Skip to main content

Home/ Hospitality Technology/ Group items tagged Bio-metric

Rss Feed Group items tagged

aquaholic1371

Restaurants catching on to biometrics benefits | Fast Casual - 2 views

  • The days of buddy punching time cards may be numbered for sneaky employees trying to work the system. Advances in technology and lower prices have allowed more quick-service and fast casual operators to adopt biometrics as part of their loss prevention plans.
  • Biometrics technology, which uniquely recognizes humans based on intrinsic physical traits such as a fingerprint, handprint or eye iris, has been around since the 1990s.
  • It replaces the keys and codes and provides optimal control in access authorization;It could eliminate or mitigate thefts by someone with unauthorized access to keys or to stock areas/back door and can track operations on the safe if the technology is used there as well;To keep up with personnel changes, controls can be implemented remotely and changes can be made quickly, saving costs of travel and changing hardware, locks, combinations, etc.
  • ...1 more annotation...
  • "First and foremost, this acts as a deterrent. It gives operators peace of mind and lets their employees know they're serious about holding people accountable when they have access to the cash drawer," he said. "If someone's drawer comes up short and only one person accessed it via fingerprint, there is no deniability there. It changes the entire atmosphere and forces people to do their jobs. It's very powerful."
  •  
    As the world becomes more dependent on technology, the opportunities to exploit or steal one's personal information becomes easier and easier. Passwords and pins can be stolen. Manager cards can be handed out or duplicated. Bio metric information is the one thing that remains a secure way to ensure proper protocols are being followed. Short of cutting off someone's finger, it is impossible to duplicate an individuals bio metric information. This is proving to be a very cost effective means of ensuring compliance to company procedures. The savings in time card fraud, or improper void protocol outweigh the expense of implementing the system. I believe that this is a sign of things to come, as our world transitions to a more electronic state; Bio metric information is the only secure means of insuring the actual "user" is the one performing the specific task.
  •  
    This concept is very interesting as I deal with timecard fraud often. However, without the option of over riding or using a paper time correction, I wonder if it would actually waste some time waiting for a manager to come and fix the problem.
  •  
    As a manager, I prefer the biometric option for punching in and out of employees. The only problem I have seen with this technology for employees is for those that work in laundry or dish washing areas. The constant exposure to heat and water on their fingers causes their fingerprints to distort temporarily. I find that I have to utillize less dominant fingers to make it work for these associates. I have made it mandatory for any associate to speak with a manager if they do not punch in or out correctly.
herzencortes

Daily Buzz: Event Registration's New Frontier: Associations Now - 1 views

  • Facial recognition and customized software-as-a-service solutions are taking center stage.
  • But, as with any new technology, registration advances also come with a need for improved data security.
  • there is no question that these technologies—including facial recognition, thumbprint/grid and tracking by cameras—greatly increase the quantity of data that is being held. Event technology is evolving to meet these data concerns.”
  • ...4 more annotations...
  • one area of advancement that must correspond with all these technology advancements is consumer data privacy and controls,
  • “We see innovative solutions focusing on the one thing companies do exceedingly well and integrating their tech with other best-in-breed solutions,” says Adrien Peterson, chief technology officer at EventCore, in an interview with Smart Meetings. “This opened up a whole new reality for event planners. They could create a bespoke event registration tech deck, a built-to-order solution to meet their event’s precise needs.”
    • herzencortes
       
      Face recognition has become a turning point in hospitality technology. This technology is now present in stadiums, airports, phone and consumer products. The next step is going to be key access, and other technologies that will be part of the customer experience.
  • one area of advancement that must correspond with all these technology advancements is consumer data privacy and controls,
    • herzencortes
       
      Privacy is quickly becoming a bigger and bigger issue, this is because there is more and more information about people available from bio metrics to financial information.
  • “Without a great user experience, you’ll be hard-pressed to get anyone to actually use the system,”
    • herzencortes
       
      User experience is becoming a turning point in all different technologies, and in hospitality this trend is equally as prevalent.
  •  
    Eventcore is seeking to implement new technologies for event registration. The company is interested in doing fingerprint and face recognition as an entry to an event, instead of a normally accepted ticket. The company spoke about growing security concerns in the event industry and how there needs to be more effort to safeguard attendees information. Biometric entry seeks to keep customer information safe while ensuring speedy entry into events.
glope143

Can Disney's Magic Bands be Hacked? - MouseChat.net - Orlando News & Reviews | Disney W... - 0 views

  • While it is still certainly possible to potentially clone a MagicBand (and thereby gain access to protected resources by impersonating the original band holder), the fact that the band operates on the 2.4 GHZ frequency inherently presents some challenges to any would-be malicious users. Admission to the parks is fairly expensive (Fig. 5) and the cost of the hardware required to conduct such a cloning attack far exceeds the cost of a legitimate day pass. For the attack to even be considered economical, the malicious user must clone many passes over time.
    • glope143
       
      This paragraph brings up an interesting point when it comes to the security of Disney's RFID MagicBands. The primary information on the Band itself that could be most "easily" accessed if cloned is a ticketed theme park entrance. The author believes the chances of this happening are slim to none given the amount of theme park entrances that would needed to be stolen in order to justify the cost of expensive RFID cloning hardware. For arguments sake, should a hacker clone a MagicBands individual RFID code there are still a variety of hurdles to cross before being able to walk away unnoticed. Since every RFID code is individualized, should the Band that was hacked enter the the theme park prior to the duplicate, the duplicate will be stopped and questioned by security. There are also bio-metric scanners in the front of each entrance that require the scanned fingerprint to match that on file. Should the fingerprint scanner fail, a cast member with access to the original MagicBand owner's photograph will deem the duplicate band a fraud.
  • Part of the MagicBand system allows guests to make purchases with the band at specific registers provided they have tied a credit/debit card to their account via an external process. This can be seen as a very big convenience to guests who do not wish to continually use their cards to make purchases while in the parks, or for those who find themselves wishing to buy merchandise when they had not initially anticipated in doing so and do not have their wallet/purse/money clip in their possession. Yet in order to make purchases, a user must first swipe their band against a specially designed reader (Fig. 6) and subsequently enter a matching PIN number. Even if our malicious user had an RFID token that was a working clone of a legitimate one, it is somewhat unlikely he would be able to successfully guess the matching PIN number within a reasonable number of tries in one sitting before the cashier would begin to get suspicious.
    • glope143
       
      One of Disney's star features for their MagicBands is the ability to go hands-free throughout their vacation by having everything necessary stored on one device, including credit card information. This gives guests the ability to make purchases across the Resort without the additional moral barrier of having to remove their wallet from their purse or pocket. Should a MagicBand be misplaced, or duplicated as in the context of this article, a four digit code is still required to make purchases with the credit card on file. This code is not available for viewing on the band and cannot be changed though any means besides visiting the front desk with property identification.
  • While multifactor authentication certainly adds to the security of the system in a significant way, biometric  hardware is not flawlessly reliable. Florida is a rather humid place [5] which inevitably affects the performance of sensitive electronic hardware like fingerprint readers. To address this issue and counteract the likelihood of the system presenting users with false negatives, it would be fair to assume that the fingerprint readers themselves are configured to fail open (ie, when in doubt, allow entry). This gives malicious users the potential benefit of knowing that they merely need to intentionally cause the reader to malfunction to be granted access. Social engineering could also potentially play a factor in the exploitation of the MagicBand system by using Disney’s own customer-service policy against itself. Suppose our malicious user is successfully stopped dead in his tracks at the gate. He has been beaten to the entry gate by his victims and has lost the calibration race; there is no hope the machine will accept his cloned band. Yet he scans it anyway, and is denied access immediately. He knows he will not gain entry, but he continues to scan it. The employees at the gate attempt to help him, scanning his band for him, fiddling with the machine, etc, all to no avail. Yet a large line is beginning to form behind him.
    • glope143
       
      This article does a great job at playing devil's advocate in the situation of MagicBand cloning and creates a sound argument at what could happen should a hacker attempt to enter a Disney park with a previously used RFID code. As someone to frequently visit's the Disney theme parks, I would not be surprised if a cast member simply waved a guest through in order to avoid a line back up, especially during peak season times.
  • ...1 more annotation...
  • Despite the inherent arms-race between malicious users and system security mechanisms, overall the MagicBand system seems to hold up under scrutiny and is fairly well designed. The high cost of the hardware required to compromise the system via an RFID cloning attack combined with the multifactor authentication process provides sufficient layers of systematic defenses; even the most judicious adversaries may still fail to successfully thwart system security.
dskomorowsky

POS of the Future Predictions & Insights | Hospitality Technology - 0 views

  • The point of service is becoming untethered from the point of sale. The next-generation point of sale is being shaped by the call for the POS to be all things for all people.
  • This year’s results indicate that restaurants are preparing to take an active role in the evolution of the POS. More than half are testing and researching new POS solutions for 2019 and beyond, and 46% plan to add functionalities to current software in 2019
  • the top three business drivers that will be prompting POS enhancements, two — adding mobile POS and enabling new payment options — speak to a bigger issue: providing customers with frictionless ways to pay, wherever and however they want.
  • ...12 more annotations...
  • More than half (61%) of operators say that being able to use data to understand guest preferences and behavior is the top driver influencing a POS upgrade.
  • “Advanced payment types and allowing more payment types to be accepted at the POS will drive the POS of the Future. Pay-at-the-table, as well as mobility in general, are becoming very prevalent as businesses realize that mobility is a key factor in meeting guests where they want to be interacted with.
  • POS consolidation will continue to impact technology as POS options become more directly tied to payment processing. As the barrier to technology development continues to decrease
  • “The future POS will be shaped by the proliferation of consumer preferences to order ahead and online and their desire to drive the transaction in-store as well as merchant preferences to manage orders and payments in real-time, whether they are in-store or off-site.”  — Clover
  • “New forms of payment that eliminate interchange are going to make it difficult for companies to subsidize POS hardware and software with the payment processing revenue.
  • — Ingenico
  • The rise of off-premises ordering and digital enablement will mean an increased focus on advanced kitchen production, the enablement of consolidated and centralized menus and order entry across consumer and employee entry points, and automation of delivery orders and services through branded applications and third-party aggregators.
  • “As restaurants expand their adoption of software and analytic tools, security will be at the forefront of POS discussions. Data vulnerability is directly related to the number of access points in a hardware or software solution. The risk associated with having access to a wide range of value-add software applications is the increase in access points for potential data compromise.” — TableSafe
  • “We’ll see an increase in omni-channel ordering including via mobile and kiosk, plus more voice assistant-enabled ordering using the Amazon Echo (Alexa) or Google Home APIs.What’s more, because it’s Artificial Intelligence (AI)-driven, the voice assistant ordering system will ‘learn’ and continually improve based on actual orders and spoken language.” — Xenial
  • With ever-changing customer demographics and demands, like the increase in integrated online ordering and food delivery, your POS software needs to adapt to your customer base and continue to adjust to reflect business efficiencies.
  • As an example, the movement to cloud POS highlights the limitations and decreasing utility of client server architecture. Also, closed systems are falling out of favor.
  • As a result, POS suppliers need to think about how this plays out through the system and in to kitchen operations.  Also, in an online ordering and delivery environment, store location may not be as relevant as store capacity and balancing work between sites.
  •  
    This article is the resultant of a survey by Hospitality Technology as a deep dive into the minds of Restaurant Technology experts and executives. The results of the survey, commented by various executives from POS provision companies details their thoughts on the needs and direction of POS systems in the industry. The article, though lengthy, outlines current additions to existing POS systems and upgrades they are or will be implementing as a contrast to the opinions of the Technology executives. Out of this, several distinct trends emerge. POS will no longer be just cash register alternatives. They as a class of products are evolving quickly, integrating data, inventory management, third party integration (both service and distribution side) as well as an emphasis on Cloud-Based and managed implementations. All seem to concur that the future of the POS is not merely operational and operator functionality but also payment systems integrations that will make payment by the consumer friction-less and more diversified. On-line ordering is a distinct focus for all POS providers as online ordering grows exponentially for the foreseeable future. This includes critical items for brand based application ordering as well as third party aggregators. This includes the integration of omni-channel ordering including mobile, amazon-echo, Google-Echo and other AI/Voice based systems and the implications of their increasing usage. Data Security will be at the forefront of POS implementations with Restaurants having to increase their focus on vulnerabilities in their current systems and look to Cloud based systems to offer greater safeguards against hacks and data compromise. Finally, there seems a general agreement that a POS needs to be ready for the future, that is is extensible, up-gradable, and flexible to meet the rapid changes in technology in as bio metrics, payment methods (ie Bitcoin), new devices and services come to market. .
kaseyfl9568

Biometric Pos Terminals Market Is Projected to Increase at a CAGR of 12.7% During the F... - 0 views

  • The industry analysis was given on a worldwide scale, for instance, present and traditional biometric pos terminals growth analysis, competitive analysis, and also the growth prospects of the central regions
  • This biometric pos terminals report also claims they furnish and consumption amounts, import/export pace, in addition to earnings, price, price, and gross profit from the significant places, including both local and globa
  • product type, the market is primarily split into: Fingerprint Scanner, Palm Vein Scanner
  • ...5 more annotations...
  • It collects and analyzes the historical and current data and projects future market trends
  • The research findings mentioned in the report helps various collaborators to measure their accomplishment in industry and boost them to take proper decisions in the near future.
  • To analyze the global and key regions market potential and advantage, opportunity and challenge, restraints and risks
  • forecast (2018-2028) to allow stakeholders from the main market chances. An biometric pos terminals meticulous investigation of this market on the grounds of application aids in understanding the trends within the business
  • To sum up, with, the report provides comprehensive study covering all substantial features such as market volume, current and future market tendencies, grow revenue, supply chain analysis and cost of the product depending on the different geographical regions
  •  
    Are POS systems truly helpful in our industry? As we can see, they clearly add massive value to our industries. There is an investment in them, but as we spoke about in our last class, trying to see trends and never going "all in" on the newest systems is key. This article studies where the trend may go from 2018-2028. It is using massive data from all over globally to investigate trends to assist in businesses being profitable.
1 - 5 of 5
Showing 20 items per page