Industry | AI |
---|---|
Founded | 1990 |
Headquarters | , |
Website | www |
Neurotechnology (previously known as Neurotechnologija) is an algorithm and software development company founded in Vilnius, Lithuania in 1990. [1] [2]
Neurotechnology provides algorithms and neural network services to government agencies and commercial clients, [3] Presently, the company focuses upon multi-biometric smart card fingerprint, face, iris, voice, and palm print identification. [4]
Neurotechnology was formed in 1990 in Vilnius, Lithuania, with the primary goal of exploiting neural networks for applications such as computer vision, biometric person identification, and artificial intelligence. In 1991, the company released its first fingerprint identification technology for criminal inquiry in 1991. The following research by the company resulted in the first fingerprint identification algorithm for civil usage, which was made public in 1997. Since then, the company has created over 200 products, earning recognition from worldwide organisations such as the US National Institute of Standards and Technology. [5]
In 2009, the Polish Security Printing Works used the Neurotechnology VeriFinger fingerprint recognition technology to issue the E-Passports that were required by all countries in the Schengen Agreement under EU Law. [6]
In 2017, the company unveiled an ultrasonic particle manipulation 3D printing method that could be used to 3D print entire electronic objects, such as a smartphone. [7]
The DRC's Independent National Electoral Commission deployed the Neurotechnology MegaMatcher ABIS during the 2018 Democratic Republic of Congo general election, uncovering 5.3 million duplicate voter records. [8] Corneille Nangaa Yobeluo, President of the National Independent Electoral Commission (CENI) stated: "Neurotechnology helped us achieve our goals and exceeded our expectations by starting and completing the deduplication process in record time, and they were able to identify millions of duplicates". [9] [10]
Since 2019, Neurotechnology has held first place in the US National Institute of Standards and Technology (NIST) Proprietary Fingerprint Template (PFT) evaluations, up against 39 algorithms submitted from 22 vendors. [11]
MegaMatcher ABIS was used alongside fingerprint and/or facial recognition during the 2020 Ghanaian General Election. It was used to de-duplicate the database of 17,027,641 eligible voters, identifying 15,860 attempted multiple registrations. [12]
In March 2021, The Neurotechnology product MegaMatcher was used in the Indian Aadhaar ID scheme, [12] described as "the most sophisticated ID programme in the world" by the World Bank Chief Economist Paul Romer. [13] Neurotechnology, alongside consortium partner Tata Consultancy Services, were selected to provide a deduplication system for the Aadhaar scheme using fingerprint, face and iris biometric recognition. [14]
In 2014, the Neurotechnology's product VeriFinger was used by hacker Jan Krissler to recreate the German defense minister Ursula von der Leyen's fingerprint, using only a few high-definition images [15] taken using a “standard photo camera”. [16]
A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfaces such as glass or metal. Deliberate impressions of entire fingerprints can be obtained by ink or other substances transferred from the peaks of friction ridges on the skin to a smooth surface such as paper. Fingerprint records normally contain impressions from the pad on the last joint of fingers and thumbs, though fingerprint cards also typically record portions of lower joint areas of the fingers.
Biometrics are body measurements and calculations related to human characteristics. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance. The discriminating powers of all biometric technologies depend on the amount of entropy they are able to encode and use in matching. Iris recognition is exceptional in this regard, enabling the avoidance of "collisions" even in cross-comparisons across massive populations. Its major limitation is that image acquisition from distances greater than a meter or two, or without cooperation, can be very difficult. However, the technology is in development and iris recognition can be accomplished from even up to 10 meters away or in a live camera feed.
A facial recognition system is a technology potentially capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, and works by pinpointing and measuring facial features from a given image.
Hand geometry is a biometric that identifies users from the shape of their hands. Hand geometry readers measure a user's palm and fingers along many dimensions including length, width, deviation, and angle and compare those measurements to measurements stored in a file.
M2SYS Technology is a biometric identification management company that provides biometric identity management software and hardware along with enterprise software applications. The company provides services to different industries such as public safety, workforce management, point of sale, healthcare, education, child care, transportation security, banking and membership management.Software Development Kits are used in software vendors to add biometric identification to the applications directly to end users.
VeriFace is an online service for remote identity verification of customers developed by Slovak company Rokan Biometrics. It aims to provide biometric identity verification and customer onboarding via facial recognition software.
Aadhaar is a 12-digit unique identity number that can be obtained voluntarily by all residents of India, based on their biometrics and demographic data. The data is collected by the Unique Identification Authority of India (UIDAI), a statutory authority established in January 2009 by the Government of India, under the jurisdiction of the Ministry of Electronics and Information Technology, following the provisions of the Aadhaar Act, 2016.
Vein matching, also called vascular technology, is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin. Though used by the Federal Bureau of Investigation and the Central Intelligence Agency, this method of identification is still in development and has not yet been universally adopted by crime labs as it is not considered as reliable as more established techniques, such as fingerprinting. However, it can be used in conjunction with existing forensic data in support of a conclusion.
IDEX Biometrics ASA is a Norwegian biometrics company, specialising in fingerprint imaging and fingerprint recognition technology. The company was founded in 1996 and is headquartered in Oslo, but its main operation is in the US, with offices in New York and Massachusetts. The company also has offices in the UK and China.
Biometrics refers to the automated recognition of individuals based on their biological and behavioral characteristics, not to be confused with statistical biometrics; which is used to analyse data in the biological sciences. Biometrics for the purposes of identification may involve DNA matching, facial recognition, fingerprints, retina and iris scanning, voice analysis, handwriting, gait, and even body odor.
IDEMIA is a multinational technology company headquartered in Courbevoie, France. It provides identity-related security services, and sells facial recognition and other biometric identification products and software to private companies and governments.
Eye vein verification is a method of biometric authentication that applies pattern-recognition techniques to video images of the veins in a user's eyes. The complex and random patterns are unique, and modern hardware and software can detect and differentiate those patterns at some distance from the eyes.
Mass surveillance is the pervasive surveillance of an entire or a substantial fraction of a population. Mass surveillance in India includes Surveillance, Telephone tapping, Open-source intelligence, Lawful interception, and surveillance under Indian Telegraph Act, 1885.
A biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic. These characteristics include fingerprints, facial images, iris and voice recognition.
Biometric voter registration implicates using biometric technology, most of the times in addition to demographics of the voter, for polling registration and/or authentication. The enrollment infrastructure allows collecting and maintaining a database of the biometric templates for all voters.
Fingerprint scanners are security systems of biometrics. They are used in police stations, security industries, smartphones, and other mobile devices.
Jan Krissler, better known by his pseudonym starbug, is a German computer scientist and hacker. He is best known for his work on defeating biometric systems, most prominently the iPhone's TouchID. He is also an active member of the German and European hacker community.
Fingerprint Cards is a Swedish biometrics company that develops and produces biometric systems. Fingerprint Cards was founded in 1997 by Lennart Carlson.
Identity replacement technology is any technology that is used to cover up all or parts of a person's identity, either in real life or virtually. This can include face masks, face authentication technology, and deepfakes on the Internet that spread fake editing of videos and images. Face replacement and identity masking are used by either criminals or law-abiding citizens. Identity replacement tech, when operated on by criminals, leads to heists or robbery activities. Law-abiding citizens utilize identity replacement technology to prevent government or various entities from tracking private information such as locations, social connections, and daily behaviors.