Skip to content

訊連科技 FaceMe® 人臉辨識以完美防偽能力 通過 iBeta 活體辨識 Level 2 測試

【2022年3月22日,台北訊】AI 人臉辨識領導廠商訊連科技(5203.TW)宣布旗下 FaceMe® 人臉辨識引擎之活體防偽技術,通過 iBeta 的 PAD 測試 Level 2(Presentation Attack Detection,活體冒用攻擊)。iBeta Level 2 測試係透過高精度之 3D 面具進行人臉辨識技術之活體冒用攻擊。訊連科技 FaceMe® 於該項測試中,以 0% 之攻擊破解率(意即可 100% 之防止活體冒用)之佳績通過測試,證明 FaceMe® 為適用於金融、網路交易、遠距身分認證等安全係數要求較高之生物辨識解決方案。

iBeta 為全球少數獲得美國國家標準暨技術研究院 (NIST, U.S. National Institute of Standards and Technology) 之國家實驗室自願認可程序 (NVLAP, National Voluntary Laboratory Accreditation Program) 認證的生物特徵測試實驗室。iBeta 的 PAD 測試是依據 ISO/IEC 30107-3 標準進行的活體冒用攻擊測試,為人臉辨識防偽技術的全球產業公認標準,測試結果深受市場信賴。

FaceMe® 於去 (2021) 年下半年通過 iBeta PAD Level 1 測試,該測試主要以 2D 照片與影片進行。而此次 Level 2 測試則以更精細的 3D 列印面具、樹脂面具、乳膠面具等,進行活體冒用攻擊測試。FaceMe® 的攻擊遭破解率為 0% (APCER, Attack Presentation Classification Error Rate),代表 FaceMe® 能有效阻擋任何形式之 3D 偽造。此外,FaceMe® 的真人拒認率 (BPCER, Bona Fide Presentation Classification Error Rate) 在 iOS 裝置上僅 1.5%、在 Android 裝置上僅 2.5%。換言之,當測試標的為真人時,FaceMe® 可分別達到 98.5% 與  97.5% 的成功辨識率,以生物辨識詐欺防範而言,為市面上最優秀的人臉辨識解決方案。穩健的活體辨識與防偽技術,在需要遠端認證用戶身分,如:使用網路銀行、購買年齡限制商品,或居家辦公連到公司內網時,尤為重要。

「生物辨識詐欺防範,是金融科技等領域的當務之急;任何安全漏洞都可能造成災難性的影響。此外,用戶要從遠端存取機敏資料,也讓遠端身分驗證的需求爆炸性增長。」訊連科技董事長兼執行長黃肇雄表示。「iBeta PAD 是人臉辨識領域中,廣受全球肯定的活體防偽測試,一向被視為國際標準。FaceMe® 這次以完美的成績通過 Level 2 測試,意味著我們是頂尖的人臉辨識解決方案,能有效防止生物辨識詐欺情形,即便碰上最複雜的 3D 面具攻擊也不成問題。」

FaceMe® 可於各式硬體裝置上運行,包括高階工作站,或 IoT、AIoT 裝置中常見的低功耗晶片裝置皆可導入,是市面上功能最全面且易用的人臉辨識解決方案。FaceMe® 讓系統整合商得以更快速、可靠、精準且彈性的方式,將人臉辨識技術導入門禁安控、公共安全、金融科技、智慧零售或智慧居家等不同應用場景中。

CyberLink FaceMe® iBeta 活體冒用攻擊 (Presentation Attack Detection) 測試報告請參閱:

https://www.ibeta.com/wp-content/uploads/2022/03/220304-CyberLink-PAD-Level-2-Confirmation-Letter.pdf

關於Version 2
Version 2 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括中國大陸、香港、澳門、臺灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

MFA on RDP: what are the options?

RDP (Remote Desktop Protocol) is one of the most used technologies for access to server based applications or desktops and to enable remote user access. Unfortunately, using RDP in its simplest forms is a huge security risk. The UK NCSC (National Cyber Security Centre) has identified unprotected RDP to be the #1 reason for ransomware attacks (more on this topic). And these antics take can take place really, really fast…

A “honeypot” experiment from Unit 42 in the summer of 2021 found that 80% (!) of its unprotected RDP setups was hacked within 24 hours. Ouch. And these attacks are not isolated: on average, the honeypot RDP environments are attacked every 11 hours.

Multi-factor authentication

One of the recommendations to protect RDP environment from getting hacked is to add MFA (Multi-Factor Authentication). Note that this is one of but far from the only recommendation.

You‘d think the fact that many businesses are not using MFA on top of the RDP today is because there is a lack of solutions. However, the opposite is true: the number of options in the MFA space are as plenty as there are fish in the ocean. At Awingu, we also provided built-in MFA capabilities as part of the product since day 1.

The purpose of this post is to bring some structure into your options. We’ll add some specific vendor solutions, but keep in mind that there are many players in this domain. Rather than comparing vendors, let’s look into the architecture, the complexity of setup and the cost elements in play. We’re not making any analysis (or judgement) on which MFA token generation is better than other in this blog: e.g. is SMS as a token as secure as a time-based token generated on a phone?, etc.

The high-level options of MFA

On the highest level, MFA can be added on top of RDP by using:

  • An MFA vendor/product such as Duo Security, OKTA MFA, … and many more;
  • Using an external Identity Provider (IdP) and the MFA services linked to this IdP. Specifically we look at Microsofts Azure AD and the linked Azure MFA service. (more on the setup and requirements);
  • Using a VPN (let’s assume with an MFA-based authentication) before enabling access to the RDP service. It would still be best practice to add MFA on top of the RDP service additionally;
  • Certificate-based authentication where the certificate sort-of takes the role of the second factor;
  • Awingu, a browser based remote access solution that makes RDP-based apps/desktops available in HTML5 (on any browser). Awingu comes built-in with MFA options and enables combinations with (1) third-party MFA products and (2) Identity Providers (IdP).


MFA solutions comparison chart

In this comparison, we have made a distinction between (a) Remote desktop deployments that leverage the RDP client to launch RDP services and (b) deployments with Remote Desktop Gateway. The latter is a web application that enables launching RDP services from the browser and from there opening a config file that will push the locally installed RDP client on the device to open. The benefit of using a Remote Desktop Gateway is that only port 443 (https) is open. Option (a) requires opening port 3389 for external use, which is a no-go from a security point-of-view.

For completeness sake: Awingu does not require the use of RD Gateway. It connects over RDP to RD Session hosts (server of desktop) and then acts as an HTML5 Gateway, making all sessions available in https in the browser (using just port 443). RDP as such is not made available externally. While Awingu replaces the need for RD Gateway, it actually offers tons more.

Comparing the MFA options

Dare to compare… even if it feels a bit like comparing apples with oranges. We’ve tried to come with a perspective on:

  • Complexity: the more complex, the more room for failure and the more time-consuming;
  • Cost: what are the different elements that need to be purchased or installed (e.g. consuming infrastructure)?;
  • Any device access: this could be relevant when you, for example, allow BYOD for your employees, or when you have external users (such as contractors) that access your RDP services;
  • Relative Risk Assessment: the most tricky of them all. For one, because the (correctness of the) deployment itself plays a big role. And for two, because there are differences within each category (for which we’re making full abstraction).


MFA solutions comparison chart

How does Awingu fit the MFA list?

Awingu is not an MFA product. If you ask Gartner, Awingu is a Unified Workspace. It aggregates different applications (and desktops and file servers) and makes them available in the browser via its ‘RDP-to-HTML5’ gateway. These can be RDP-based services, but could also be web applications (that leverage the Awingu Reverse Proxy). Having all applications available in a browser is really convenient: there is no local data on the device, and I can work from any device (whatever the formfactor).


Awingu workspace

Next to offering a ‘workspace’, Awingu really adds a lot of ‘Zero Trust‘ security capabilities. Especially on top of typically vulnerable RDP environments, these are very interesting because all security features are part of the same product and they can be activated and managed from the same Awingu management console (via the Awingu System Settings).


Zero Trust features of Awingu

ne of the built-in features is… MFA. Awingu will enable Time-based (TOTP) as well as Counter-Based (HOTP) token generation. And end-users can just install an authenticator App on their phones such as Microsoft Authenticator or Google Authenticator. It is all part of the package. (How to install MFA in Awingu? Easy, take a look at our MFA technical session video.)

If you desire more token options, then Awingu can enable using other systems as well (such as RADIUS based services, or DUO security, or IdP based services such as Azure MFA or IdenProtect.)

Curious to know what the one thing is that all Awingu customers and partners like? Well, it’s the fact that Awingu is so simple to set up and manage. This simplicity is driven by the architecture: a simple virtual appliance that can be installed in your cloud (infrastructure) of choice. The Awingu Virtual Appliance will then act as a gateway and connect using standard protocols to your back-end: RDP, WebDAV, CiFS, …


Architecture of Awingu

This means you don’t need to install (or manage) anything extra in the back-end. And also towards the end-user device there is nothing to install. The only thing they need is a browser (be it on a Chromebook, iPad or Windows device…).

What is the cost of Awingu?

Our recommended end-user pricing is publicly available. The smallest deployment has 20 concurrent users. Other than the user-based Awingu licensing, the only extra cost that applies is one (or more) virtual machines (and RDS CALs, but for the sake of this blog post: all solutions will require RDS CALs).

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Awingu
Awingu produces a browser-based Unified Workspace solution. It allows users to work and collaborate from virtually anywhere using any device compatible with HTML5 browsers. As a turnkey solution, Awingu offers businesses the ease and convenience of platform-independent mobility and offers everything you need to stay productive: legacy and cloud applications, documents and data. Awingu requires zero configuration and zero client software installation, making IT administration extremely simple.

Safetica NXT – SaaS DLP introduction

Safetica NXT, the next-gen SaaS DLP, is a cloud-native solution with super-easy management and flexible subscription. Its risk-driven incident detection is powered by data analytics.

With Safetica NXT, you get:

  • Data discovery (Full audit of sensitive data flow)
  • Data protection (setting up of data protection rules)
  • Incident detection and response (risk assessment)
  • Regulatory compliance (GDPR, HIPPA, PCI-DSS)
  • Fast alerts and intuitive reports

Information at your fingertips:

Overview of the Safetica NXT environment

When opening Safetica NXT, you will land on the Dashboard. It will give you an overview of the most pressing issues that transpired in the environment and show you what might need your attention.

The Data security section lets you scan files for sensitive data, create your own rules for risk detection, create your own protection rules, and investigate detected events for data leaks.

The Workspace section displays the results of our smart detection in your company’s digital workspace, so you can immediately see which web upload domains, outgoing email domains, and external devices (USBs) can be considered as safe or which ones needs to be reviewed. In this section you can also move safe domains and devices into a safe zone.

The Employees section lets you see the number of protected users, their risky events and endpoint use. You can install Safetica to a new endpoint by visiting the endpoint tab.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×