Verwelkoming. 20 September Fort Lent

Size: px
Start display at page:

Download "Verwelkoming. 20 September Fort Lent"

Transcription

1 Verwelkoming 20 September Fort Lent

2 Biometric readers introduction

3 Level of authentication Something you have Key Card or badge Something you know Password PIN A memory unique to you Something you are Biometric 3

4 Biometric implementation factors Location Security risks Task (identification vs verification) Expected number of users User circumstances Existing data 4

5 How biometrics work 5

6 Identification vs verification Biometric readers exist in 1:1 (Verification) and 1:N (Identification) Mode 1:1 1:N The user first identifies himself by a PIN Code or by an Access Badge # The readers looks up the template based on the PIN Code or Access Badge # The user puts his finger on Biometric reader The readers goes through its database and identifies if the user exists, and performs verification Advantages Disadvantages 1:1 1:N Disadvantage: you need a second means of initiator : PIN or Access Badge #. Advantage: it is fast! Advantage: You can t forget your finger Can be used as a fingerprint only solution. Disadvantage: requires powerful reader & the process is slower 6

7 Biometric reader components Sensor Collects data and converts the information to a digital format Signal processing algorithms Performs quality control activities and develops the biometric template Data storage Keeps information that new biometric templates will be compared to Matching algorithm Compares the new biometric templates to one or more templates in the database Decision process Uses the results from the matching component to make a system-level decision 7

8 Biometric types Most common biometric technologies used Fingerprint Iris recognition Finger vein recognition Hand geometry Signature Face recognition Voice recognition 8

9 Portfolio overview

10 Portfolio overview MA SIGMA MA SIGMA Lite MA SIGMA Lite Plus 5 Color touchscreen Blue / Green / Red / Amber LED indicator & buzzer 2.8 Color touchscreen & buzzer Lenel Confidential Information. Intended for the use of Lenel customers

11 Latest additions Next generation biometric devices First Morpho & Bioscrypt convergence product Building on reliable Sagem Morpho platform Combining the best of both worlds features features Expanded capabilities based on market requirements 11

12 Safran Morpho SIGMA Series 12

13 General overview New generation Morpho algorithms Genuine 1:100K matching (1) : First on the market 1:100K identification in less than 1 second (for frequent users) Accuracy maintained regardless of number of users FBI PIV IQS certified optical sensor (1) Search carried out against single 100K user database 13

14 General overview (Cont d) State-of-the-art fingerprint technology with additional security features Face detection and picture logging Fake finger detection Duress finger option White/Black lists 14

15 General overview (Cont d) Touchscreen time clock, featuring 16 programmable function keys Access time slots and holidays scheduling Accurate punch records (up to 1 million logs storage capacity) Real-time employee notifications Job code management 15

16 General overview (Cont d) Supports multiple identification methods PIN & BIOPIN NFC CARDS Prox iclass MIFARE MIFARE Plus DESFire 16

17 Part numbers Indoor version SMA-BIO SMA-PROX SMA-MULTI SMA-ICLASS SIGMA Series - Indoor, Multi-factor Bio/PIN (3k users incl.), 1M logs storage capacity, PoE incl. SIGMA Series - Indoor, Multi-factor Bio/Card/PIN/BioPIN (3k users incl.), HID Prox, 1M logs storage capacity, PoE incl. SIGMA Series - Indoor, Multi-factor Bio/Card/PIN/BioPIN (3k users incl.), 1M logs storage capacity, PoE incl. SIGMA Series - Indoor, Multi-factor Bio/Card/PIN/BioPIN (3k users incl.), HID iclass, 1M logs storage capacity, PoE incl. Outdoor version SMA-BIO-WR SMA-PROX-WR SMA-MULTI-WR SMA-ICLASS-WR SIGMA Series - Outdoor/WR/IP65, Multi-factor Bio/PIN (3k users incl.), 1M logs storage capacity, PoE incl. SIGMA Series - Outdoor/WR/IP65, Multi-factor Bio/Card/PIN/BioPIN (3k users incl.), HID Prox, 1M logs storage capacity, PoE incl. SIGMA Series - Outdoor/WR/IP65, Multi-factor Bio/Card/PIN/BioPIN (3k users incl.), 1M logs storage capacity, PoE incl. SIGMA Series - Outdoor/WR/IP65, Multi-factor Bio/Card/PIN/BioPIN (3k users incl.), HID iclass, 1M logs storage capacity, PoE incl. Database licenses SMA-DB-10K SMA-DB-50K SMA-DB-100K SIGMA Series - Database upgrade to 10,000 users, S/N or License ID of target terminal is required together w/ order for License generation SIGMA Series - Database upgrade to 50,000 users, S/N or License ID of target terminal is required together w/ order for License generation SIGMA Series - Database upgrade to 100,000 users, S/N or License ID of target terminal is required together w/ order for License generation 17

18 Upcoming releases Questions? Company Confidential 18

New Product Announcement: AC2000 v7.1 Integrations

New Product Announcement: AC2000 v7.1 Integrations New Product Announcement: AC2000 v7.1 Integrations CEM Systems is pleased to announce the release of the latest integrations update for AC2000 v7.1 suite of access control and security management software

More information

MorphoAccess SIGMA Lite Series

MorphoAccess SIGMA Lite Series MorphoAccess SIGMA Lite Series Administration Guide COPYRIGHT MORPHO 2015 Osny, France MorphoAccess SIGMA Lite Series - Administrator Guide Warning WARNING COPYRIGHT MORPHO 2015 All rights reserved. Information

More information

Credentialing Technology & Biometrics

Credentialing Technology & Biometrics Credentialing Technology & Biometrics 1 Course Overview Course Name: Credentialing Technology & Biometrics Credits: 0.6 CEU Duration: 1 day Certification: 2 Course Objectives By the end of this course,

More information

"How-To-Order" Guide - Bioscrypt Biometric Readers

How-To-Order Guide - Bioscrypt Biometric Readers "How-To-Order" Guide - Bioscrypt Biometric Readers Bioscrypt, a world renowned manufacturer of Biometric Access Control devices, has been the market leader for biometrics in access control since 2006,

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

SAGEM MA520 READERS FINGER & SMART CARD ENROLLMENT

SAGEM MA520 READERS FINGER & SMART CARD ENROLLMENT System Galaxy Quick Guide CONFIGURATION AND OPERATION SAGEM MA520 READERS FINGER & SMART CARD ENROLLMENT SG 10.X (Retired) MAR 2013 Page 2 System Galaxy Biometric Guide for Sagem MA520 & MIFARE Cards Configuring

More information

version: User Manual

version: User Manual version: 11.2.0 User Manual Contents Introduction... 6 Support... 6 Overview... 7 What is a client?... 7 What is a server?... 7 What is a fingerprint enrollment device?... 7 What is a Biometric Device?...

More information

L-1 Fingerprint Reader Solutions. V-Flex 4G

L-1 Fingerprint Reader Solutions. V-Flex 4G L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in

More information

iclass SE Platform Solutions The New Standard in Access Control

iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.

More information

How to use a Finger Then Keypad access. Design for: Sigma and Sigma Lite + For Users to use a Finger AND Keyboard access

How to use a Finger Then Keypad access. Design for: Sigma and Sigma Lite + For Users to use a Finger AND Keyboard access How to use a Finger Then Keypad access Design for: Sigma and Sigma Lite + For Users to use a Finger AND Keyboard access Software Screen shots Some screen shots might differ slightly from your version of

More information

Work Instruction. Sigma L1 Legacy Setup

Work Instruction. Sigma L1 Legacy Setup Work Instruction Sigma L1 Legacy Setup PURPOSE This document is to guide the user with the setup and configuration of the Sigma Lite L1 legacy mode to work through the Sagem Engine Service. PREREQUISITES

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

for Sagem SIGMA Readers

for Sagem SIGMA Readers Galaxy Configuration guide for Sagem SIGMA Readers Compatible with Galaxy Hardware for new & existing installations Galaxy supports Legacy mode in SG 10.3.1 or higher Page 1 of 9 System Galaxy Version

More information

L-1 Fingerprint Reader Solutions. V-Station 4G

L-1 Fingerprint Reader Solutions. V-Station 4G L-1 Fingerprint Reader Solutions V-Station 4G Advanced Features Largest Template Capacity in the Industry (100,000 in 1:1; 10,000 in 1:N or up to 50,000 in 1:N with bins) Single-, Two- or Three-factor

More information

T h e re is an upgrade route to larger configurations. O v e rv i e w

T h e re is an upgrade route to larger configurations. O v e rv i e w AMAG 625 Lite Overview AMAG 625 Lite Softwar e AMAG 625 Lite Software is very user friendly and incorporates best of breed functionality including: Comprehensive on-line help Dynamic Maps Flexible card

More information

Match On Card MINEX 2

Match On Card MINEX 2 Match On Card MINEX 2 CTST 2008 Conference Consuelo Bangs Sagem Morpho, Inc. What is MOC? Match on Card (MOC) is the process of sending a biometric template from a live capture device to the card The card

More information

INTUS 1600PS Palm Vein Authentication

INTUS 1600PS Palm Vein Authentication INTUS 1600PS Palm Vein Authentication PalmSecure TM is a mark from Fujitsu Page 1 Biometry what s the use of it? І Need for trustable and automated person identification. І Addition / replacement of traditional

More information

Working with the Sigma series should be done on a Test environment before going *Live*

Working with the Sigma series should be done on a Test environment before going *Live* Working with the Sigma series should be done on a Test environment before going *Live* You just got a Sigma Lite and you need to set it up, here are some basic steps to get you started. **This PDF is only

More information

Operation manual For NG BIOSINGLE Version 1.1

Operation manual For NG BIOSINGLE Version 1.1 Operation manual For NG BIOSINGLE Version 1.1 SMART-I ELECTRONICS SYSTEMS PVT. LTD.(An ISO 9001:2008 certified company) R&D, Training & Customer Support Center: First Floor, Arihant Plaza Phase II, Village-Ovala,

More information

RightPunch. PC-Based Biometric Time Clock. Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce Dimensions (coming soon)

RightPunch. PC-Based Biometric Time Clock. Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce Dimensions (coming soon) Save money and increase productivity with an affordable biometric soft clock for Kronos that runs on PCs, tablets & smartphones! Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce

More information

X200 BIOELECTRONIX. Operating Instructions. X200 Main Interface. Clear or Backspace. Menu Key. On Duty IN & Shift UP

X200 BIOELECTRONIX. Operating Instructions. X200 Main Interface. Clear or Backspace. Menu Key. On Duty IN & Shift UP Main Interface Punch Indicator Clear or Backspace Menu Key On Duty IN & Shift UP Off Duty OUT & Shift Down Escape or Select to punch in by Job number Fingerprint Sensor OK or Enter 1 Employee Fingerprint

More information

MorphoAccess SIGMA Series

MorphoAccess SIGMA Series MorphoAccess SIGMA Series Quick User Guide All descriptions illustrations, and specifications in this brochure should be considered approximate and may relate to optional equipment or feature Table of

More information

In this unit we are continuing our discussion of IT security measures.

In this unit we are continuing our discussion of IT security measures. 1 In this unit we are continuing our discussion of IT security measures. 2 One of the best security practices in Information Security is that users should have access only to the resources and systems

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption.

Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption. INSTALLATION Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption. From this point on, you may install any additional

More information

MorphoAccess TM 500 Series

MorphoAccess TM 500 Series MorphoAccess TM 500 Series User Guide Produced by SAGEM Sécurité Copyright 2007 SAGEM Sécurité www.sagem-securite.com MorphoAccess TM 500 Series User Guide July 2007 SK-60806 2 SAGEM Sécurité document.

More information

Intelligent Access Terminal

Intelligent Access Terminal Intelligent Access Terminal A world of possibilities at your fingertips emerald is a multi functional touch screen access terminal with fully integrated biometric* that is revolutionizing the security

More information

Specifications based on the usage

Specifications based on the usage Industrial Model Introduction Industrial Model, another state-of-the-art from STAR LINK serving its purpose of maintaining attendance records of the employee in Industries or big set-ups. The Industrial

More information

Common Errors and Questions

Common Errors and Questions Common Errors and Questions What is the default password for Secure Admin? There is no default password for Secure Admin, if you forgot it or don t know it you need to uninstall Secure Admin Server and

More information

PoE Professional Fingerprint and RFID Access Control

PoE Professional Fingerprint and RFID Access Control Professional Fingerprint Intelligent Security Professional Fingerprint is a new generation access control device of Anviz. The adopts touch activation technologies in fingerprint sensor and keypad for

More information

Using Sigma and Sigma Lite readers with Secure Admin

Using Sigma and Sigma Lite readers with Secure Admin Using Sigma and Sigma Lite readers with Secure Admin Requirements Sigma to L1 Legacy Sigma Lite to L1 Legacy Working with Secure Admin Scenario One Scenario Two Scenario Three Copy Templates from Database

More information

Advanced Biometric Access Control Training Course # :

Advanced Biometric Access Control Training Course # : Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic

More information

Corporate Commitment to Excellence

Corporate Commitment to Excellence Corporate Commitment to Excellence Galaxy Control Systems was established to bring innovative solutions to the security market. Since 1984, Galaxy has maintained an unwavering commitment to excellence

More information

Using the Prototype TWIC for Access A System Integrator Perspective

Using the Prototype TWIC for Access A System Integrator Perspective Using the Prototype TWIC for Access A System Integrator Perspective AAPA Port Security Seminar and Exhibition, Seattle, WA July 19, 2006 Management and Technology Consultants The Challenge How do I manage

More information

STid presents the new upgradable range. identify. touch. control

STid presents the new upgradable range. identify. touch. control identify. touch. control 18 STid presents the new upgradable range of High Security card readers that use RFID, MIFARE and Bluetooth Smart (Low Energy) technologies. Architect Blue is a secure and user-friendly

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

SYSTEM GALAXY HARDWARE. 635-Series

SYSTEM GALAXY HARDWARE. 635-Series SYSTEM GALAXY HARDWARE 635-Series 635-SERIES CONTROL PANELS Galaxy s 635-series Control Panel provides the most flexible, reliable, and complete access control & security management solution available.

More information

MorphoAccess SIGMA Series

MorphoAccess SIGMA Series MorphoAccess SIGMA Series Installation Guide COPYRIGHT 2014 Morpho Osny, France 2014_00000000-V2 Warning Warning COPYRIGHT 2014 Morpho. All rights reserved. Information in this document is subject to change

More information

Bio-LINK

Bio-LINK Bio-LINK Introduction Bio-Link is a exquisitely made versatile masterpiece and state-of-the-art from Star Link. The Bio-Link is very effective in managing attendance in small setup like IT firm, industries,

More information

Identification or Verification? Advanced Identification Technology

Identification or Verification? Advanced Identification Technology Identification or Verification? Basic Biometric Functions Verification Authenticating claimed identity, by comparing a presented image to a single, selected template. one to one Identification Determining

More information

MorphoAccess SIGMA Lite Series

MorphoAccess SIGMA Lite Series MorphoAccess SIGMA Lite Series Installation Guide COPYRIGHT 2015 Morpho Osny, France MorphoAccess SIGMA Lite Series Installation Guide Warning Warning COPYRIGHT 2015 Morpho. All rights reserved. Information

More information

MorphoAccess SIGMA Extreme Series

MorphoAccess SIGMA Extreme Series MorphoAccess SIGMA Extreme Series Quick User Guide 2017_2000024419 V2 All descriptions, illustrations, and specifications in this brochure should be considered approximate and may relate to optional equipment

More information

Visitor Management User Guide

Visitor Management User Guide Visitor Management User Guide PERPETUAL INNOVATION Lenel OnGuard 2012 Visitor Management User Guide, product version 6.5 This guide is part 1 of a 2-document suite, item number DOC-800, revision 2.016,

More information

MorphoAccess SIGMA Lite Series

MorphoAccess SIGMA Lite Series MorphoAccess SIGMA Lite Series Installation Guide Warning COPYRIGHT 2015 Morpho. All rights reserved. Information in this document is subject to change without notice and do not represent a commitment

More information

Charter Pacific Biometrics Acquisition

Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific has executed a Share Purchase Agreement to acquire 100% of Microlatch. Charter Pacific/Microlatch has a patent

More information

Biometric Use Case Models for Personal Identity Verification

Biometric Use Case Models for Personal Identity Verification Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Better life & Best Security

Better life & Best Security Contents TSG 750 LES (Light Emitting Sensor) TSG 750 Dual (Optical + AES 1711) TSG 750 Standard (Optical sensor) Product Features System Structure ACCESS CONTROL / TIME & ATTANCE S/W The leading Security

More information

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24 Bluetooth mobile solutions APPLICATION NOTE / FAQ Page 1 on 24 Table of Contents I. Introduction... 5 II. Bluetooth Smart technology General principles... 5 III. Frequently Asked Questions... 5 A. STid

More information

TWIC Readers What to Expect

TWIC Readers What to Expect TWIC Readers What to Expect Walter Hamilton Chairman International Biometric Industry Association Walter Hamilton International Biometric Industry Association 1155 F Street, NW Washington, DC 20004 (727)

More information

Biometric Technology

Biometric Technology Biometric Technology Contents Biometric Technology M2SYS is a leading global provider of biometric technology and software solutions with 16 years of real-world experience. Our experience enables us to

More information

TruCredential Software with ISONAS Pure Access Integration Frequently Asked Questions

TruCredential Software with ISONAS Pure Access Integration Frequently Asked Questions February 2018 TruCredential Software with ISONAS Pure Access Integration Frequently Asked Questions General 1. What is TruCredential software? Datacard TruCredential software suite is a solution for creating,

More information

Every now and again, things come along that completely transform our

Every now and again, things come along that completely transform our Every now and again, things come along that completely transform our worldview, creating new benchmarks and challenging our well-worn concepts. With its new Architect concept, STid has created the perfect

More information

ABOUT CIVINTEC PLATFORM PRODUCT RANGE CIVINTEC GLOBAL. World Leading OEM/ODM Designer & Manufacturer

ABOUT CIVINTEC PLATFORM PRODUCT RANGE CIVINTEC GLOBAL. World Leading OEM/ODM Designer & Manufacturer CIVINTEC GLOBAL 01 World Leading OEM/ODM Designer & Manufacturer ABOUT CIVINTEC CIVINTEC is the world leading designer and manufacturer of smart card terminals and devices, established in 2006 and focusing

More information

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts: Identification, authentication, authorisation Three closely related concepts: Identification and authentication WSPC, Chapter 6 Identification: associating an identity with a subject ( Who are you? ) Authentication:

More information

S700e Intelligent IP Reader S700 Exit Reader

S700e Intelligent IP Reader S700 Exit Reader New Product Announcement: S700e Intelligent IP Reader S700 Exit Reader CEM Systems is pleased to announce the release of the S700e and companion S700 Exit Reader for use with the AC2000 suite of access

More information

MorphoAccess 500 Series

MorphoAccess 500 Series MorphoAccess 500 Series User Guide MA 500+ Series OMA 500 Series Produced by Morpho MA 500 Series Copyright 2012 Morpho http://www.morpho.com/ MorphoAccess 500 Series User Guide SSE-0000060806-09 Table

More information

BioLite Net. Firmware Revision Notes EN BLN V1.43. Biometrics & Security. Version 1.43

BioLite Net. Firmware Revision Notes EN BLN V1.43. Biometrics & Security. Version 1.43 BioLite Net Firmware Revision Notes Version 1.43 Biometrics & Security Firmware Version 1.43 (Build No. 1.43_161010) Release: 2016-10-25 1. Improvements 1.1. The stability of the network communication

More information

VTerminal Virtual Clocking Terminal Solution. F0H02 Fingerprint Identification / USB Fingerprint / Card Reader. Application UI. Features.

VTerminal Virtual Clocking Terminal Solution. F0H02 Fingerprint Identification / USB Fingerprint / Card Reader. Application UI. Features. VTerminal Virtual Clocking Terminal Solution Application UI Mobile BioSeal-V FH2 Portable GPS Monitoring Cost-effective No hassle for users to install anything. Mobile devices work as portable terminals

More information

System Galaxy Quick Guide

System Galaxy Quick Guide System Galaxy Quick Guide System Galaxy 10.4.1 Biometric Integration with MorphoManager v6.2.0 SIGMA-Prox & SIGMA-Bio in MA5G Mode JUNE 2015 3 RD Edition This document covers 1. System and Hardware Compatibilities

More information

HandNet-Lite. Terminal User s Guide

HandNet-Lite. Terminal User s Guide HandNet-Lite Terminal User s Guide This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide

More information

qscan Outdoor 2-D Barcode Scanner

qscan Outdoor 2-D Barcode Scanner qscan Outdoor 2-D Barcode Scanner Qscan is the perfect outdoor reader to read print-at-home event tickets, driver s licenses, and even qr codes from smartphone displays. Qscan reads over 30 barcode sybologies,

More information

NFC Identity and Access Control

NFC Identity and Access Control NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity

More information

Bio-FactsFigures.docx Page 1

Bio-FactsFigures.docx Page 1 Above shows the G6-BIO-B (Beige case) and the G6-BIO-G (Grey case). Bio-FactsFigures.docx Page 1 Table of Contents 1. Biometric Concepts... 3 1.1. Is it possible to trick the sensor?... 3 1.2. Would a

More information

Access control software SENATORFX. Quick start guide

Access control software SENATORFX. Quick start guide Access control software SENATORFX Quick start guide CONTENTS p.2/23 CONTENTS CONTENTS...2 INFORMATION...3 1) PC specifications...3 2) RS485 bus connections...4 3) Ethernet network connections...5 4) Software

More information

TSG 250. Fingerprint Identification Reader Operation & Installation Manual v1.0

TSG 250. Fingerprint Identification Reader Operation & Installation Manual v1.0 TSG 250 Fingerprint Identification Reader Operation & Installation Manual v1.0 TABLE OF CONTENTS SECTION 1 TSG-250 Installation Manual 1. Power... 4 2. LAN Communication... 4 4. Door Sensor/EXIT Button

More information

Total Biometric Solution Provider

Total Biometric Solution Provider Total Biometric Solution Provider Physical Access Control 04 Access Control Security Solution 06 NAC-5000 08 enbioaccess-t5 10 enbioaccess-t3 12 Fingkey Access Plus 14 NAC-2500 Plus 16 Fingkey Access 138-050

More information

ACCESS CONTROL Products 2017

ACCESS CONTROL Products 2017 Page 1 of 8 NESS Access Controllers 101-102 NESS MCP-040 ACCESS CONTROLLER Including 12V 6A power supply and high-tech metal housing Supports 4 x Wiegand Readers Supports 8 x RS-485 Readers 4 Lock Outputs

More information

3D Face Project. Overview. Paul Welti. Sagem Défense Sécurité Technical coordinator. ! Background. ! Objectives. ! Workpackages

3D Face Project. Overview. Paul Welti. Sagem Défense Sécurité Technical coordinator. ! Background. ! Objectives. ! Workpackages 3D Face Project Paul Welti Sagem Défense Sécurité Technical coordinator Overview! Background! Objectives! Workpackages 2 1 ! Biometric epassport Biometrics and Border Control! EU-Council Regulation No

More information

Copyright 2009, NITGEN&COMPANY Co., Ltd. All rights reserved.

Copyright 2009, NITGEN&COMPANY Co., Ltd. All rights reserved. Copyright 2009, NITGEN&COMPANY Co., Ltd. All rights reserved. ` Unauthorized reproduction of part or all of this manual s content in any form is prohibited. Product specifications may change without prior

More information

Security & Convenience

Security & Convenience Security & Convenience No.1 professional group in multiple biometrics field, Leading technical brand in fake fingerprint detection, A global brand active all around the world, About VIRDI VIRDI is a professional

More information

MorphoAccess SIGMA Series

MorphoAccess SIGMA Series MorphoAccess SIGMA Series Installation Guide COPYRIGHT 201 Morpho Osny, France MorphoAccess SIGMA Series Installation Guide January 2017 2014_00000000-V7 Warning Warning COPYRIGHT 201 Morpho. All rights

More information

MorphoManager User Manual. Table of Contents

MorphoManager User Manual. Table of Contents User Manual Table of Contents Introduction... 4 Support... 4 Overview... 5 What is a client?... 5 What is a server?... 5 What is a fingerprint enrollment device?... 5 What is a MorphoAccess?... 6 What

More information

INFORMATION TO BE GIVEN(2)

INFORMATION TO BE GIVEN(2) To be filled out in the EDPS' office REGISTER NUMBER: 900 NOTIFICATION FOR PRIOR CHECKING Date of submission: 25/09/2012 Case number: 2012-0824 Institution:European Commission Legal basis: Article 27.2.(a)

More information

USER GUIDE MORPHOACCESS J SERIES. DOCUMENT SSE May Copyright 2010 Sagem Sécurité Osny, France

USER GUIDE MORPHOACCESS J SERIES. DOCUMENT SSE May Copyright 2010 Sagem Sécurité Osny, France MORPHOACCESS J SERIES USER GUIDE DOCUMENT SSE-0000077399-02 - May 2010 Copyright 2010 Sagem Sécurité Osny, France Sagem Sécurité Document - Reproduction and Disclosure Prohibited Warning Warning MorphoAccess

More information

uface800 Time Clock User Manual uface800

uface800 Time Clock User Manual uface800 Innovative Time and Attendance Solutions uface800 Time Clock User Manual Version 3.6.3 uface800 Visit: MidexTimeAndAttendance.com Call: 1-888-544-7878 Email: info@midexsoftware.com /TimeAndAttendanceSoftware

More information

TL100C Features: Real-time 1-touch data export 3rd party hosted & non-hosted applications

TL100C Features: Real-time 1-touch data export 3rd party hosted & non-hosted applications TL100C Features: Color TFT screen with GUI Interface for ease of use Optical Sensor 1 touch a-second user recognition Stores 3,000 templates and 100,000 transactions Reads Fingerprint and/or PINs integrated

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

MorphoAccess. Configuration Tool User Guide. MorphoAccess. Configuration Tool User Guide SSE Produced by Sagem Sécurité

MorphoAccess. Configuration Tool User Guide. MorphoAccess. Configuration Tool User Guide SSE Produced by Sagem Sécurité MorphoAccess Configuration Tool User Guide Produced by Sagem Sécurité Copyright 2010 Sagem Sécurité www.sagem-securite.com MorphoAccess SSE-0000036539-05 Configuration Tool User Guide May 2010 Table of

More information

MorphoManager User Manual. Table of Contents

MorphoManager User Manual. Table of Contents User Manual Table of Contents Introduction... 4 Support... 4 Overview... 5 What is a client?... 5 What is a server?... 5 What is a fingerprint enrollment device?... 5 What is a Biometric Device?... 6 Setting

More information

Digitus Biometrics Product Catalogue. Request a quote or design assistance by ing or calling

Digitus Biometrics Product Catalogue. Request a quote or design assistance by  ing or calling Digitus Biometrics 2015 Product Catalogue Request a quote or design assistance by emailing sales@digitus-biometrics.com or calling 912.231.8175. Table of Contents Access Control Solutions db ServerRack

More information

BioStar. Revision Notes EN BS V1.81. Biometrics & Security. Version 1.81

BioStar. Revision Notes EN BS V1.81. Biometrics & Security. Version 1.81 BioStar Revision Notes Version 1.81 Biometrics & Security Version 1.81 Release: 2015-04-07 1. Others 1.1. BioStar DB Task Program removal from the BioStar 1.81 Installation Package 2. Bug Fixed 2.1. A

More information

Meeting the requirements of PCI DSS 3.2 standard to user authentication

Meeting the requirements of PCI DSS 3.2 standard to user authentication Meeting the requirements of PCI DSS 3.2 standard to user authentication Using the Indeed Identity products for authentication In April 2016, the new PCI DSS 3.2 version was adopted. Some of this version

More information

MORPHOSMART CBM SERIES

MORPHOSMART CBM SERIES MORPHOSMART CBM SERIES COMPACT BIOMETRIC MODULES FOR OEM INTEGRATION The best, most compact optical modules on the market Easy integration of biometric functions into multiple applications High quality

More information

MorphoAccess SIGMA Lite

MorphoAccess SIGMA Lite MorphoAccess SIGMA Lite Series Quick User Guide 2015_2000005700-V4 MorphoAccess SIGMA Lite+ MorphoAccess SIGMA Lite All descriptions, illustrations, and specifications in this brochure should be considered

More information

Time Recorder Manual

Time Recorder Manual Time Recorder Manual 1. Install Authentication software... 1 1.1 Install Fingerprint Authentication Software... 1 1.2 Install Finger Vein Authentication Software... 3 1.3 Install Hybrid Authentication

More information

Fingerprint Authentication for SIS-based Healthcare Systems

Fingerprint Authentication for SIS-based Healthcare Systems Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it

More information

MorphoAccess SIGMA Lite

MorphoAccess SIGMA Lite MorphoAccess SIGMA Lite Series Quick User Guide 2015_2000005700-V5 MorphoAccess SIGMA Lite+ MorphoAccess SIGMA Lite All descriptions, illustrations, and specifications in this brochure should be considered

More information

Information Security Identification and authentication. Advanced User Authentication II

Information Security Identification and authentication. Advanced User Authentication II Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background

More information

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication Stuart Hall ICTN 4040 601 04/10/17 Advantages and Drawbacks to Using Biometric Authentication As technology advances, so must the means of heightened information security. Corporate businesses, hospitals

More information

USER MANUAL. V6.3- Part 1 - Page 1 on 233

USER MANUAL. V6.3- Part 1 - Page 1 on 233 USER MANUAL V6.3- Part 1 - Page 1 on 233 Acknowledgment Welcome to the world of high security! You have purchased SECard software; it will allow you to program configuration and user cards. We thank you

More information

Bioscrypt Inc. Architect & Engineer Specification

Bioscrypt Inc. Architect & Engineer Specification V-Flex Fingerprint Reader November 10, 2004 Bioscrypt Inc. Architect & Engineer Specification 1. Introduction The intent of this document is to describe the specifications, operation, and physical attributes

More information

ALLDAY TIME SYSTEMS LTD. Allday PT1400 Biometric User Guide

ALLDAY TIME SYSTEMS LTD. Allday PT1400 Biometric User Guide Allday PT1400 Biometric User Guide Entering the Administration Menu. On first use of the PT1400 Terminal the Terminal Administration menu can be accessed by simply holding down the M/OK button for 5 seconds

More information

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.

More information

BioPointe Finger/Card Presentation

BioPointe Finger/Card Presentation This guide is made available for distribution to anyone who will have occasion to enter through a door controlled by a Fingerprint Identification unit. Some units are designed to read Proximity cards in

More information

Using Biometric Authentication to Elevate Enterprise Security

Using Biometric Authentication to Elevate Enterprise Security Using Biometric Authentication to Elevate Enterprise Security Biometric authentication in the enterprise? It s just a matter of time Mobile biometric authentication is officially here to stay. Most of

More information

VP-II X Hand Vascular Pattern Recognition System

VP-II X Hand Vascular Pattern Recognition System Hand Vascular Pattern Recognition System VP-II X Hand Vascular Pattern Recognition System User s Manual 1 Preface Thank you for choosing the VP-II X, Hand Vascular Pattern Recognition System. This manual

More information

This document mainly introduces the windows and operations of the F18 model 2.4 inch color TFT product.

This document mainly introduces the windows and operations of the F18 model 2.4 inch color TFT product. F18 User Manual Version: 1.0 Date: Dec. 2011 Introduction: This document mainly introduces the windows and operations of the F18 model 2.4 inch color TFT product. About this manual 1. Not all the devices

More information

MorphoAccess SIGMA Lite

MorphoAccess SIGMA Lite MorphoAccess SIGMA Lite Series Quick User Guide 2015_2000005700-V1 MorphoAccess SIGMA Lite+ MorphoAccess SIGMA Lite All descriptions, illustrations, and specifications in this brochure should be considered

More information

PALM VEIN TECHNOLOGY

PALM VEIN TECHNOLOGY Palm Vein Technology 1 SRI VASAVI ENGINEERING COLLEGE Pedatadepalli, West Godavari Dist, A.P Department of Electrical & Electronics Engineering SEMINAR ON PALM VEIN TECHNOLOGY (TOUCHING THE PERFECTION)

More information