Surveillance is the monitoring of the behaviour, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting. It is sometimes done in a surreptitious manner and it most usually refers to the observation of individuals or groups by government organizations. Find surveillance solutions here.
Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system. Find access control solutions here.
Biometric consultants can assist in identifying and assessing threats and security risks to your company and suggest the best solutions. Find biometric consultants here.
Civil ID is generally thought of as the use of biometrics to identify or verify the identity of individuals when interacting with governments. Examples of this could be for the purposes of document issuance, border management, voter registration or employment background checks. Find civil id solutions here.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems. Find facial recognition solutions here.
Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. Find fingerprint recognition solutions here.
Gesture recognition is a way of interpreting human gestures via mathematical algorithms. Gestures can originate from any bodily motion or state but commonly originate from the face or hand however the identification and recognition of posture, gait, proxemics, and human behaviours is also the subject of gesture recognition techniques. Find gesture recognition solutions here.
Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of the irides of an individual’s eyes, whose complex random patterns are unique and can be seen from some distance. Find iris recognition solutions here.
Middleware / Software
Middleware/software allows for biometric devices and the computers and networks they are connected to, to be interoperable and compatible with each other. It allows different application software on different operating systems to be compatible and allows for an effective and working connection. Find middleware/software solutions here.
Governments and private industry are turning to mobile biometrics to speed up the processing of people and goods in law enforcement, military, public transportation, border control, healthcare and commercial shipping. Find mobile biometric solutions here.
Biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. A biometric computer security system requires the user to provide a fingerprint (or other biometric) to the system, which is then verified against a stored biometric template. Find PC and Network access solutions here.
Biometric fingerprint authentication technology is making its way into the retail industry as a quick way to manage and handle employee and Point-of-Sale (POS) requirements. For retailers, this means an easy way to bring the security of biometrics into their operations without needing to invest in separate technologies. Find the point of sale authentication solutions here.
Using smart cards with biometrics results in a trusted credential for authenticating an individual’s identity using one-to-one biometric verification. With the biometric template stored on the smart card, comparison can be made locally, without the need for connection to a database of biometric identifiers. Find smart card solutions here.