IB360° Launch Week Recap

(Imagen 4. A slight hallucination.)

Here’s a recap of all IB360° online content as of Friday September 12.

Integrated Biometrics (IB) public-facing IB360° content

The IB360° product page is here. It also includes the following downloads:

  • IB360 Overview
  • IB360 for Integrators: IB360 for Software Integrators | IB360 for Hardware Integrators | IB360 for Systems Integrators
  • IB360 Build Your Own Biometrics: IB360 SW BYOB | IB360 HW BYOB
  • IB360 Interviews: IB360 Spotlight Werner Cilliers

The IB360° press release is here.

The IB360° article “Navigating Identity Market Evolution with IB360 Software Integrator Solution” is here.

Bredemarket commentary on the above

Yes, I have commented on the items above.

Bredemarket posts to date are listed below, and can also be found at the IB360 tag.

Other commentary on the above

For those of you with a keen eye, Biometric Update mentioned IB360 over a year ago, back in September 2024.

Identity Market Evolution

(Imagen 4)

(Part of the biometric product marketing expert series)

I previously promised that I’d discuss why Integrated Biometrics felt the need to introduce IB360 for its partners.

Integrated Biometrics has identified four evolutionary changes in the identity market that prompt the need for such a solution.

I’m going to limit my thoughts to two of the four changes that Integrated Biometrics mentioned.

Decentralized systems

When I started in the biometrics industry in 1994, an automated fingerprint identification system (AFIS) was usually a centralized system. Tenprint and latent examiners at the state capital (there was no federal IAFIS back then) would work in buildings at or near a huge minicomputer that held the state’s fingerprint records. Perhaps there may have been a few remote tenprint and latent workstations connected by modem, and perhaps there were some livescan stations scattered around, but for the most part these client/server systems had a single server in a state computer room. (Well, except for the Western Identification Network, but WIN was ahead of its time.)

Fast forward 30 years, and while this model may work in the United States, it may not work elsewhere.

What if you don’t have internet or cellular communications? (Yes, cellular. Modern edge devices are a topic addressed in the Integrated Biometrics article that I won’t go into here.)

Or what if the communications are so incredibly slow that it would take forever to submit a search to the capital city, and return results to the originator?

This is where decentralized systems come into play. Rather than requiring everyone to ping the same central hub, the biometric database is distributed and synchronized among multiple servers in multiple locations.

Or maybe you’re getting ahead of me here and realizing that “servers” is too limiting. What if you could put all or part of a biometric database on your smartphone, so you can search a captured biometric against a database immediately without waiting for network communication time?

Such decentralized systems were impossible in 1994, but they are certainly possible today. And IB360 lets partners build their own biometric systems with decentralization and synchronization.

Speaking of building…

Demand for speed

As I mentioned, I’ve been in the biometric industry since 1994, and although my early years were spent in a pre-contract proposals role, I’ve seen enough post-contract deployments to know that they take a long time. Whether you were dealing with Printrak, NEC, Sagem Morpho, or the upstart Cogent, it would take many months if not years to deploy a fingerprint system.

  • For the most part, this is still true today with “pre-made” systems from NEC, IDEMIA, Thales, and the others.
  • And it’s also true if you decide to deploy your own “custom-built” fingerprint or biometric system from scratch.

Either way, there is a lot of engineering, integration, and orchestration that must take place before a system is deployed. You can’t take an AFIS for Bullhead City, Arizona and deploy it in Anaheim, California…or the state of Tennessee…or the nation of Switzerland. You need to perform months of tailoring/configuration first.

Integrated Biometrics asserts that waiting years for a biometric system is far too long.

Other changes

I’ll let you read the Integrated Biometrics article to learn about the other two evolutionary changes: more powerful hardware (I’ve alluded to this), and a myriad of use cases.

All of these changes have impacted the biometric market, and prompted Integrated Biometrics to introduce IB360. To read about this modular software suite and its benefits, visit the IB360 product page.

Build Your Own (Integrated) Biometrics with IB360°

(Imagen 4. A slight hallucination.)

Now it can be told.

Integrated Biometrics made an announcement earlier today.

But not a hardware announcement about some new fingerprint or palm print scanner named after a 1970s crime fighter.

Book ’em, Danno! By CBS Television – eBay item photo front photo back, Public Domain, https://commons.wikimedia.org/w/index.php?curid=19674714.

A software announcement.

I’ve discussed Integrated Biometrics multiple times in the Bredemarket blog over the last five years. Sometimes in terms of hardware, such as Integrated Biometrics’ use of the RepelFlex MBED on its (then) fingerprint readers. Sometimes in terms of (then) cutting-edge software that captured fingerprints using a standard smartphone camera.

But the company’s newest announcement about the availability of IB360° is something else entirely.

Skipping the “leading provider” stuff, we get to this:

“Integrated Biometrics (IB)…formally announced today the launch of IB360, transforming the speed and cost to deploy identity systems. The IB360 platform is a low-code toolset of SDK-based software modules that allows our partners  and integrators to more efficiently create biometric identity-based solutions with minimal development cycles.”

Hence the “build your own biometrics” tagline.

But why do partners and integrators need IB360?

I’ll cover that in a future post.

Stop Scammers: The Latest Way to Verify Company Recruiter and Leader Identities on LinkedIn

I’ve written about the fake recruiters who InMail you about a great position with their company. I shut up the fakes by requesting their corporate email address at their supposed employer. But what if LinkedIn could catch them BEFORE they ever sent that InMail to me?

LinkedIn is trying. 

From HR Dive, brought to my attention by Jennifer Schlador on LinkedIn.

“LinkedIn is looking to take on scammers who falsely present themselves as recruiters or company representatives in the app, with an expansion of its company verification option, while it’s also making workplace verification required when a member adds or updates a leadership or recruiter-related role.”

From HR Dive.

Of course, the proposed Know Your Recruiter system isn’t foolproof; nothing is. Scammers can avoid the LinkedIn verification step by simply NOT choosing a leadership or recruiter-related job title.

Imagen 4.

And as much as people like me wish that people would care about verified identities…many don’t. 

  • If “Jones Jay” from Microsoft sends jobseekers an InMail about a wonderful position, 
  • some will blindly respond without even looking at Jones Jay’s LinkedIn profile at all, 
  • much less checking whether his identity and employer are verified.

But at least the attempt demonstrates that LinkedIn cares more about their real users than about the scammers who pay for Premium.

Drew Mabry Recommends a Human in the Loop: Trust Me, It’s Critically Important

I’m conducting an experiment in which an AI bot, “Bredebot,” is writing on the Bredemarket blog and on LinkedIn with almost no restrictions.

Don’t do this at home. It’s not a good idea.

This post describes an example in which Bredebot misses a critically important point about Bredemarket’s target audience in the identity/biometric industry.

Bredebot reacts to Drew Mabry

Earlier today, I asked Bredebot to write a post analyzing a Drew Mabry quote:  

“The true competitive advantage isn’t the Al tools themselves but how you use them. Your unique processes for data capture, knowledge management, and building trust are the real ‘moat.’ Al becomes powerful when it’s integrated with your proprietary insights and context, making your approach impossible to replicate.”

Moat. I like that. Imagen 4 (via Bredebot.)

Mabry also advocates including a human in the loop: his firm, Fast + Light, always asks at least one human (preferably two) to review all AI-generated content.

In my Bredebot experiment, I rarely edit what Bredebot says. If you know me, it’s very obvious that Bredebot wrote this and I didn’t.

“Building Trust: In the identity and biometrics space, trust isn’t just a nice-to-have; it’s paramount. If customers don’t trust you with their most sensitive data, you simply don’t have a business. Your processes for privacy, security, transparency, and ethical AI usage are not just compliance requirements; they are fundamental differentiators. How you communicate these efforts, how you manage data breaches (heaven forbid!), and how you constantly reinforce your commitment to security are all part of this trust-building moat. This is where your wombat customers, usually burrowing away, will emerge to praise (or criticize) your efforts.”

While I certainly agree with the sentiment, and obviously don’t mind the reference to wombats, I would have made one change.

The t word

I would have modified Bredebot’s use of the T word. Just because Mabry used it doesn’t mean that Bredebot has to do the same.

Why not? Because the word “trust” is massively overused in the identity/biometric industry. So much so that you can’t tell one company from another.

Imagen 4.

“Now perhaps some of you would argue that trust is essential to identity verification in the same way that water is essential to an ocean, and that therefore EVERYBODY HAS to use the t-word in their communications. 

“Don’t tell that to Black Ink Tech, who uses the trademark ‘Truth Over Trust.’

“And no, they didn’t violate any law by using an unapproved word. Instead, they got attention by standing out from the crowd.”

And identity/biometric firms are the primary hungry people (target audience) for the Bredemarket blog.

So I definitely would have edited that paragraph.

So why didn’t I?

Changing the subject

I’m going to dodge that question by asking you one.

Do you need an experienced human to help your identity, biometric, or technology organization product marketing?

  • Strategy and/or tactics?
  • Content and/or proposals and/or analysis?

Visit this page to set up a free meeting with Bredemarket. I’ll ask some questions to get things moving.

Technology Product Marketing Expert

Are you a technology marketing leader, struggling to market your products to your prospects for maximum awareness, consideration, and conversion?

I’m John E. Bredehoft. For over 30 years, I’ve created strategy and tactics to market technical products for over 20 B2B/B2G companies and consulting clients.

But my past isn’t as important as your present challenges. Let’s talk about your specific needs and how I would approach solving them.

Consulting: Bredemarket at https://bredemarket.com/mark/

Employment: LinkedIn at https://linkedin.com/in/jbredehoft/

Technology product marketing expert.

Battling deepfakes with…IAL3?

(Picture designed by Freepik.)

The information in this post is taken from the summary of this year’s Biometrics Institute Industry Survey and is presented under the following authority:

“You are welcome to use the information from this survey with a reference to its source, Biometrics Institute Industry Survey 2025. The full report, slides and graphics are available to Biometrics Institute members.”

But even the freebie stuff is valuable, including this citation of two concerns expressed by survey respondents:

“Against a backdrop of ongoing concerns around deepfakes, 85%
agreed or agreed strongly that deepfake technology poses a
significant threat to the future of biometric recognition, which
was similar to 2024.
“And two thirds of respondents (67%) agreed or agreed strongly
that supervised biometric capture is crucial to safeguard against
spoofing and injection attacks.”

Supervised biometric capture? Where have we heard that before?

IAL3 requires “[p]hysical presence” for identity proofing. However, the proofing agent may “attend the identity proofing session via a CSP-controlled kiosk or device.” In other words, supervised enrollment.

Now remote supervised enrollment and even in-person supervised enrollment is not a 100.00000% guard against deepfakes. The subject could be wearing a REALLY REALLY good mask. But it’s better than unsupervised enrollment.

How does your company battle deepfakes?

How do you tell your clients about your product?

Do you need product marketing assistance? Talk to Bredemarket.

An IMEI Number Is NOT Unique to Each Mobile Phone

(Imagen 3)

Have you ever used the phrase “sort of unique”? Something is either unique or it isn’t. And International Mobile Equipment Identity (IMEI) numbers fail the uniquness test.

Claims that International Mobile Equipment Identity (IMEI) numbers are unique

Here’s what a few companies say about the IMEI number on each mobile phone. Emphasis mine.

  • Thales: “The IMEI (International Mobile Equipment Identity) number is a unique 15-digit serial number for identifying a device; every mobile phone in the world has one.”
  • Verizon: “An IMEI stands for International Mobile Equipment Identity. Think of it as your phone’s fingerprint — it’s a 15-digit number unique to each device.”
  • Blue Goat Cyber: “In today’s interconnected world, where our smartphones have become an indispensable part of our lives, it is essential to understand the concept of IMEI – the International Mobile Equipment Identity. This unique identifier plays a crucial role in various aspects of our mobile devices, from security to tracking and repairs.”

These and other descriptions of the IMEI prominently use the word “unique.” Not “sort of unique,” but “unique.”

Which means (for non-person entities, just like persons) that if someone can find a SINGLE reliable instance of more than one mobile phone having the same IMEI number, then the claim of uniqueness falls apart completely.

Examples of non-uniqueness of IMEI numbers on mobile phones

People who claim IMEI uniqueness obviously didn’t read my Bredemarket blog post of April 1, in which I WASN’T fooling.

  • I talked about an incident in India in which a cyber fraud operation “specialised in IMEI cloning.”
  • And an incident in Canada in which someone was scammed out of C$1,000, even though the phone had a valid IMEI.

IMEICheck.net even tells you (at a high level) how to clone an IMEI. It’s not easy, but it’s not impossible.

“In theory, hackers can clone a phone using its IMEI, but this requires significant effort. They need physical access to the device or SIM card to extract data, typically using specialized tools.

“The cloning process involves copying the IMEI and other credentials necessary to create a functional duplicate of the phone. However, IMEI number security features in modern devices are designed to prevent unauthorized cloning.”

So don’t claim an IMEI is unique when there is evidence to the contrary. As I said in my April post:

NOTHING provides 100.00000% security. Not even an IMEI number.”

What does this mean for your identity product?

If you offer an identity product, educate your prospects and avoid unsupportable claims. While a few prospects may be swayed by “100%” claims, the smarter ones will appreciate more supportable statements, such as “Our facial recognition algorithm demonstrated a 0.0022 false non-match rate in the mugshot:mugshot NIST FRTE 1:1 laboratory testing.”

When you are truthful in educating your prospects, they will (apologizes in advance for using this overused word) trust you and become more inclined to buy from you.

If you need help in creating content (blog posts, case studies, white papers, proposals, and many more), work with Bredemarket to create the customer-focused content you need. Book a free meeting with me.

When Prospects Ask Technical Marketers the Tough Questions

Some technical marketers are expert at spinning soft fluffy stories about how their AI-powered toilet paper can cure cancer…which can be very persuasive as long as the prospects don’t ask any questions.

  • For example, let’s say you’re telling a Chick-fil-A in Kettering, Ohio that you’ll keep 17 year olds out of their restaurant. Are you ready when the prospect asks, “How do you KNOW that the person without ID is 17 years and 359 days old, and is not 18?”
  • Or let’s say you’re telling a state voter agency that you’ll enforce voter ID laws. Are you ready when the prospect asks, “How do you KNOW that the voter ID is real and not fake? Or that it is fake and not real?”

Be prepared to answer the tough questions. Expert testimonials. Independent assessments of your product’s accuracy. Customer case studies.

Analyze your product’s weaknesses. (And the threats, if you’re a SWOT groupie.)

And call in the expert help.