Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system. Find access control solutions here.
Behavioral biometric verification methods include keystroke dynamics, gait analysis, voice ID, mouse use characteristics, signature analysis and cognitive biometrics. Find Behavioral biometrics solutions here.
Biometric consultants can assist in identifying and assessing threats and security risks to your company and suggest the best solutions. Find biometric consultants here.
Using smart cards with biometrics results in a trusted credential for authenticating an individual’s identity using one-to-one biometric verification. With the biometric template stored on the smart card, comparison can be made locally, without the need for connection to a database of biometric identifiers. Find smart card solutions here.
Biometric software allows for biometrics-based devices and the computers and networks they are connected to, to be interoperable and compatible with each other. It allows different application software on different operating systems to be compatible and allows for an effective and working connection. Find biometric software solutions here.
Civil ID is generally thought of as the use of biometrics to identify or verify the identity of individuals when interacting with governments. Examples of this could be for the purposes of document issuance, border management, voter registration or employment background checks. Find civil id solutions here.
Criminal ID is one of the largest biometric markets. It includes criminal AFIS systems, the use of biometrics by police officers in the field, prison/courthouse applications, and counter fraud and terror initiatives. Find criminal ID solutions here.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems. Find facial recognition solutions here.
Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. Find fingerprint recognition solutions here.
Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of the irides of an individual’s eyes, whose complex random patterns are unique and can be seen from some distance. Find iris recognition solutions here.
Governments and private industry are turning to mobile biometrics to speed up processing of people and goods in law enforcement, military, public transportation, border control, healthcare and commercial shipping. Find mobile biometric solutions here.
Biometric authentication technology is making its way into the retail industry as a quick way to manage and handle employee and Point-of-Sale (POS) requirements. For retailers this means an easy way to bring the security of biometrics into their operations with out needing to invest in separate technologies. Find biometrics-based payment solutions here.
Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting. It is sometimes done in a surreptitious manner and it most usually refers to observation of individuals or groups by government organizations. Find surveillance solutions here.
Vein recognition systems are amongst the newest biometric technologies to have emerged in the recent past. Vein authentication uses the vascular patterns of an individual’s palm/finger/back of the hand as personal identification data. Find vein recognition solutions here.
Voice biometrics systems can be used to verify a person’s claimed identity or to identify a particular person. It is often used where voice is the only available biometric identifier, such as over the telephone. Find voice biometrics solutions here.
Biometrics-based workforce management provides a common set of performance-based tools to support corporate management, frontline supervisors, store managers and workers across manufacturing, distribution, transportation, and retail operations. It is a complete approach designed to make a workforce as productive as possible, reduce labor costs, and improve customer service. Find workforce management solutions here.