Find and review biometric solution providers and biometrics technologies that measure and analyze human body characteristics such as DNA, fingerprints, retinas, irises, voice, facial patterns and hand measurements for authentication purposes. Add your company listing for free!
Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system. Find access control solutions here.
Biometric consultants can assist in identifying and assessing threats and security risks to your company and suggest the best solutions. Find biometric consultants here.
Civil ID is generally thought of as the use of biometrics to identify or verify the identity of individuals when interacting with governments. Examples of this could be for the purposes of document issuance, border management, voter registration or employment background checks. Find civil id solutions here.
Criminal ID is one of the largest biometric markets. It includes criminal AFIS systems, the use of biometrics by police officers in the field, prison/courthouse applications, and counter fraud and terror initiatives. Find criminal ID solutions here.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems. Find facial recognition solutions here.
Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. Find fingerprint recognition solutions here.
Gesture recognition is way of interpreting human gestures via mathematical algorithms. Gestures can originate from any bodily motion or state but commonly originate from the face or hand however the identification and recognition of posture, gait, proxemics, and human behaviors is also the subject of gesture recognition techniques. Find gesture recognition solutions here.
Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of the irides of an individual’s eyes, whose complex random patterns are unique and can be seen from some distance. Find iris recognition solutions here.
Middleware / software allows for biometric devices and the computers and networks they are connected to, to be interoperable and compatible with each other. It allows different application software on different operating systems to be compatible and allows for an effective and working connection. Find middleware / software solutions here.
Governments and private industry are turning to mobile biometrics to speed up processing of people and goods in law enforcement, military, public transportation, border control, healthcare and commercial shipping. Find mobile biometric solutions here.
Biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. A biometric computer security system requires the user to provide a fingerprint (or other biometric) to the system, which is then verified against a stored biometric template. Find PC and Network access solutions here.
Biometric fingerprint authentication technology is making its way into the retail industry as a quick way to manage and handle employee and Point-of-Sale (POS) requirements. For retailers this means an easy way to bring the security of biometrics into their operations with out needing to invest in separate technologies. Find point of sale authentication solutions here.
Signature verification software is used for automated comparison to a signature database for examination of a signature on a negotiable instrument to determine whether the handwriting is genuine, and whether the person signing the check is authorized to use the account. Find signature verification solutions here.
Using smart cards with biometrics results in a trusted credential for authenticating an individual’s identity using one-to-one biometric verification. With the biometric template stored on the smart card, comparison can be made locally, without the need for connection to a database of biometric identifiers. Find smart card solutions here.
Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting. It is sometimes done in a surreptitious manner and it most usually refers to observation of individuals or groups by government organizations. Find surveillance solutions here.
Vein recognition systems are amongst the newest biometric technologies to have emerged in the recent past. Vein authentication uses the vascular patterns of an individual’s palm/finger/back of the hand as personal identification data. Find vein recognition solutions here.
Voice verification systems can be used to verify a person’s claimed identity or to identify a particular person. It is often used where voice is the only available biometric identifier, such as over the telephone. Find voice verification solutions here.
Workforce management provides a common set of performance-based tools to support corporate management, frontline supervisors, store managers and workers across manufacturing, distribution, transportation, and retail operations. It is a complete approach designed to make a workforce as productive as possible, reduce labor costs, and improve customer service. Find workforce management solutions here.