Fime has become one of the test laboratories able to perform Android biometric security evaluation. A growing number and variety of Android devices rely on face and fingerprint recognition for device unlock and user authentication.

All implementations must meet Android’s requirements to protect end-users. Fime is now helping smartphone OEMs, biometric component and software providers to evaluate anti-spoofing ability and achieve successful Android compliance.

Secure user experiences

Stephanie El Rhomri, VP Testing Services at Fime, comments: “To ensure stronger security, Android encourages its partners to have their biometric security evaluated by a test laboratory that meets Android requirements.”

Our experts and lab services have supported the biometric community to verify the performance and spoof attack detection biometric solutions for a range of standards. This is an exciting new offering to facilitate smoother, more secure user experiences.” From expert consultation to training, tools, laboratory validation services and tailored testing services. Fime helps the biometric and device OEM communities to launch innovations quickly, easily and safely.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...