Welcome!

Machine Learning Authors: Pat Romanski, Liz McMillan, Yeshim Deniz, Elizabeth White, Zakia Bouachraoui

News Feed Item

Research and Markets: Is Biometric Technology the Answer to the Problem of Vehicle Key Theft?

Research and Markets: Is Biometric Technology the Answer to the Problem of Vehicle Key Theft?

DUBLIN, Ireland, June 10 /PRNewswire/ -- Research and Markets (http://www.researchandmarkets.com/reports/c18968 ) has announced the addition of An analysis of biometric technology for automotive security applications to their offering.

(Logo: http://www.newscom.com/cgi-bin/prnh/20040820/RESEARCH )

Is Biometrics the answer to the rising trends of car-jacking and vehicle key-related crime?

Milton Keynes 17th March 2004 - "Vehicle security development has reached an important milestone. The use of immobiliser systems fitted to new vehicles has caused a change in theft techniques used by car thieves, and has resulted in a significant increase in the number of vehicles stolen using the original vehicle keys. A variety of methods are now being used to obtain the original keys, including deception, fraud, burglary, and direct force."

The increasing use of immobiliser systems has caused a change in theft techniques used by car thieves, resulting in a significant increase in the number of vehicles stolen using the original vehicle keys. The challenge facing the vehicle security industry is how to prevent this theft method. So how can we verify that it is the genuine vehicle owner who is using the vehicle key?

One possible solution to this verification problem is the use of biometric technologies.

This report investigates the application of biometrics within the automotive security industry. Four of the most developed technologies: fingerprint, iris, face and voice recognition, are analysed and compared against key factors such as cost, security, application and customer acceptance.

According to data from insurers in Holland, close to 80% of thefts of cars under 6 years old involved the theft of the car keys. The British Crime Survey 2001 puts this figure at 53% for the UK.

The challenge facing the vehicle security industry is how to prevent these theft methods. Some additional verification of the user is required to ensure that it is the genuine vehicle owner who is using the vehicle key.

One possible solution to this verification problem is the use of biometric technologies and this study investigates their application within the arena of vehicle security.

Who could benefit from buying this report? - Vehicle Manufacturers Can this technology enhance your vehicles? Which type of biometric solution offers the easiest practical implementation and why? What other factors must be considered? - Automotive Suppliers Is biometrics on your product portfolio? Should it be? What are the issues facing automotive manufacturers that you would be expected to have the answers to? - Biometric vendors Have you considered automotive security applications? Do you understand the implications?

For more information visit http://www.researchandmarkets.com/reports/c18968

Laura Wood Senior Manager Research and Markets [email protected] Fax: +353 1 4100 980

Research and Markets

CONTACT: Laura Wood, Senior Manager of Research and Markets,
[email protected] , or fax, +353-1-4100-980

Web site: http://www.researchandmarkets.com/reports/c18968

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
On-premise or off, you have powerful tools available to maximize the value of your infrastructure and you demand more visibility and operational control. Fortunately, data center management tools keep a vigil on memory contestation, power, thermal consumption, server health, and utilization, allowing better control no matter your cloud's shape. In this session, learn how Intel software tools enable real-time monitoring and precise management to lower operational costs and optimize infrastructure for today even as you're forecasting for tomorrow.
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leading global enterprises use Isomorphic technology to reduce costs and improve productivity, developing & deploying sophisticated business applications with unprecedented ease and simplicity.
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
DevOps has long focused on reinventing the SDLC (e.g. with CI/CD, ARA, pipeline automation etc.), while reinvention of IT Ops has lagged. However, new approaches like Site Reliability Engineering, Observability, Containerization, Operations Analytics, and ML/AI are driving a resurgence of IT Ops. In this session our expert panel will focus on how these new ideas are [putting the Ops back in DevOps orbringing modern IT Ops to DevOps].
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understanding as the environment changes.