In Which I “Nyah Nyah” Tongue Identification

(Part of the biometric product marketing expert series)

If you listen closely, you can hear about all sorts of wonderful biometric identifiers. They range from the common (such as fingerprint ridges and detail) to the esoteric (my favorite was the 2013 story about Japanese car seats that captured butt prints).

The butt sensor at work in a Japanese lab. (Advanced Institute of Industrial Technology photo). From https://www.cartalk.com/content/bottom-line-japanese-butt-sensor-protect-your-car

A former coworker who left the biometric world for the world of Adobe Experience Manager (AEM) expert consulting brought one of the latter to my attention.

Tongue prints.

This article, shared with me by Krassimir Boyanov of KBWEB Consult, links to this article from Science ABC.

As is usual with such articles, the title is breathless: “How Tongue Prints Are Going To Revolutionize Identification Methods.”

Forget about fingerprints and faces and irises and DNA and gait recognition and butt prints. Tongue prints are the answer!

Benefits of tongue print biometrics

To its credit, the article does point out two benefits of using tongue prints as a biometric identifier.

  • Consent and privacy. Unlike fingerprints and irises (and faces) which are always exposed and can conceivably be captured without the person’s knowledge, the subject has to provide consent before a tongue image is captured. For the most part, tongues are privacy-perfect.
  • Liveness. The article claims that “sticking out one’s tongue is an undeniable ‘proof of life.'” Perhaps that’s an exaggeration, but it is admittedly much harder to fake a tongue than it is to fake a finger or a face.

Are tongues unique?

But the article also makes these claims.

Two main attributes are measured for a tongue print. First is the tongue shape, as the shape of the tongue is unique to everyone.

From https://www.scienceabc.com/innovation/how-tongue-prints-are-going-to-revolutionize-identification-methods.html

The other notable feature is the texture of the tongue. Tongues consist of a number of ridges, wrinkles, seams and marks that are unique to every individual.

From https://www.scienceabc.com/innovation/how-tongue-prints-are-going-to-revolutionize-identification-methods.html

So tongue shape and tongue texture are unique to every individual?

Prove it.

Even for some of the more common biometric identifiers, we do not have scientific proof that most biometric identifiers are unique to every individual.

But at least these modalities are under study. Has anyone conducted a rigorous study to prove or disprove the uniqueness of tongues? By “rigorous,” I mean a study that has evaluated millions of tongues in the same way that NIST has evaluated millions of fingerprints, faces, and irises?

We know that NIST hasn’t studied tongues.

I did find this 2017 tongue identification pilot study but it only included a whopping 20 participants. And the study authors (who are always seeking funding anyway) admitted that “large-scale studies are required to validate the results.”

Conclusion

So if a police officer tells you to stick out your tongue for identification purposes, think twice.

Your Prospects Don’t Care About Your Technology

Technologists, you know how tough it is to create a technology product.

  • You have to assemble the technology, or perhaps create the technology yourself.
  • You have to work on the most minute details and make sure that everything is just right.
  • It takes a great deal of effort.

What if your product story is ignored?

But when you want to tell the story about your product, and all the effort you put into it, your prospects ignore everything you say. You might as well not be there.

Designed by Freepik. And yes, you need to woo your prospects.

Do you know why your prospects are ignoring you?

Because they don’t care about you. It’s all about them.

People want to satisfy their own needs

But the “it’s all about me” attitude is actually a GOOD thing, if you can harness it in your messaging. Let’s face it; we all have an “it’s all about me” attitude because we want to satisfy our needs.

  • You want to satisfy your own needs because you only care about selling your product.
  • I want to satisfy my own needs because I only care about selling Bredemarket’s services. (I’ll get to the selling part later.)
  • And your prospects want to satisfy their own needs because they only care about their problems. And because of your customers’ self-focus, they’re only going to care about your product if it solves their problems.

So when it’s time to tell the story about your product, don’t talk about your technology.

Adopt a customer focus

Instead of talking about you, talk about them.

From the Gary Fly / Brooks Group article “7 Tips for Implementing a Customer-Centric Strategy,” at https://brooksgroup.com/sales-training-blog/7-tips-implementing-customer-centric-strategy/

Adopt a customer focus and talk about things that your prospects care about, such as how your product will solve their problems.

  • Do your customers struggle for visibility, or awareness? Will your technology help their visibility?
  • Do your customers struggle when considered against the competition? Will your technology help them stand out?
  • Do your customers struggle to make money (conversion)? Will your technology help them make money?
  • Do your customers require better ease of use, speed, accuracy, or other benefits? Do the features of your technology provide those benefits?

In short, your customers need to understand how you can solve their problems.

How do you adopt a customer focus?

But how can you make sure that your story resonates with your prospects?

Perhaps you need a guide to work with you to craft your story. Yes, I can serve as a guide to solve YOUR problem.

If you’re interested in how Bredemarket, the technology content marketing expert, can help you create a customer-focused story for your prospects, find out how to create technology content that converts

Why Age-Restricted Gig Economy Companies Need Continuous Authentication (and Liveness Detection)

If you ask any one of us in the identity verification industry, we’ll tell you how identity verification proves that you know who is accessing your service.

  • During the identity verification/onboarding step, one common technique is to capture the live face of the person who is being onboarded, then compare that to the face captured from the person’s government identity document. As long as you have assurance that (a) the face is live and not a photo, and (b) the identity document has not been tampered, you positively know who you are onboarding.
  • The authentication step usually captures a live face and compares it to the face that was captured during onboarding, thus positively showing that the right person is accessing the previously onboarded account.

Sound like the perfect solution, especially in industries that rely on age verification to ensure that people are old enough to access the service.

Therefore, if you are employing robust identity verification and authentication that includes age verification, this should never happen.

By LukaszKatlewa – Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=49248622

Eduardo Montanari, who manages delivery logistics at a burger shop north of São Paulo, has noticed a pattern: Every time an order pickup is assigned to a female driver, there’s a good chance the worker is a minor.

From https://restofworld.org/2023/underage-gig-workers-brazil/

An underage delivery person who has been onboarded and authenticated, and whose age has been verified? That’s impossible, you say! Read on.

31,000 people already know how to bypass onboarding and authentication

Rest of World wrote an article (tip of the hat to Bianca Gonzalez of Biometric Update) entitled “Underage gig workers keep outsmarting facial recognition.

Outsmarting onboarding

How do the minors do it?

On YouTube, a tutorial — one of many — explains “how to deliver as a minor.” It has over 31,000 views. “You have to create an account in the name of a person who’s the right age. I created mine in my mom’s name,” says a boy, who identifies himself as a minor in the video.

From https://restofworld.org/2023/underage-gig-workers-brazil/
From https://www.youtube.com/watch?v=59vaKab4g2M. “Botei no da minha mãe não conta da minha.” (“I put it on my mother’s account, it doesn’t count on mine.”)

Once a cooperative parent or older sibling agrees to help, the account is created in the older person’s name, the older person’s face and identity document is used to create the account, and everything is valid.

Outsmarting authentication

Yes, but what about authentication?

That’s why it’s helpful to use a family member, or someone who lives in the minor’s home.

Let’s say little Maria is at home, during her homework, when her gig economy app rings with a delivery request. Now Maria was smart enough to have her older sister Irene or her mama Cecile perform the onboarding with the delivery app. If she’s at home, she can go to Irene or Cecile, have them perform the authentication, and then she’s off on her bike to make money.

(Alternatively, if the app does not support liveness detection, Maria can just hold a picture of Irene or Cecile up to the camera and authenticate.)

  • The onboarding process was completed by the account holder.
  • The authentication was completed by the account holder.
  • But the account holder isn’t the one that’s actually using the service. Once authentication is complete, anyone can access the service.

So how do you stop underage gig economy use?

According to Rest of World, one possible solution is to tattle on underage delivery people. If you see something, say something.

But what’s the incentive for a restaurant owner or delivery recipient to report that their deliveries are being performed by a kid?

“The feeling we have is that, at least this poor boy is working. I know this is horrible, but here in Brazil we end up seeing it as an opportunity … It’s ridiculous,” (psychologist Regiane Couto) said.

From https://restofworld.org/2023/underage-gig-workers-brazil/

A much better solution is to replace one-time authetication with continuous authentication, or at least be smarter in authentication. For example, a gig delivery worker could be required to authenticate at multiple points in the process:

  • When the worker receives the delivery request.
  • When the worker arrives at the restaurant.
  • When the worker makes the delivery.

It’s too difficult to drag big sister Irene or mama Cecile to ALL of these points.

As an added bonus, these authetications provide timestamps of critical points in the delivery process, which the delivery company and/or restaurant can use for their analytics.

Problem solved.

Except that little Maria doesn’t have any excuse and has to complete her homework.

Safety vs. Privacy in Montana School Video Surveillance

At the highest level, debates regarding government and enterprise use of biometric technology boil down to a debate about whether to keep people safe, or whether to preserve individual privacy.

In the state of Montana, school safety is winning over school privacy—for now.

The one exception in Montana Senate Bill 397

Biometric Update links to a Helena Independent Record article on how Montana’s far-reaching biometric ban has one significant exception.

The state Legislature earlier this year passed a law barring state and local governments from continuous use of facial recognition technology, typically in the form of cameras capable of reading and collecting a person’s biometric data, like the identifiable features of their face and body. A bipartisan group of legislators went toe-to-toe with software companies and law enforcement in getting Senate Bill 397 over the finish line, contending public safety concerns raised by the technology’s supporters don’t overcome individual privacy rights. 

School districts, however, were specifically carved out of the definition of state and local governments to which the facial recognition technology law applies.

From the Helena Independent Record.

At a minimum Montana school districts seek to abide by two existing Federal laws when installating facial recognition and video surveillance systems.

Without many state-level privacy protection laws in place, school policies typically lean on the Children’s Online Privacy Protection Act (COPPA), a federal law requiring parental consent in order for websites to collect data on their children, or the Family Educational Rights and Privacy Act (FERPA), which protects the privacy of student education records. 

From the Helena Independent Record.

If a vendor doesn’t agree to abide by these laws, then the Montana School Board Association recommends that the school district not do business with the vendor.

Other vendors agree. Here is the statement of one vendor, Verkada (you’ll see them again later) on FERPA:

The Family Educational Rights and Privacy Act was passed by the US federal government to protect the privacy of students’ educational records. This law requires public schools and school districts to give families control over any personally identifiable information about the student.

Verkada provides educational organizations the tools they need to maintain FERPA compliance, such as face blurring for archived footage.

From https://www.verkada.com/security/#compliance

Simms High School’s use of the technology

How are the schools using these systems? In ways you may expect.

(The Sun River Valley School District’s) use of the technology is more focused on keeping people who shouldn’t be on school property away, he said, such as a parent who lost custody of their child.

(Simms) High School Principal Luke McKinley said it’s been more frequent to use the facial recognition technology during extra-curricular activities, when football fans get too rowdy for a high school sports event. 

From the Helena Independent Record.

Technology (in this case from Verkada) helps the Sun River School District, especially in its rural setting. Back in 2022, it took law enforcement an estimated 45 minutes to respond to school incidents. The hope is that the technology could identify those who engaged in illegal activity, or at least deter it.

What about other school districts?

When I created my educational identity page, I included the four key words “When permitted by law.” While Montana school districts are currently permitted to use facial recognition and video surveillance, other school districts need to check their local laws before implementing such a system, and also need to ensure that they comply with federal laws such as COPPA and FERPA.

I may be, um, biased in my view, but as long as the school district (or law enforcement agency, or apartment building owner, or whoever) complies with all applicable laws, and implements the technology with a primary purpose of protecting people rather than spying on them, facial recognition is a far superior tool to protect people than manual recognition methods that rely on all-too-fallible human beings.

Android mobile driver’s licenses? It’s complicated.

At least in the United States, the mobile driver’s license world is fragmented.

Because driver’s license issuance in the U.S. is a state and not a federal responsibility, each state has to develop its own mobile driver’s license implementation. Subject to federal and international standards, of course.

To date there have been two parties helping the states with this:

  • mDL vendors such as Envoc and IDEMIA, who work with the states to create mDLs.
  • Operating system vendors such as Apple and Google, who work with the states to incorporate mDLs in smartphone wallets.

But because the Android ecosystem is more fragmented than the iOS ecosystem, we now have a third party that is involved in mDLs. In addition to mDL vendors and operating system vendors, we also have really large smartphone providers.

Enter Samsung:

Samsung Electronics America today announced it is bringing mobile driver’s licenses and state IDs to Samsung Wallet. Arizona and Iowa will be the first states to offer a mobile version of its driver’s license to their residents. The update expands the Samsung Wallet experience by adding a convenient and secure way to use state-issued IDs and driver’s licenses

From https://news.samsung.com/us/samsung-idemia-bring-mobile-drivers-licenses-samsung-wallet-arizona-iowa-first-states-rollout/

(For those who have seen prior references to Samsung in the Bredemarket blog, rest assured that this information is public and Samsung won’t get harmed if you feed it to ChatGPT or Bard or whoever.)

In this particular case Samsung is working with IDEMIA (the mDL provider for Arizona and Iowa), but Samsung announced that it is working with other states and with the Transportation Security Administration (TSA).

While there are underlying standards (most notably ISO/IEC 18013-5, previously discussed here) that govern the implementation of mobile driver’s licenses, there is still a dizzying array of options.

On a personal note, I’m still working on validating my driver’s license for California’s pilot mDL program. It probably didn’t help that I renewed my physical driver’s license right in the middle of the mDL validation process.

I Let Generative AI Write a First Draft

I’ve previously shared my approach to the use and non-use of generative artificial intelligence (generative AI). One of my primary practices is to never let the generative AI tool write the first draft of anything I prepare for a Bredemarket consulting client. (Or an employer.)

Well, hardly ever.

I just made an exception to my “no bots on the first draft” approach. (The Product Marketing Alliance made me do it.)

The setting

I recently attended the Product Marketing Alliance’s “Masters of Product Marketing” webinar, and the Wednesday morning (my time) workshop was led by Elliott Rayner of ARION.

The title? “Workshop – AI-powered storytelling: the definitive guide.”

Red flags. The “temperamental writer” side of me always reacts negatively at the suggestion that a person turn the writing process over to a bot.

From the Röyksopp official video for “The Girl and the Robot.” Full video at https://www.youtube.com/watch?v=sPqnxFgCrhg

Happily for me, Rayner uses generative AI as a brainstorming tool, not as a tool to create real content.

In the workshop, Rayner asked each of us to use generative AI as a tool to create a story using Joseph Campbell’s “hero’s journey” structure, with a specific emphasis on overcoming the monster.

Medusa by Arnold Böcklin, circa 1878. Originally uploaded at en.wikipedia: 04:18, 5 March 2004 . . Perl, Public Domain, https://commons.wikimedia.org/w/index.php?curid=14403

Here is the generic prompt that Rayner shared with the workshop participants (note that this should be Christopher Booker, not Charles Brooker; generative AI figured things out anyway):

“Using Charles Brooker’s plot framework “Overcoming the monster” can you write a product campaign narrative for the brand BLANK who are on a mission to BLANK. Please place focus on the customer overcoming the pain paint of BLANK within the market segment of BLANK”

From the Product Marketing Alliance workshop

My prompt

So I took the prompt above and modified it for Bredemarket.

“Using Charles Brooker’s plot framework “Overcoming the monster” can you write a product campaign narrative for the brand Bredemarket who are on a mission to equip customers with superior marketing content. Please place focus on the customer overcoming the pain paint of addressing customer needs within the market segment of financial services”

While Elliott used ChatGPT for his generative AI engine, I used Bard. The next section contains Bard’s response to the prompt above.

Bredemarket: Overcoming the Monster of Marketing

Plot:

Once upon a time, in the competitive and ever-changing world of financial services, there lived a company called Bredemarket. Bredemarket’s mission was to equip customers with superior marketing content, but they faced a daunting challenge: how to address the pain point of addressing customer needs within a complex and ever-evolving market segment?

Bredemarket knew that the key to overcoming this monster was to create marketing content that was both informative and engaging. They needed to create content that would educate customers about their products and services, while also inspiring them to take action.

To do this, Bredemarket assembled a team of experienced and talented marketers who were experts in the financial services industry. Together, they developed a comprehensive content strategy that included a variety of formats, such as blog posts, infographics, e-books, and videos.

Bredemarket’s content was also highly targeted. They took the time to understand the needs of their target audience and created content that was specifically relevant to them. This approach helped Bredemarket to build trust and credibility with their customers.

Over time, Bredemarket’s content marketing efforts began to pay off. They saw an increase in website traffic, leads, and sales. Their customers were also more engaged and satisfied than ever before.

Conclusion:

Bredemarket’s story is a testament to the power of content marketing. By creating informative and engaging content that addresses customer needs, Bredemarket was able to overcome the monster of marketing and achieve success.

How Bredemarket can help financial services companies overcome the monster of marketing:

Bredemarket understands the unique challenges that financial services companies face when it comes to marketing. That’s why they offer a variety of services that can help companies overcome these challenges and achieve their marketing goals.

Bredemarket’s services include:

Content strategy development

Content creation

Content distribution

Content marketing analytics

Bredemarket also offers a variety of industry-specific content packages that are specifically designed for financial services companies. These packages include content that covers a wide range of topics, such as:

Financial planning

Retirement planning

Investing

Insurance

Mortgages

If you’re a financial services company that’s struggling to address customer needs with your marketing content, Bredemarket can help. With their expertise and experience in the financial services industry, they can help you create content that is both informative and engaging, and that will help you achieve your marketing goals.

My observations on the result above

So here’s what I think of Bard’s work.

  • If I took time to improve the prompt, I probably could have received a better result. I’ve previously said that you may have to go through five iterations of a generative AI prompt to get satisfactory results, which led to my conclusion that AI yields results in five minutes (and that humans will therefore be pressured to yield quick results also). So if I took the time to tweak the prompt, rather than just going with the first result I received, I’d get a better story. For example, rather than using the term “financial services,” perhaps I should have used “financial identity verification” to hone in on my interest in financial identity.
  • Hallucination is rampant in the text. When generative AI doesn’t know something, it loudly asserts what it doesn’t know. Bard obviously doesn’t know a lot about Bredemarket, but it loudly proclaimed that I provide “retirement planning.” (If I knew anything about retirement planning, I’d retire by now.) And the idea of the “team of experienced and talented marketers” is kinda sorta inaccurate. You just have me.
  • The tone of voice is all wrong. One reason that I would never use this result for real is because it is not in Bredemarket’s conversational tone of voice. And it would be unusual for me to tell an odyssey. I’ll leave that to John Sculley. To get Bard to write like me, perhaps I can design a prompt that includes the words “mention wildebeests a lot in the response.”
  • Despite these drawbacks, the exercise was helpful as a brainstorming tool. It provides a framework that would allow me to write a REAL post about how Bredemarket can help financial firms (and vendors to such firms) communicate a customer-focused message about financial identity.

So in the end, it was a worthwhile exercise.

Postscript

This isn’t the first time that I’ve written about the song “The Girl and the Robot.” Roughly a decade ago, I wrote a piece for the online MungBeing Magazine entitled “Robots Dot Txt.” This wasn’t about the official video for the song, but another video documenting a “live” performance of the song.

From https://www.youtube.com/watch?v=aRy8oG-6Kxc

Here’s part of what I wrote for MungBeing:

So in the Senkveld performance, Robyn and Röyksopp (and Davide Rossi and Anneli Drecker, not present on stage but present nevertheless) make me happy by becoming flesh-and-blood robots themselves, capably performing a variety of often complex human tasks that were programmed in a recording studio several months previously.

From https://www.mungbeing.com/issue_42.html?page=13#3304

And this was years before “the end of Kwebbelkop AI.” (Watch to the end.)

From https://www.youtube.com/watch?v=HrJWZezQwNw

As Digital “Health Certifications” Advance (sort of), Paper Health Certifications Recede

Back in June I wrote about the Global Digital Health Certification Network (GDHCN), a post-COVID way to digitally exchange information about a person’s vaccination status—not just for COVID, but for any future pandemic.

This effort is being pioneered by WHO.

It seems to me they give these vaccine certificates now-a-days very peculiar names. By Public Domain – Snapshot Image – https://archive.org/details/ClassicComedyTeams, Public Domain, https://commons.wikimedia.org/w/index.php?curid=25914575

But as we continue to advance digital health identities, the United States is no longer producing a well-known physical identity document.

It’s the end of an era for a once-critical pandemic document: The ubiquitous white COVID-19 vaccination cards are being phased out.

Now that COVID-19 vaccines are not being distributed by the federal government, the U.S. Centers for Disease Control and Prevention has stopped printing new cards.

From https://apnews.com/article/covid-vaccine-cdc-medical-record-a70eb7f3f32b961eae1a7bf69175ad11

This doesn’t affect the validity of current cards. It just means that if you get a COVID vaccine, or any future vaccine, and you need to prove you obtained it, you will have to contact the medical facility who administered it.

Or, in selected states (because in the U.S. health is generally a state and not a federal responsibility), you can access the state’s digital health information. For example, the state of Washington offers MyIRmobile, as do the states of Arizona, Louisiana, Maryland, Mississippi, North Dakota, and West Virginia.

Sign up for MyIR Mobile by going to myirmobile.com and follow the registration instructions. Your registration information will be used to match your records with the state immunization registry. You will be sent a verification code on your phone to finalize the process. Once registration is complete, you’ll be able to view your immunization records, Certificate of Immunization Status (CIS) and access your COVID-19 vaccination certificate.

From https://doh.wa.gov/you-and-your-family/immunization/access-your-familys-immunization-information

I have no idea if MyIR Mobile conforms to GDHCN; neither the phrase nor the acronym is mentioned on the MyIR Mobile website.

My own state of California has its own digital vaccine record, but frankly it’s kind of clunky. Again, I don’t know if California conforms to GDHCN.

So maybe digital health certifications are not advancing.

Copying the Competition Doesn’t Differentiate You (Trust Me)

Why does everyone think that “me too” is the stepping stone to success?

Let’s discuss:

“Me too” in music

Years ago I worked at my college’s 10 watt radio station, and therefore had access to a lot of records (yes, this was a long time ago).

And one of those records was so unmemorable that it was memorable.

The album, recorded in the early to mid 1960s, trumpeted the fact that the group that recorded the album was extremely versatile. You see, the record not only included surf songs, but also included car songs!

The only problem? The album was NOT by the Beach Boys.

By Capitol Records – Billboard, page 73, 11 September 1965, Public Domain, https://commons.wikimedia.org/w/index.php?curid=26923920

Instead, the album was from some otherwise unknown band that was trying to achieve success by doing what the competition did. (In this case, the Beach Boys.)

I can’t remember the name of the band, and I bet no one else can either.

“Me too” in computing and lawn care

Sadly, this tactic of Xeroxing (or Mitaing) the competition is not confined to popular music. Have you noticed that so many recipes for marketing success involve copying what your competitors do?

  • Semrush: “Analyze your competitors’ keywords that you are not ranking for to discover gaps in your SEO strategy.”
  • iSpionage: “If you can emulate your competitors but do things slightly better you have a good chance of being successful.”
  • Someone who shall remain nameless: “Look at this piece of collateral that one of our competitors did. We should do something just like that.”

And of course the tactic of slavishly copying competitors has been proven to work. For example, remember when Apple Computer adopted the slogan “Think The Same” as the company dressed in blue, ensured all its computers could run MS-DOS, and otherwise imitated everything that IBM did?

By Carlos Pérez Ruiz – originally posted to Flickr as Apple Macintosh 128Kb naked, CC BY-SA 2.0, https://commons.wikimedia.org/w/index.php?curid=10397868

OK, maybe not.

“But John,” you are saying. “That’s unfair. Not everyone can be Apple.”

My point exactly. Everyone can’t be Apple because they’re so busy trying to imitate someone else—either a competitor or some other really popular company.

Personally, I’m waiting for some company to claim to be “the Bredemarket of satellite television. (Which would simply mean that the company would have a lot of shows about wildebeests.) But I’ll probably have to wait a while for some company to be the Bredemarket of anything.

Black wildebeest. By derekkeats – Flickr: IMG_4955_facebook, CC BY-SA 2.0, https://commons.wikimedia.org/w/index.php?curid=14620744

(An aside: while talking with a friend, I compared the British phrase “eating your pudding” to the American phrase “eating your own dog food,” although I noted that “I like to say ‘eating your own wildebeest food‘ just to stand out.” Let’s see ChatGPT do THAT.)

“Me too” in identity verification

Now I’ll tread into more dangerous territory.

Here’s an example from the identity/biometric world. Since I self-identity (heh) as the identity content marketing expert, I’m supremely qualified to cite this example.

I spent a year embedded in the identity verification industry, and got to see the messaging from my own company and by the competition.

After a while, I realized that most of the firms in the industry were saying the same thing. Here are a few examples. See if you can spot the one word that EVERY company is using:

  • (Company I) “Reimagine trust.”
  • (Company J) “To protect against fraud and financial crime, businesses online need to know and trust that their customers are who they claim to be — and that these customers continue to be trustworthy.”
  • (Company M) “Trust is the core of any successful business relationship. As the digital revolution continues to push businesses and financial industries towards digital-first services, gaining digital trust with consumers will be of utmost importance for survival.”
  • (Company O) “Create trust at onboarding and beyond with a complete, AI-powered digital identity solution built to help you know your customers online.”
  • (Company P) “Trust that users are who they say they are, and gain their trust by humanizing the identity experience.”
  • (Company V) “Stop fraud. Build trust. Identity verification made simple.”

Yes, these companies, and many others, prominently feature the t-word in their messaging.

Don’t “me too” in identity verification

Now perhaps some of you would argue that trust is essential to identity verification in the same way that water is essential to an ocean, and that therefore EVERYBODY HAS to use the t-word in their communications.

Don’t tell that to Black Ink Tech, who uses the trademark “Truth Over Trust.”

And no, they didn’t violate any law by using an unapproved word. Instead, they got attention by standing out from the crowd.

Here’s another example that I can’t discuss fully, but I’ll say what I can.

I was talking to a Bredemarket biometric content prospect (not one of the ones listed above), and as is my practice, I started by asking the “why” question.

After all, if I was going to create content for this prospect, we had to ensure that the content stood out from their competitors.

Without revealing confidential information, I can say that I asked the firm why they were better than every other firm out there, and why all the other firms sucked. And the firm provided me with a compelling answer to that question. I can’t reveal that answer, but you can probably guess that the word “trust” was not involved.

A final thought

So let me ask you:

Why is YOUR firm better than every other firm out there, and why do all or YOUR competitors suck?

Your firm’s survival may depend upon communicating that answer.

Take care of yourself, and each other.

Jerry Springer. By Justin Hoch, CC BY 2.0, https://commons.wikimedia.org/w/index.php?curid=16673259

A Marketing Question, Not An Identification Question: Is Facial Coding Accurate?

While I don’t use all the marketing tools at my disposal, I am certainly curious about them. After all, such tools provide marketers with powerful insights on their prospects and customers.

I became especially curious about one marketing tool when re-examining a phrase I use often.

  • I use the phrase “biometric content marketing expert” in a non-traditional way. When I use it, I am attempting to say that I am a content marketing expert on the use of biometrics for identification. In other words, I can create multiple types of content that discusses fingerprint identification, facial recognition, and similar technologies.
  • But if you speak to a normal person, they will assume that a “biometric content marketing expert” is someone who uses biometrics (the broader term, not the narrower term) to support content marketing. This is something very different—something that is generally known as “facial coding,” a technique that purports to provide information to marketers.

What is facial coding?

By Peter Ziegler – Pixaby, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=63519842

Earlier this year, Reshu Rathi of Entropik wrote a blog post about facial coding. Rathi provided this definition.

We all know that our face conveys emotions through facial expressions; facial coding is the process of measuring those human emotions. With the help of computer vision, powered by AI and machine learning, emotions can be detected via webcam or mobile cam. The tech tracks every muscle movement on the face or all-action units (AU) based on the FACS (facial action coding system).

From https://www.entropik.io/blogs/facial-coding-what-why-and-how-to-use-facial-coding-in-marketing

The differences between facial coding and facial recognition

Unlike the topics in which I usually dwell, facial coding:

  • Does not identify individuals. Many people can share the same emotions, so detection of a particular emotion does not serve as individualization.
  • Does not provide permanent information. In the course of watching a movie or even a short advertisement, viewers often exhibit a wide range of emotions. Just because you exhibit a particular emotion at the beginning of an ad doesn’t mean you’ll exhibit the same emotion at the conclusion.
From https://www.youtube.com/watch?v=TnzFRV1LwIo

As Rathi describes the practice, it preserves privacy by allowing people to opt-in, and to record the emotions anonymously.

So, the user’s permission is required to access their camera and all this data is captured with consent. And no video is shared. Only the emotion data of the users are captured through their facial expressions and shared in real-time. The emotions on a person’s face are captured as binary units (0 and 1). Hence no PII (Personally Identifiable Information) related to race, ethnicity, gender, or age is captured at any point in time.

From https://www.entropik.io/blogs/facial-coding-what-why-and-how-to-use-facial-coding-in-marketing

Of course, some of this is a matter of implementation, or in the way that Entropik uses the facial coding technique.

  • But what if another firm chooses to gather more data, thus reducing the anonymity of the data collected? “I don’t only want to know how people react to the content. I want to know how black women in their 30s react to the content.”
  • And what if another firm (or a government agency, such as the Transportation Security Administration) chooses to gather the data without explicit consent, or with consent buried deep in the terms of service? In that case, people may not even realize that their facial expressions are being watched.
By Paweł Zdziarski – Own work, CC BY 2.5, https://commons.wikimedia.org/w/index.php?curid=1906323

Examining facial expressions is not the only way to decipher what is happening in a person’s mind as they view content. But it’s powerful.

Well, maybe.

Does everyone exhibit the same facial coding?

The underlying assumption behind emotion recognition is that you can identify emotions at a universal level. If content makes me happy, or if it makes a person halfway around the world happy, we will exhibit the same measurable facial characteristics.

Lisa Feldman Barrett disagrees.

Research has not revealed a consistent, physical fingerprint for even a single emotion. When scientists attach electrodes to a person’s face and measure muscle movement during an emotion, they find tremendous variety, not uniformity. They find the same variety with the body and brain. You can experience anger with or without a spike in blood pressure. You can experience fear with or without a change in the amygdala, the brain region tagged as the home of fear.

When scientists set aside the classical view and just look at the data, a radically different explanation for emotion comes to light. We find that emotions are not universal but vary from culture to culture. They are not triggered; you create them. They emerge as a combination of the physical properties of your body, a flexible brain that wires itself to whatever environment it develops in, and your culture and upbringing.

From https://www.theguardian.com/lifeandstyle/2017/mar/26/why-our-emotions-are-cultural-not-hardwired-at-birth

If Barrett is correct, then how reliable is facial coding, even within a particular region? After all, even Southern California does not have a single universal culture, but is made up of many cultures in which people react in many different ways. And if we preserve privacy by NOT collecting this cultural information, then we may not fully understand the codings that the cameras record.

Back to the familiar “biometric” world

And with that, I will retreat from the broader definition of biometrics to the narrower and more familiar one, as described here.

The term “Biometrics” has also been used to refer to the field of technology devoted to the identification of individuals using biological traits, such as those based on retinal or iris scanning, fingerprints, or face recognition. Neither the journal “Biometrics” nor the International Biometric Society is engaged in research, marketing, or reporting related to this technology. 

From https://www.biometricsociety.org/about/what-is-biometry

My self-description as a biometric content marketing expert applies to this narrower definition only.