Articles Search Results

67 Articles and 368 related Products found for finger
  • FBI certifies MorphoWave desktop contactless fingerprint scanner
    Morpho (Safran) announced that its MorphoWave Desktop contactless fingerprint scanner has been certified by the US Federal Bureau of Investigation (FBI), for meeting the Personal Identity Verification (PIV*) Image Quality Specifications standard.
    Editor / Provider: Morpho (Safran) | Updated: 2016 / 1 / 6
  • Suprema announces BioStation A2 fingerprint terminal
    Suprema, a global leader in biometrics and security technology, unveiled BioStation A2, most powerful and secure fingerprint terminal designed for both access control and time attendance applications.
    Editor / Provider: Suprema | Updated: 2015 / 11 / 12
  • EverFocus announces the release of EQN100
    EverFocus Electronics is glad to announce the release of the new EQN100. The smallest size is completely designed for ATM application.
    Editor / Provider: EverFocus Electronics | Updated: 2015 / 8 / 20
  • Dahua introduces smart lock
    Dahua Technology, a world-leading manufacturer and supplier of video surveillance products headquartered in Hangzhou, China introduces Smart Lock series to the market with new appearance and excellent performance.
    Editor / Provider: Dahua Technology | Updated: 2015 / 4 / 2
  • Morpho signs e-Border contract with the UAE Ministry of Interior
    Morpho (Safran), through eIMASS, has been awarded the prestigious e-Border management project by the Ministry of Interior of the United Arab Emirates. The e-Border project is setting the standards for the future of border control in the world, combining the very latest in biometric technologies, aut
    Editor / Provider: Morpho (Safran) | Updated: 2015 / 1 / 30
  • Comprehensive access control solutions feature at Secutech 2015
    Access control has long been a vital portion of physical security and can be divided into three categories, namely password-based access control, card-based access control, and biometrics-based access control, according to the system's input, transmission, and control methods. The functions and char
    Editor / Provider: Secutech | Updated: 2014 / 11 / 18