You are at : Search > Articles Search Results

Articles Search Results

266 Articles and 260 related Products found for fingerprint

FPC bundles Precise Biometrics' Fingerprint Algorithm into mobile

FPC bundles Precise Biometrics' Fingerprint Algorithm into mobile

Editor / Provider: Precise Biometrics | Updated: 8/22/2013 | Article type: Security 50

Precise Biometrics AB and Fingerprint Cards AB (FPC) have entered into an agreement where FPC will license Precise Biometrics' fingerprint algorithm to further enhance the performance of FPC world leading capacitive sensors. FPC will bundle the algorithm into existing sensor products, primarily targeting mobile phones and tablets. The bundle will further enhance the performance of FPC sensors in terms of accuracy and speed which are important criteria especially in the fast growing mobile and tablet markets.

The integration of Precise Biometrics' algorithm to FPC products is successfully completed and FPC will start offering the bundled product to its partners and OEM customers in Q3 2013.

Johan Carlstr?m, CEO of FPC said, “FPC selected Precise Biometrics as algorithm partner due to impressive performance of their algorithm in combination with our sensors. We strive to offer the best user experience possible for embedded sensors in mobile phones and tablets. Driven by the largest mobile manufacturers in the world, several hundred million users are, in the next two years, expected to purchase smartphones and tablets with built-in fingerprint sensors. It is of paramount importance to ensure these users a smooth, convenient, and secure user experience, thus the selection of Precise Biometrics as partner in algorithms.”

“We are very pleased to work closely with Fingerprint Cards,” said Thomas Marschall, CEO of Precise Biometrics. “Forecasts by leading analysts of +1.5 billion smartphones being sold already in 2015, as well as clear signs that major players currently are working to include fingerprint sensors in their upcoming products, boosts our positive view on the market in the coming years. We also expect that widespread deployment of fingerprint sensors will positively impact our opportunities within the Match-on-Card business.”

Morpho Mobile Gateway helps FBI, AFIS identify suspects

Morpho Mobile Gateway helps FBI, AFIS identify suspects

Editor / Provider: MorphoTrak | Updated: 8/7/2013 | Article type: Security 50

US law enforcement agencies can now benefit from the Morpho Mobile Gateway, developed by Morpho (Safran) and supplied by its U.S. subsidiary, MorphoTrak. This powerful software allows Morpho mobile biometric devices to interface not only with the FBI's Repository for Individuals of Special Concern (RISC) database, but with any Automated Fingerprint Identification System (AFIS) regardless of the vendor. This means officers can have instant access from any mobile location to far more criminal identity information when attempting to identify suspects.

The Morpho Mobile Gateway creates a bridge between Morpho handheld identification devices like the MorphoIDent and the IBIS Extreme and one or multiple federal, state or local AFIS, regardless of the provider. Morpho devices in the field can now search multiple AFIS simultaneously and receive multiple AFIS search results. Morpho Mobile Gateway provides a single management point for the, upgrades, maintenance, monitoring and reporting of all mobile activity coming from hundreds of mobile devices used by a law enforcement agency.

“This is really revolutionary, that our small handheld MorphoIDents can now be used by any agency, from almost any location in the U.S. to access a vast array of criminal identities in multiple AFIS systems, including the national FBI RISC database containing high priority criminals,” explains Daniel Vassy, President and CEO of MorphoTrak. “We've already seen numerous examples of roadside traffic stops in which our MorphoIDent with the Gateway have refuted false identity information and helped get some of these worst RISC offenders identified and behind bars.”

“The Mobile Gateway has allowed the Arizona Department of Public Safety to offer access to our state-wide AFIS as well as the FBI RISC database to the over 200 law enforcement agencies in Arizona,” stated AZ DPS representative Michele Johnson, AZAFIS Project Manager. “The Mobile Gateway paired with the MorphoIDent mobile fingerprint device has already had many successes, leading to arrests of dangerous criminals with warrants for their arrest in the state system or the FBI RISC database.”

The Morpho Mobile Gateway can become operational on any AFIS in a matter of a few hours. MorphoIDent mobile devices are small, very affordable and extend the reach of verified identities to protect officers and the public. Law enforcement agencies throughout the U.S. can now use Morpho's leading mobile identification devices even if they don't have a Morpho AFIS.

Quick updates on Indian market

Quick updates on Indian market

Editor / Provider: | Updated: 8/2/2013 | Article type: Hot Topics

The a&s editorial team recently spoke with several Indian channel players to get the latest market dynamics. Key findings include sizzling demand, “new” brands and deeper localization.

Open Access
The depreciating Indian rupee (to US greenback) has resulted in higher costs and tougher profit-and-loss management for local solution providers to run their businesses, but thanks to ongoing and new projects and more cost-effective solutions and options, the market is continuing its growth momentum with strong demand for robust surveillance and security systems. Promising vertical segments include city surveillance, transportation/traffic infrastructure, energy/utilities, industrial, retail and SMBs, with average homeowners increasingly heeding their own properties.

While surveillance and monitoring have been the main driving force, the need of security has evolved to require better, easier, cheaper, mobile management which has in turn fueled the growth in time/attendance and access/identity management solutions, such as more advanced but affordable fingerprint scanners. For the residential sector, video door phones and video-enabled alarm systems are in great demand, with mobile and smartphone/tablet accessibility becoming a necessity.

Up-and-Coming Brands
The growth potential has attracted new players: IT systems integrators and software developers; the commonality among them and “traditional” security channel players is having sales/service centers nationwide. And this increased pressure on the existing players has pushed some to develop and promote their own-branded products and solutions, to better maintain or enhance profitability. Another noteworthy phenomenon is that Indian solution providers are expanding into neighboring countries Bangladesh and Sri Lanka, for their similarities in language, mentality and product/service requirements.

Go Deeper
For government projects, New Delhi is still inevitably the center of attention for global conglomerates, particularly for LG, Panasonic and Sony. Axis, Bosch, Honeywell, Tyco and UTC, on the other hand, are grooming the IT/telecom vertical with their main offices and key personnel in Bengaluru (better known as Bangalore), while Hikvision and Kaba concentrate on Mumbai and its surrounding region for the vibrant financial and commercial sectors.

Localization is now a whole new ball game. Take Tyco for example; it now has approximately 30 offices in Tier-2 and 3 cities throughout the country, to better promote, install and service made-in-India products/solutions. Hikvision's local joint venture and distributor is in similar markets, with increasingly fortified government ties.

CEM Systems, Bosch secured Central Bank of Nigeria

CEM Systems, Bosch secured Central Bank of Nigeria

Editor / Provider: CEM Systems | Updated: 8/2/2013 | Article type: Commercial Markets

CEM Systems, from Tyco Security Products, announced that the Central Bank of Nigeria has selected the CEM  access control and security management system to secure many of its premises across Nigeria. The systems have been supplied by CEM Approved Reseller Pentagon Distribution.

The Central Bank of Nigeria (CBN) is charged by the Federal Republic of Nigeria with the overall control and administration of the monetary and financial sector policies of the Federal Government.

CEM access management was chosen because it is a powerful and fully integrated security management system, offering powerful access control, alarm processing, photo badging, power management and integration to third party systems” said Edward Van Trotsenburg Export Manager, Pentagon . “CEM are also able to provide fully integrated biometric solutions with the fingerprint reader. This means that CBN can efficiently increase security levels at required areas.”

“The Central Bank of Nigeria required an access control solution that provides the highest level of security, and that is scalable to meet the needs of their different offices throughout the country now and in the future. Access management was the ideal solution to help CBN meet all their requirements” said Philip Verner, Regional Sales Director, EMEA, CEM Systems. “The Central Bank of Nigeria is one of many recent finance industry wins for CEM Systems and represents a growing trend for CEM in the sector and the African market.”

CEM access control provides an advanced level of integration using industry standard interfaces to link to third party systems. CBN required the CEM system to integrate with Bosch video interface in order to control video and access via one solution. The system application Alarm Event Display (AED) responds to all alarm situations in real time providing a dynamic on-screen interface to external CCTV systems with facilities for CCTV switching, remote door broadcasting and audio output in response to alarm events.

CEM Visual Imaging & Pass Production System allows CBN administrators to produce professional quality permanent and temporary ID passes for staff and visitors. CBN also utilize CEM's Visitor management application. This application has all the power of the original visitor management feature but with the added benefit of being accessible via the web. This means that users can log in remotely via a web page to manage visitors without the need for client access control software on their PC. To meet the requirement for minimal downtime on site, CEM's access server was selected to create a secondary server that can take over from the main server in the event of system failure. The switch between the two servers is automatic and results in zero data loss, with notification of the event being sent to system users and administrators immediately.

In addition to the numerous software options chosen by the Central Bank of Nigeria, a variety of CEM hardware solutions are used on site. CBN is installing CEM's  intelligent card reader, which gives full off-line validation and decision making at the point of entry, even when host communication is not available. The S610e also features a keypad and backlit LCD which provides meaningful messages to cardholders for example Wrong Time Zone, Lost/Stolen Card and Access Granted.

Given CBN's focus on providing the utmost security, CEM biometric fingerprint readers are being deployed in areas that required additional security. The CEM readers is a fully integrated biometric and access control reader that is used to control access to restricted areas, which is managed and monitored by security staff using the CEM system.

Additional hardware also included the Portable reader that can be used for ID card validation at temporary entrances which have no power, and can be used as a mobile device for random checks within pre-defined zones. The display of cardholder details on the reader such as Name, Date of Birth and Job Title and also cardholder photograph, allows for visual verification of cardholders.

Morpho biometrics to defend US law enforcement agencies

Morpho biometrics to defend US law enforcement agencies

Editor / Provider: Morpho | Updated: 8/2/2013 | Article type: Security 50

Morpho is the provider of biometric and identity management solutions in the United States. Every day, a number of US law enforcement agencies rely on Morpho designed and developed automated biometric identification systems for their work.

One of the latest to come onboard is the Orange County Sheriff's Office in California. One of the top law enforcement agencies in the US, it joins a long list of others to put their trust in Safran subsidiary Morpho, the leading provider of biometric identification solutions (fingerprints, iris, facial recognition) today. Morpho's key strengths include its high-performance algorithms, which in a mere few seconds can match digital fingerprints taken on site to records in law enforcement databases. As Clark Nelson, Morpho Sales & Marketing Director, explains, “our Automated Fingerprint Identity Systems (AFIS) are light years ahead of the competition. That's what makes us at Morpho number one in our key markets. It is extremely difficult to accurately identify one digital fingerprint from a database with several millions of entries.”

Simple and accurate
Law enforcement officers take fingerprints using scanners, which then cross-check them against the AFIS databases. “We recently developed a portable terminal no bigger than a cell phone so it can be used on the go – like for ID checks in the street and at emergencies, etc. – without compromising the system's speed or accuracy,” says Nelson. “The police officer just asks the person to place a finger on the scanner surface. Then, it takes a digital copy of their fingerprint and searches for any possible matches in local and nation-wide databases.” While Morpho's AFIS currently boast 99.99% accuracy, Nelson assures us that “we're planning to invest so we can keep improving the system. A 0.01% improvement can make a huge difference in the amount of criminals caught.”

The FBI has also migrated to the latest generation of Morpho's digital fingerprint matching solution. Three times as accurate as the FBI's former system, the Morpho solution will make it possible to cross-check fingerprints from old crime scenes, potentially solving a backlog of cold cases.

Customer still comes first
“While we obviously appreciate the technology's performance, we're also especially receptive to customer service, and Morpho has always been extremely responsive and efficient,” says Karl Wilmes, Deputy Director of the Colorado Bureau of Investigation. And Clark Nelson, for whom customer service forms the very core of Morpho's commercial strategy, could not agree more: “we're here to build long-term relationships with our customers, and giving them the attention they need is one of the absolute fundamentals of our business policy. It's not just our technological prowess that wins us practically all of our calls for tender. We also owe it to the excellent relationships we have with our customers. Like the FBI for over 40 years and the Central Bureau of Investigation for over 20 years!”

MorphoTrust enrolls 1.5 million drivers in HTAP

MorphoTrust enrolls 1.5 million drivers in HTAP

Editor / Provider: MorphoTrust | Updated: 7/31/2013 | Article type: Security 50

MorphoTrust USA (Safran), the exclusive enrollment services provider to the Transportation Security Administration (TSA) in support of the Hazardous Materials Endorsement Threat Assessment Program (HTAP), announced that it has enrolled a total of 1.5 million commercial drivers at 135 enrollment centers. In this program, screened, trained and vetted trusted agents collect the biographic and biometric data for the 200,000 truck drivers who require a Hazardous Materials Endorsement on their commercial driver licenses each year.

In 2004, TSA launched the HTAP program in response to the USA PATRIOT Act. With this law, Congress directed TSA to perform fingerprint-based background checks for truck drivers who haul hazardous materials. TSA created HTAP as an "agent service" offering that allows states to either participate or create their own solutions to meet this mandate.

In June, the South Carolina Department of Motor Vehicles announced its intention to begin using the TSA's HTAP agent service later this year. With this commitment, South Carolina becomes the 40th state to elect the TSA's service since the program's inception.

TSA first selected MorphoTrust to provide the HTAP service in November 2004. In 2012, TSA selected MorphoTrust as the prime contractor to transition multiple programs, including HTAP and the Transportation Worker Identity Credential, into a consolidated service with convenient locations for individuals requiring enrollment and registration for programs serviced by TSA – Universal Enrollment Service.

“Universal Enrollment Service is the embodiment of MorphoTrust's commitment to simplify, protect and secure the lives of Americans as we ensure the identity of transportation workers in a highly secure, yet convenient way,” said Bob Eckel, MorphoTrust CEO. “With our experience with these programs, and others that require the vetting of individuals with multiple biometrics, MorphoTrust is well positioned to deliver solutions of this significance and sensitivity.”


Morpho biometric SmartGate secures passenger processing in Auckland Airport

Morpho biometric SmartGate secures passenger processing in Auckland Airport

Editor / Provider: Morpho | Updated: 7/24/2013 | Article type: Security 50

Morpho (Safran) launched the SmartGate Plus trial at Auckland International Airport in New Zealand in June 2013. SmartGate Plus is Morpho's next generation automated border control solution based on the use of biometric technology. New Zealand Customs Service (NZCS) will be testing the system during an operational trial at Auckland Airport with over 2,000 passengers per week expected to trial SmartGate Plus.

Since 2009, New Zealand's Auckland, Wellington and Christchurch airports have been using SmartGate to give eligible travellers the option of self-processing through passport control. The system uses facial recognition technology to compare facial images of the traveller against the data contained in the e-Passport's chip. The project has been a great success with the travelling public, with six millions travellers having used SmartGate, and over 70 % of eligible travellers currently using the system.

SmartGate Plus brings additional convenience as it speeds up traveller processing with a one-step process, eliminating the kiosk and ticket part of the current system. It uses e-gates that have a smaller footprint to meet the space constraints of airports whilst also having Morpho's latest workflow and biometric matching software. In addition to this, is the solution's ability to add other biometric capabilities such as fingerprint and iris recognition at a future stage.

“The success of SmartGate in New Zealand has been phenomenal with 6 million people having successfully used the technology since it was introduced in 2009, says Geoff Wilson, Customs Manager Passenger Facilitation at New Zealand Customs Service. “The biometric self-processing technology has streamlined passenger processing and provided a secure, efficient way to clear passport control and we are pleased to be involved in testing the next generation SmartGate Plus.”

“SmartGate Plus is a clear reflection of our collaborative approach with New Zealand Customs to create, build and deploy the next generation in border control solutions”, stated Bruno Pattyn, Managing Director of Morpho's local subsidiary, Morpho Australasia. This new technology has the capability to further simplify and speed up border processing in order to meet ever-evolving border challenges across the region.”

Idaho regional airport upgrades identity and access management with Quantum

Idaho regional airport upgrades identity and access management with Quantum

Editor / Provider: Quantum Secure | Updated: 7/17/2013 | Article type: Infrastructure

Friedman Memorial Airport (SUN), which provides air service facilities to South Central Idaho and the Sun Valley resort area, has become the first airport in the country to implement Quantum Secure's new Aviation software.

Officially launched May 15, the physical identity and access management software solution is expected to save hundreds of man-hours for airport management by streamlining the complete lifecycle of physical identities and automating related processes.

Daily oversight of security provisions at SUN is handled by the Airport Security Department. Among their many security activities is ongoing supervision of approximately 1000 identities including airport and airline employees, in-house and external (i.e. taxi, cargo) vendors, government employees, hangar owners/associations, sublease tenants, temporary construction workers and more. Per TSA mandates, each individual must undergo a TSA-adjudicated Security Threat Assessment before SUN airport operators can issue any type of personnel identification media. Individuals must be vetted on a continual basis to allow for a comparison of new threat information.

Before Quantum Secure's implementation, SUN's approach to enacting these requirements was entirely a manual process. The labor-intense activity involved multiple data entries of the same information into the various airport security systems: the Physical Access Control System (PACS), security check system, computer based training systems and biometric fingerprint capture system. Airport personnel were spending more than 90 minutes per person for new enrollments and more than 45 minutes per person for badge renewal procedures.

According to Ajay Jain, Quantum Secure President and CEO, with the software suite the data is entered only once and the relevant information flows through to all applicable systems and business processes. The software allows SUN operators to perform new enrollments in less than 15 minutes per person including all related processing such as document scanning and biometric registration. The software can also perform renewals in less than 10 minutes.

The system was also able to streamline the procedure for completing the mandatory reverse audits that were previously being completed manually through the U.S. Postal Service. SAFE can automate the process, reducing the expected time for SUN staff to initiate a full or partial audit to 10 minutes. For added convenience, the audits can be scheduled to run on a quarterly or half-yearly basis.

SUN's security workflow system with which SAFE is integrated includes security checks through TSA's Transportation Security Clearinghouse; SSi computer based training systems; Safran MorphoTrust biometric fingerprint platform; and automated provisioning and de-provisioning to Lenel's access management after security checks and training pre-requisites have been completed.


Safran/Morpho and Interpol enter into strategic biometric partnership

Safran/Morpho and Interpol enter into strategic biometric partnership

Editor / Provider: Safran | Updated: 7/12/2013 | Article type: Security 50

A partnership agreement will see Morpho (Safran) provide INTERPOL with a range of innovative biometric solutions and other technical support to enhance global security. The partnership covers the supply of automated biometric identification systems to INTERPOL, provision of state-of-the-art security solutions for the future INTERPOL Global Complex for Innovation (IGCI), as well as collaboration on the subject of border security.

Under the five-year partnership, Morpho's cutting-edge facial recognition technology will also be provided to INTERPOL as an additional criminal identification tool.

INTERPOL Secretary General Ronald K. Noble said the constant and fast-moving evolution in biometric technology meant that private sector expertise and support through partnerships such as with Morpho were essential.

“As criminals employ ever more sophisticated ways to avoid detection, so too must law enforcement benefit from the latest advances in technology, especially in biometrics, to more effectively combat all forms of transnational crime,” said Mr Noble.

Since 1999, Morpho has provided INTERPOL with its Automated Fingerprint Biometric System (AFIS) enabling officers in all member countries to conduct checks and identify internationally wanted persons via INTERPOL's global network. Under the partnership, this system will be replaced with Morpho's latest-generation AFIS which includes enhanced capabilities and offers even greater speed.

Strengthening weak zones for total hospital security

Strengthening weak zones for total hospital security

Editor / Provider: Tevin Wang, a&s International | Updated: 7/23/2013 | Article type: Commercial Markets

With 24/7 operation, hospitals need to be open enough to allow the flow of patients and staff, while restrictive enough to prevent unauthorized people from entering sensitive areas within the building. Hospitals house pharmaceuticals, which need to be secured around the clock; patient records, which need to be protected; and infants in the maternity ward, who need to be monitored to prevent abduction. Security directors face a myriad of challenges as they strive to protect patients, employees, and visitors.

Hospitals are unlike other environments. “Hospital security is far more complex than simply understanding the threats posed to a particular facility based on its contents. It is important to understand how most hospitals manage access to specific departments,” said Scott Bartlett, CEO at Southwest Surveillance Systems. “There are typically two critical steps in a modern hospital. The first step is in the physical layout and construction of the hospital campus. Modern hospitals are built from the ground up with efficiency in mind. This means that the physical structure of the hospital facilitates proper security but does not hinder the productivity of the staff.

For example, a new hospital construction firm will interview the future staff of a new hospital to understand the typical workflow of an ER surgeon and the systems and facilities that she must access to effectively do her job. During this interview, the construction firm understands how to make the surgeon's job easier by ensuring that he or she doesn't have to cover great distances or traverse multiple security checkpoints to take care of their patients. The more work done during this phase, the easier it is to implement automated access control in the second phase. This is because it is very important for a hospital to balance security needs with its efficiency. This is a huge problem in older institutions and may present an opportunity for the right technologies.”

“The second step in securing a hospital is to implement some ID-based security policy,” added Bartlett. “This typically includes badging to identify a staff member's level of access or maybe even a magnetic key card that is used to provide electronic access to facilities housing information systems or other systems that contain patient information. Unlike financial institutions or intelligence firms, hospitals cannot be locked down, due to the nature of the health care business. Staff members must be allowed to quickly and efficiently navigate the hospital campus to ensure positive patient outcomes.”

Management with Access Control
More hospitals today choose an enterprise-level access control system to streamline their operations. By replacing keys with access control credentials, health care security directors can improve the security of pharmacies and data centers by knowing who accessed a specific area, in the event of an incident. “The main focus of access control in hospitals falls on two things,” said Matt Vellek, Southeast Regional Sales Manager at AMAG Technology. “First, the importance of controlling access to sensitive information or critical areas of the hospital is high. Secondly, having the audit ability to identify who was granted access to those areas is increasingly important for investigatory and audit ability reasons.”

Pharmacies, for instance, may need to be able to demonstrate traceability of drugs. “Nurseries need to restrict access to authorized staff and family members, to protect the safety of infants,” said John Davies, Managing Director at TDSi. “Psychiatric wards need to restrict entry to unauthorized people in order to protect the vulnerable patients and also to monitor and restrict the exit of patients who may be unsafe leaving the area unaccompanied. Any areas using radiation or dangerous substances, such as X-ray rooms, need to guard against unauthorized access due to the hazards present.”

Unified Video
Hospital security is complex and electronic access control alone cannot solve all security problems. Surveillance sees new uses in hospitals. Areas such as the ER, parking lots, and entrances need to be constantly monitored to ensure that patients and employees are safe. In addition, hospitals should thoroughly consider the location of security monitors to ensure full viewing by the appropriate personnel so security officers can respond swiftly to an incident.

“By implementing IP surveillance monitoring with integration to other information and access control systems, hospitals can monitor workspaces and even staff members through their workflows and trigger alarms or automatically secure sensitive areas from unauthorized access. To accomplish this, cameras would be installed in literally every functional space in and outside the hospital walls,” said Bartlett. “This is why HD network cameras will become essential to modern hospital facilities. One doctor we interviewed suggested that if cameras could trigger audits or access-control events based on badge colors, barcodes on a badge or maybe a particular image memory, then most access control could finally be automated without endangering patients.”

Taking access control a step further and integrating it with video surveillance turns these individual components into a powerful security management tool that can provide data to the hospital leadership. “Technology available today allows for the creation of different types of access for various departments to be established through the permission-based settings programmed into the software, which operates the hardware,” said Kenneth Mara, President and CEO at World Wide Security. “For instance, we can design a system utilizing biometrics to provide or deny access to certain employees designated to be in that area. We would also incorporate a camera to provide a clip, or extended surveillance, of the activity of that person in a high-risk or elevated-security area. There are many reasons a hospital may need to know who is coming and going, such as where pharmaceuticals are stored or where medical record information could be compromised.”

HD Picture of Health
HD cameras provide direct benefits with higher clarity and resolution. Analog cameras used to be for point protection only. With HD quality, cameras have a wider field of view. This is changing the need for PTZ, with fewer costs less for labor, materials to install and operation, said William Plante, Director of Professional Services at Aronson Security Group.

Hospitals often have good working relationships with local police, who may request footage of individuals during investigations. HD cameras may prove their worth for their superior video clarity. They may also lead to increased employee satisfaction, as personal property thefts could be investigated with better success, said Ben Myers, Director of Plant Operations at Deaconess Medical Center.

Biometric Identification
There is a requirement within hospitals to restrict access to specific areas, such as X-ray rooms and children's wards. In these areas, there may also be the requirement for multiple forms of identification before access is granted to add an extra layer of security, said Andrew Fulton, Senior Director of Global Sales at CEM Systems.

“For the highest security areas, hospitals can implement multifactor authentication including, for instance, biometrics, which increases the probability that an individual presenting a card to a reader is the same person to whom the card was initially issued,” said Sheila Stromberg, Director, Corporate End User Strategies at HID Global. “Since these identifiers, such as fingerprints, hand, and face geometry, or patterns found in the eye's iris, can't be borrowed or stolen, biometrics provide identity authentication with a strong degree of confidence.”

Control of restriction levels is more easily accomplished in a networked access control environment. “Biometric readers can be installed where needed, and as each user presents his or her smart card and fingerprint for identity verification, the entry records are uploaded in real time to the central server through a controller over a TCP/IP network,” Stromberg said. “If the system is based on an open architecture, the controller can also be integrated with other application modules for centralized management and reporting, enabling this biometric entry log data to be correlated with other information.”

First Page< Prev< | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 >Next >Last Page
Sign Up for Free
Weekly e-Newsletters
  • Headline
  • Trending Tech
  • Hot News
  • Product Highlights
  • Success Stories

Featured Suppliers