Welcome!

@ThingsExpo Authors: Pat Romanski, Elizabeth White, Yeshim Deniz, Liz McMillan, William Schmarzo

News Feed Item

Research and Markets: Is Biometric Technology the Answer to the Problem of Vehicle Key Theft?

Research and Markets: Is Biometric Technology the Answer to the Problem of Vehicle Key Theft?

DUBLIN, Ireland, June 10 /PRNewswire/ -- Research and Markets (http://www.researchandmarkets.com/reports/c18968 ) has announced the addition of An analysis of biometric technology for automotive security applications to their offering.

(Logo: http://www.newscom.com/cgi-bin/prnh/20040820/RESEARCH )

Is Biometrics the answer to the rising trends of car-jacking and vehicle key-related crime?

Milton Keynes 17th March 2004 - "Vehicle security development has reached an important milestone. The use of immobiliser systems fitted to new vehicles has caused a change in theft techniques used by car thieves, and has resulted in a significant increase in the number of vehicles stolen using the original vehicle keys. A variety of methods are now being used to obtain the original keys, including deception, fraud, burglary, and direct force."

The increasing use of immobiliser systems has caused a change in theft techniques used by car thieves, resulting in a significant increase in the number of vehicles stolen using the original vehicle keys. The challenge facing the vehicle security industry is how to prevent this theft method. So how can we verify that it is the genuine vehicle owner who is using the vehicle key?

One possible solution to this verification problem is the use of biometric technologies.

This report investigates the application of biometrics within the automotive security industry. Four of the most developed technologies: fingerprint, iris, face and voice recognition, are analysed and compared against key factors such as cost, security, application and customer acceptance.

According to data from insurers in Holland, close to 80% of thefts of cars under 6 years old involved the theft of the car keys. The British Crime Survey 2001 puts this figure at 53% for the UK.

The challenge facing the vehicle security industry is how to prevent these theft methods. Some additional verification of the user is required to ensure that it is the genuine vehicle owner who is using the vehicle key.

One possible solution to this verification problem is the use of biometric technologies and this study investigates their application within the arena of vehicle security.

Who could benefit from buying this report? - Vehicle Manufacturers Can this technology enhance your vehicles? Which type of biometric solution offers the easiest practical implementation and why? What other factors must be considered? - Automotive Suppliers Is biometrics on your product portfolio? Should it be? What are the issues facing automotive manufacturers that you would be expected to have the answers to? - Biometric vendors Have you considered automotive security applications? Do you understand the implications?

For more information visit http://www.researchandmarkets.com/reports/c18968

Laura Wood Senior Manager Research and Markets [email protected] Fax: +353 1 4100 980

Research and Markets

CONTACT: Laura Wood, Senior Manager of Research and Markets,
[email protected] , or fax, +353-1-4100-980

Web site: http://www.researchandmarkets.com/reports/c18968

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science" is responsible for guiding the technology strategy within Hitachi Vantara for IoT and Analytics. Bill brings a balanced business-technology approach that focuses on business outcomes to drive data, analytics and technology decisions that underpin an organization's digital transformation strategy.
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determ...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.