradise.</p><p>IoT devices and their connections are still a weak link in cybersecurity architecture. The volume of personal data is growing increasingly, along with the need for defending against breaches and theft.</p><p>But 5G networks are complicated and require a tremendous level of security that still can not be provided by the majority of cloud vendors. New vulnerabilities are yet to discover and protect, so blind spots will be used by hackers for attacks and data theft causing irreparable damage to enterprises.</p><p>So 2020 is going to become a year of rethinking approaches to IoT security and new tools to protect these growing networks across all industries.</p><p><strong>Artificial intelligence (AI) will play a crucial role in both attack and defense</strong></p><p>The number of cyberattacks is growing steadily, which means that the industry experts work harder but yet don’t cope with an increasing number of threats. But there is the artificial intelligence that reacts to a threat faster than the most experienced and skilled experts. AI is constantly being improved and trained. Using machine and deep learning AI can improve its algorithms to better recognize and prevent threats for cybersecurity.</p><p>But this process works both ways. Cybersecurity experts train AI to recognize and prevent threats while hackers train AI to bypass defense. Some industry experts compare this competition with arms race so perhaps in 2020 AI will play a crucial role in cybersecurity architectures.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e8087e111ef6" width="1" height="1" alt=""><hr><p><a href="https://medium.com/svort/4-cybersec-trends-to-watch-in-2020-e8087e111ef6">4 cybersec trends to watch in 2020</a> was originally published in <a href="https://medium.com/svort">SVORT</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Your digital accounts are at fraud risk]]></title>
            <link>https://medium.com/svort/your-digital-accounts-are-at-fraud-risk-e3172d1a0912?source=rss----f56a5a327b6b---4</link>
            <guid isPermaLink="false">https://medium.com/p/e3172d1a0912</guid>
            <category><![CDATA[data-security]]></category>
            <category><![CDATA[biometrics]]></category>
            <category><![CDATA[fraud]]></category>
            <category><![CDATA[authentication]]></category>
            <category><![CDATA[neural-networks]]></category>
            <dc:creator><![CDATA[Kristina Margulec]]></dc:creator>
            <pubDate>Thu, 13 Feb 2020 10:45:12 GMT</pubDate>
            <atom:updated>2020-02-13T10:44:56.520Z</atom:updated>
            <content:encoded><![CDATA[<h4>Surefire way to stop fraudsters preying on you</h4><p>Reading this article implies having Internet access that means your data is at risk if not protected properly.</p><p>We have developed a neural-biometrics access management system called <a href="https://svort.me/">SVORT</a> and want to explain how it can protect your money and identity in digital space.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*MBYeqTZfYqJ5rUZO6MR7LA.png" /></figure><p>Those who take their digital security seriously can scroll down to <strong>“How does SVORT raise my security to another level?”</strong> section of the article.</p><p>All the others are welcomed to acquaint themselves with a bit of stats we’ve collected. We did not aim to cause you to panic. Our purpose is to enable users to assess the risks properly when they ignore data protection or treat it too carelessly.</p><p>A cyberattack occurs every 39 seconds on average as <a href="https://www.securitymagazine.com/articles/87787-hackers-attack-every-39-seconds">a Clark School study at the University of Maryland</a> claimed. Cyber threats apply to anyone who somehow acts on the Internet. It is especially the cause of concern for those who keep and manage their money online.</p><ul><li>In 2018, <a href="https://www.iii.org/fact-statistic/facts-statistics-identity-theft-and-cybercrime">frauds cost $1.7 billion</a> to its victims.</li><li>In May 2019, <a href="https://binance.zendesk.com/hc/en-us/articles/360028031711-Binance-Security-Breach-Update">hackers withdrew $41 million</a> from Binance that is one of the largest cryptocurrency exchanges in the world.</li></ul><p>Whatever you are a bank’s customer, crypto or exchange trader, freelancer, poker player, remote worker or use online payments services or crypto wallet your digital money is at risk.</p><p>Read on to learn what steps you should take to strengthen your protection against fraudsters.</p><p>The main threats to online transactions are money and identity theft. Being stolen, your passwords, emails, and other data provide fraudsters with access to bank accounts, digital wallets, etc.</p><p>Money loss is not the only attack consequence that each of us can face as fraudsters can use our name and personal data for their malicious purposes damaging people close to us. Therefore protecting our digital environment can be considered not only as defending our interests but also as taking care of people we associate with.</p><h4><strong>Protective measures and its imperfections</strong></h4><p>Depending on the kind of activity you maintain on the Internet you might have been recommended for different data protective measures.</p><p>Using password managers, cryptographic keys, additional security factors as OTP and U2F, etc. people often get an illusion that their data is securely protected. Yet statistics indicates this illusion is not borne out by reality as frauds is increasing every year:</p><ul><li>In 2019, a collection of 2.7 billion identity records, consisting of 774 million unique email addresses and 21 million unique passwords, was exposed online (<a href="https://en.wikipedia.org/wiki/List_of_data_breaches#">Wikipedia</a>).</li><li>Using OTPs as 2nd security factors in industries relating to blockchain or others can not stop cyber-thieves as it did not stop hackers from stealing $41 million from Binance wallets (<a href="https://binance.zendesk.com/hc/en-us/articles/360028031711-Binance-Security-Breach-Update">Binance blog</a>).</li><li>OTP is an outdated method since perpetrators armed with special equipment intercepts OTPs and transfer money from the victims’ accounts to their own (<a href="https://economictimes.indiatimes.com/news/politics-and-nation/new-form-of-otp-theft-on-rise-many-techies-victims/articleshow/67521098.cms">The Economic Times</a>).</li><li>U2F implies users’ data safety depends on devices. Once it is stolen or lost, their data is threatened. U2F is also vulnerable to phishing (<a href="https://www.pymnts.com/news/security-and-risk/2019/synopsys-phishing-scam-2fa-authentication/">PYMNTS.com</a>).</li></ul><p>Whatever protective measure you use with high probability it can be bypassed. The only question is how difficult it is to override this or that security system. We have created a software solution called SVORT that is really hard to bypass. It can be used as an additional security factor within MFA and implies using something that can be neither stolen nor forged instead of using a password, token or device. By something we mean your face or more specifically its biometric data.</p><p><strong>How does SVORT raise my security to another level?</strong></p><p>SVORT is a neural-biometrics access management system based on liveness detection.</p><p>The great combo of a particular neural network algorithm, biometrics, and infallible liveness detection enabled a perfect authenticator that is entirely invulnerable to spoofing attacks. SVORT operates as follows:</p><ul><li>The particular neural network algorithm learns to detect the user by his face.</li><li>A camera scan the user’s appearance at different angles.</li><li>Then the system transforms the user’s face into code which itself is the private and depersonalized key.</li></ul><p>Such a key is depersonalized because it does not contain any sensitive data i.e. fraudsters are unable to find out the key owner. That is, even it is stolen it won’t enable attackers to get access to your data because the transformation of biometrics data into code is irreversible.</p><p>Liveness detection is another element of SVORT’s system that determines whether SVORT interacts with a human being. Face liveness detection is based on computer vision technologies and deep learning algorithms with face detection and tracking at their core therefore photo/video/mask spoofing or side-channel attacks can not override the system.</p><p>Liveness detection’s security is provided by the system of rotational challenges. A user can be asked to smile, blink, turn his head, raise eyebrows, etc. Therefore fraudsters won’t be able to intercept into authentication process as it is impossible to get prepared for such a challenge as tasks vary every time.</p><p>Leveraging neural networks, face liveness detection, and biometrics, we get troublefree authenticator that prevents all kinds of spoofing and protects data reliably.</p><p>Here you can read more on <a href="https://medium.com/svort/neural-biometrics-access-management-system-the-new-age-of-one-notable-technology-267d6e1c04ce">what is neural-biometrics and how liveness detection in SVORT works</a>. This article covers in detail <a href="https://medium.com/svort/using-svort-for-authentication-bcc1b1dbaaa9">how to use SVORT for authentication</a>. If you are interested in SVORT, please leave a request on <a href="https://svort.me/">our website </a>and we will send you our demo. It is free and will remain free for individual users.</p><p><strong>Stay in touch with us</strong></p><ul><li><a href="https://www.linkedin.com/company/svort/"><strong>LinkedIn</strong></a></li><li><a href="https://www.facebook.com/pg/svort.me/"><strong>Facebook</strong></a></li><li><a href="https://twitter.com/svort_me"><strong>Twitter</strong></a></li><li><a href="https://svort.me/"><strong>Website</strong></a></li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e3172d1a0912" width="1" height="1" alt=""><hr><p><a href="https://medium.com/svort/your-digital-accounts-are-at-fraud-risk-e3172d1a0912">Your digital accounts are at fraud risk</a> was originally published in <a href="https://medium.com/svort">SVORT</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Using SVORT for identification]]></title>
            <link>https://medium.com/svort/using-svort-for-identification-f1f610aa4110?source=rss----f56a5a327b6b---4</link>
            <guid isPermaLink="false">https://medium.com/p/f1f610aa4110</guid>
            <category><![CDATA[data-protection]]></category>
            <category><![CDATA[identification]]></category>
            <category><![CDATA[business-solutions]]></category>
            <category><![CDATA[enterprise-software]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Kristina Margulec]]></dc:creator>
            <pubDate>Thu, 06 Feb 2020 18:35:31 GMT</pubDate>
            <atom:updated>2020-02-06T18:35:31.621Z</atom:updated>
            <content:encoded><![CDATA[<h4>3 unobvious ways to extract value for your business from technologies</h4><p>Biometrics identification recognizes a person through the facial image. It enables users to open a bank account or sign up in a sharing service or perform any other action that requires identification without leaving home.</p><p>It is advantageous to both users and businesses as biometrics identification cuts expenses, reduces the time of customer service, prevents fraud, automates business processes and increases profit.<br>We have described 3 unobvious ways to extract use from the technology. Read on to learn how it can boost your business and save resources.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*plTloU5E4ZZt0RbJoUZvKQ.png" /></figure><h4><strong>How does SVORT perform identification?</strong></h4><p>The neural network learns to identify people and performs the action needed like opening a door or providing access or confirming identity, etc. SVORT operates not on a person’s image but on his biometrics data that actually is a depersonalized anonymous biometrics key.</p><p>The infallible liveness detection saves users from being counterfeited. In terms of biometrics, liveness detection is the computer’s ability to determine whether it interacts with a human being. Although our liveness detection tests excellent we reiterate that its efficiency also depends on hardware characteristics like computer or webcam specifics, depth sensors in the camera, etc.</p><p>United with a special neural network algorithm and biometrics liveness detection prevents spoofing and makes SVORT invulnerable for forgery of identity. <a href="https://medium.com/svort/neural-biometrics-access-management-system-the-new-age-of-one-notable-technology-267d6e1c04ce">Click here</a> for more details on how SVORT provides its users with security.</p><h3><strong>The most efficient ways of identification implementations</strong></h3><p>Here at SVORT, we can perform any case using identification. Actually, SVORT is software development kit (SDK). It is the set of tools that enables us to build a custom solution that can be successfully adapted for any existing software and requirements. The most demanded cases are the following.</p><h4><strong>Physical access by face</strong></h4><p>This option is available for both customers and employees. Use physical access by face for the following purposes:</p><ul><li>to replace traditional keys, passes, and magnetic card keys;</li><li>to control the time of arrival and leave of employees;</li><li>to limit access to certain premises;</li><li>to prevent strangers’ from entering the building.</li></ul><p>Replacing traditional keys and passes with identification system increases turnstiles capacity and prevents troubles for forgotten, lost or stolen keys. This is how the identification of employees works:</p><ul><li>SVORT is integrated into the current system of video surveillance and turnstiles;</li><li>employees continue to use the adopted methods of gaining access to the office;</li><li>meanwhile the neural network remembers employees and learns to recognize them;</li><li>in a couple of days, the SVORT will open the turnstile or door in front of the identified employee even before he can even pull out the key from his pocket, which he actually no longer needs.</li></ul><p><a href="https://medium.com/svort/4-arguments-to-schedule-iam-spendings-on-2020-c581d838d096">Here</a> it is explained in detail why your business needs the IAM system. By the way, SVORT can be used not only for controlling physical access to buildings/premises but also for access to workstations or certain programs/services/etc.</p><p>Such measures taken would prevent data breaches and protect sensitive business data. Details on the use of SVORT as an additional security factor within MFA are written <a href="https://medium.com/svort/using-svort-for-authentication-bcc1b1dbaaa9">here</a>.</p><h4><strong>Customers recognition</strong></h4><p>Identification can bring your business the following benefits:</p><ul><li>to identify VIPs and other customers;</li><li>to notify receptionists when VIPs or other identified customers enter the building/office/shop/etc.;</li><li>to replace loyalty cards;</li><li>to collect and analyze data.</li></ul><p>Improving customer service with identification SVORT also improves internal business processes providing due to data analytics. The last point implies a wide range of functions so it is worthy to discuss it separately.</p><h4><strong>Identification for analytics</strong></h4><p>A business must know its customers to develop and apply a development strategy successfully. SVORT provides you with the following information:</p><ul><li>Who are your customers?</li><li>How often do they need your services?</li><li>What time and what days of the week do they usually come to you?</li><li>How much time do they spend in your place?</li><li>Do they leave satisfied or disappointed (possible if the emotion recognition system is integrated)?</li></ul><p>For these purposes SVORT performs the following actions:</p><ul><li>learn to identify your customers;</li><li>control the time they come and leave;</li><li>count how many time do they spend in your place;</li><li>collect and analyze this data providing you with access to analytics.</li></ul><p>The emotion recognition system can be integrated into SVORT to improve the quality of service. It will also help the business owner analyze what exactly affects the level of customer satisfaction.</p><p>Once the data is collected, your task is only to interpret it correctly and make a decision that will benefit your customers while improving the business.</p><p>Our neural-biometrics access management system can be applied not only for identification but in a variety of other ways. Tell us about your business, and we will tell you how <a href="https://svort.me/">SVORT</a> can automate processes, enhance services, save resources, and boost your enterprise.</p><p>Visit our <a href="https://www.facebook.com/svort.me/">Facebook</a>, <a href="https://www.linkedin.com/company/svort/">LinkedIn</a>, and the <a href="https://svort.me/">website</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f1f610aa4110" width="1" height="1" alt=""><hr><p><a href="https://medium.com/svort/using-svort-for-identification-f1f610aa4110">Using SVORT for identification</a> was originally published in <a href="https://medium.com/svort">SVORT</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>