3M Public Security. Industry-leading reader and scanner. solutions

Size: px
Start display at page:

Download "3M Public Security. Industry-leading reader and scanner. solutions"

Transcription

1 3M Public Security Industry-leading reader and scanner solutions

2 Improving security across markets and around the globe 3M offers a wide variety of hardware and software solutions that help take the guesswork out of identity management. As capturing essential identity data becomes more crucial and security challenges increase, 3M s robust portfolio helps you take on the heightened realities of a changing world. 3M Reader and Scanner Solutions

3 3M is the trusted security partner of governments, transportation and commercial organizations around the globe. EXPANDABLE. SCALABLE. RELIABLE. CUSTOMIZABLE. Our innovative identification and authentication solutions can transform how you capture essential data and positively impact your operational efficiencies. We offer a comprehensive and expandable line of document and biometric readers and scanners to support your security needs today as well as the product solutions you may need tomorrow. Our solutions include: DOCUMENT FULL PAGE READERS DOCUMENT SWIPE READERS BIOMETRIC MOBILE ID READERS BIOMETRIC SCANNERS BIOMETRIC ACCESS CONTROL READERS

4 3M DOCUMENT FULL PAGE READERS CR5400 AT9000 MK2 Our Full Page Readers are designed to meet the challenges of data capture with solutions that can be integrated into your applications. We offer a full line of readers from entry level to advanced reader technology, both for desktop and integrated self-service applications. Fast and easy data capture Reliable and accurate ID validation and authentication High-quality multiple wavelength illumination visible IR, UV, retroreflective laminate, RFID technology Ability to read and authenticate multiple document types quickly, easily and accurately EXCLUSIVE SOFTWARE (check reader specifications for compatibility) Using OCR technology, 3M Data Capture Software recognizes data in a field of a document and converts it directly into text, reducing the time and the possibility for errors when manually entering information. Data is ready for automatic and accurate entry into the correct form field in seconds. 3M Document Authentication Software compares a scanned document with images of a genuine document in the database, scores the data and security features, and generates a matching score that helps you identify a document that s likely fraudulent or manipulated. The 3M MICROS OPERA Interface is used with 3M swipe and full page readers to increase operational efficiency and optimize customer service. The software features seamless integration with MICROS OPERA property management software, enabling fast and accurate data input. KR9000 KR2400 QS1000 Kiosk Reader 4 3M Reader and Scanner Solutions

5 Specifically designed for reading both sides of an ID card or driver s license simultaneously APPLICATIONS ADVANTAGES GOVERNMENT COMMERCIAL Transportation ID/driver s license verification High-quality document reader for accurate ID/driver s license validation and authentication Simultaneously images both sides in multiple light sources Processes documents in less than four seconds Optional cradle offers RFID and magstripe reading Ergonomically designed full-page reader for identification and full authentication. Removable hood enables hoodless operation. Border control Police Airport Car rental Visitor registration Ability to read and process images from passports, ID cards, visas and all other types of documents quickly, easily and accurately Hoodless operation, reflection removal, enhanced color fidelity, USB only power Support for ICAO-compliant and non-compliant travel documents Reliable, static parts and dust-sealed optics rated to IP50 for harsh environments Ideal for integrating into counters, kiosks and gates Border control Security checkpoints Airport Car rental Visitor registration Easily processes images from documents, e-passports and 2D barcoded boarding passes, automatically removing reflections Active video document detection allows reading in virtually any orientation Reliable, static parts and dust-sealed optics rated to IP50 Support for ICAO-compliant and non-compliant travel documents Flatbed reader ideal for identification at kiosks requiring MRZ codeline ID only Police Security checkpoints Airport Car rental Visitor registration Gaming/hotels Low height makes it ideal for small kiosks Easily placed in areas not originally designed for a document reader Intuitive document placement for easy self-service use High-resolution camera for accurate document capture Ability to customize format for integration into an existing system Entry-level compact document reader designed for fast, wholepage and barcode data capture Cruise lines Age verification Gaming/hotels Sporting events Fast and accurate data capture when there is no need to check if the document is genuine and not manipulated Convenient 2D barcode reading from cell phones Active video allows reading from various document orientations For fast image processing and document authentication specifically for kiosk and e-gate document checking Transportation Cruise lines Age verification Gaming/hotels Sporting events Easily processes images from documents, e-passports and 2D barcoded boarding passes Optional RF bezel (front tray) 3M.com/IdentityManagement 5

6 3M DOCUMENT SWIPE READERS CR100 Our Document Swipe Readers offer quick and accurate data capture from passports, IDs and other machine readable travel documents (MRTDs). Small, lightweight solutions adaptable to crowded work areas Quick and accurate data capture with bi-directional document scanning for additional ease of use On-board decoding for fast and accurate reading and processing of individuals Automatic transfer of data into existing IT systems, reducing risk of input errors and resulting loss of revenue MRZ codeline checking algorithms that reduce ID fraud CR100M 3M BIOMETRIC MOBILE ID READERS BlueCheck II and IIU Our biometric mobile ID reader products put the power of a full-scale AFIS in the palm of your hand, providing fast access to positive identity verification, arrest records and warrants. Available in a variety of models, devices range from those that only capture fingerprints to models that include multibiometric capture, such as fingerprint, face and iris. EXCLUSIVE SOFTWARE (check reader specifications for compatibility) The 3M Mobile ID application can run on a commercially available smartphone with compatible OS, BlackBerry or our own biometric mobile handhelds. Mobile ID software formats the captured biometric data into NIST standard transaction records and transmits it to a remote AFIS over a wireless network. MI2 MI3 The 100% Web-based, flexible architecture of the 3M Web ID application enables it to be used with the 3M BlueCheck II fingerprint scanner or USB-powered optical scanners. Web ID can be integrated with other third-party scanners via ActiveX controls. Biometric data is submitted to a remote AFIS over a LAN or WAN network through the secure Web ID page using a standard Web browser. 6 3M Reader and Scanner Solutions

7 APPLICATIONS ADVANTAGES GOVERNMENT COMMERCIAL Low-cost optical codeline reader (OCR) that uses basic MRZ information Elections Self-service check-in Age verification Sporting events Visitor registration Hotels A dependable and reliable OCR reader adaptable to a variety of workstations and areas Captures data that can be used to automatically populate field A comprehensive data-swipe and capture system Low-cost reader that uses basic MRZ information, in conjunction with a magstripe reader (MSR) Elections Self-service check-in Age verification Sporting events Visitor registration Hotels All of the advantages of our CR100 solution, as well as: MSR reading of credit cards, frequent traveler cards, U.S. driver s licenses and loyalty cards Quick processing of documents with different thicknesses, such as a thinner frequent flyer card and a thicker passport APPLICATIONS ADVANTAGES GOVERNMENT COMMERCIAL Lightweight, single-handed reader that enables users to capture and search a fingerprint database remotely Identification Inmate handling Identification Campus security Healthcare records check Facilitates remote identification At less than 5 ounces, it can be easily incorporated into existing equipment Compatible with ios, Android, BlackBerry, Windows -based PDA or laptop using Bluetooth connectivity, leveraging existing IT infrastructure Performs on-the-spot fingerprint and portrait acquisition for identification or enrollment Disaster scene management Identity verification Traffic citations Identity verification Campus security Healthcare records check Integrated wireless communication enables use without the need of a host device Magnetic stripe reader enables automatic data entry capability Captures fingerprint and highresolution portraits for in-thefield identifications or enrollment Disaster scene management Identity verification Border control Traffic citations Identity verification Travel document authentication Integrated wireless communication enables use without the need of a host device Modular attachments allow credential-reading capability 3M.com/IdentityManagement 7

8 3M BIOMETRIC SCANNERS CSD 200i CSD 330 Biometric scanners read and capture data and provide forensic-quality images using an advanced optical system that enhances ambient light rejection. Each scanner features rapid frame speed and is FBI certified. EXCLUSIVE SOFTWARE (check reader specifications for compatibility) The 3M Child ID software system is compatible with 3M Cogent s CS 500e slap scanner or 3M Cogent s CSD 200 and CSD 330 single-finger scanners. These scanners digitally capture the child s fingerprints without the use of ink. The software safeguards the child s information by discarding all captured information upon closing the application. The Child ID Kit is a fast and reliable solution for law enforcement agencies, public safety agencies and neighborhood watch programs. The 3M Livescan 5.0 software facilitates the capture of demographic information and fingerprint, palm print and facial images. Available in both Web or stand-alone versions, Livescan 5.0 features an intuitive data entry design and provides flexible workflows that offer customization of the software to fit the customers needs. Contact us to learn more about our full line of advanced iris and facial recognition products. CSD 450f Livescan CS 500e Tenprint Livescan CS 500p Tenprint and Palmprint Livescan CS 1000p Tenprint Livescan Cabinet Ruggedized housing cabinet compatible with our complete FBI-certified palm print and tenprint Livescan products. Designed for flexibility, the Livescan Cabinet offers various components that can be easily incorporated to create a range of applications such as applicant fingerprint processing, border control or inmate booking. Livescan CIS 202 Dual Iris Capture Scanner 8 3M Reader and Scanner Solutions

9 APPLICATIONS ADVANTAGES GOVERNMENT Voter registration Inmate handling COMMERCIAL Benefits verification Travel document authentication A durable and compact single-digit optical fingerprint scanner that features liveness/ fake fingerprint detection Liveness and fake fingerprint detection Ambient light rejection permits the capture of fingerprints from stained, marked or dark fingers Small footprint and USB connectivity for both data and power allow for easy integration into new or existing applications SDKs available for third-party integration A single-digit optical fingerprint scanner with an advanced optical system that is able to capture quality fingerprints from stained, marked or dark fingers Voter registration Inmate handling Benefits verification Travel document authentication Ambient light rejection permits the capture of fingerprints from stained, marked or dark fingers Small footprint and USB connectivity for both data and power allow for easy integration into new or existing applications SDKs available for third-party integration A FIPS 201-certified dual-digit optical fingerprint scanner that captures high-quality prints through an advanced optics design Voter registration Inmate handling Benefits verification Travel document authentication Larger capture platen allows for rolled single-digit or flat dualdigit fingerprint image capture Ambient light rejection permits the capture of fingerprints from stained, marked or dark fingers Small footprint and USB connectivity for both data and power allow for easy integration into new or existing applications SDKs available for third-party integration A lightweight fingerprint scanner capable of performing rolled and flat fingerprint images Border control Background checks Benefits enrollment National ID Applicant background checks Child ID Supports flat and/or rolled capture capabilities High-definition optics allow the capture of forensic-quality rolled or flat images that meet the ANSI/NIST and FBI Image Quality Specification (IQS) standards USB connectivity for both data and power allow for easy integration into new or existing applications SDKs available for third-party integration Captures forensic-quality images that meet the ANSI/NIST and FBI Image Quality Specification (IQS) standards, allowing electronic interface with other law enforcement systems Background checks Criminal booking Benefits enrollment National ID Forensic-quality image capture for flat, rolled and palm print impressions High-definition optics allow the capture of forensic-quality rolled or flat images that meet the ANSI/NIST and FBI Image Quality Specification (IQS) standards SDKs available for third-party integration FBI-certified Livescan device that captures all rolled fingers, flats, upper, lower and writer s palms during the booking process Background checks Criminal booking Benefits enrollment National ID Forensic-quality image capture for flat, rolled and palm print impressions High-definition optics allow the capture of forensic-quality rolled or flat images that meet the ANSI/NIST and FBI Image Quality Specification (IQS) standards SDKs available for third-party integration Low-cost scanner enables users to safely capture high-resolution iris images, while eliminating intrusive capture position or user discomfort Border control National ID Voter registration Civil registry enrollment Biometric document issuance Applicant identification Provides rapid and simultaneous iris capture in less than two seconds Near infrared illuminators, LED lighting and built-in spectral imaging sensitivity control Simultaneously captures dual irises User-friendly goggle design that meets IP 54 rating Unaffected by ambient lighting Adjustable interpupillary distance 3M.com/IdentityManagement 9

10 3M BIOMETRIC ACCESS CONTROL READERS MiY-Touch 3M offers the most complete line of highly customizable biometric physical access control readers and OEM solutions that perform fast authentication and efficient entry while providing increased flexibility, first-rate security and access security in a wide variety of applications. EXCLUSIVE SOFTWARE (check reader specifications for compatibility) 3M MiY Security Manager Software allows administrators to customize operations, manage devices, integrate solutions and keep the systems up to date with the latest software release. It also gives users simple single-click updates, easy smart card integration and event and management logs to facilitate record keeping and customizing your MiY Security System to your needs. 3M Sandbox SDK Development Platform allows the customization of almost any part of the product s server, client or embedded solutions to Make it Yours (MiY). The unified API framework provides over 500 functions and pre-packaged tools to quickly develop new GateApps or client UI interfaces. Built to support various smart card readers, fingerprint scanners, barcode readers and several biometric matching algorithms including our MINEX certified matchers for ANSI378 and ISO MiY-Search MiY-Card MiY-ID Mini-Gate 10 3M Reader and Scanner Solutions

11 APPLICATIONS ADVANTAGES GOVERNMENT Government buildings Prison access Military access Airport facility security COMMERCIAL Customizable biometric physical access control terminal designed to perform a wide variety of customizable functions Employee time and attendance Office buildings access Factory shop floor management Schools Data centers access Banks Features an external USB for add-on devices Reader is sandbox API framework supported Can be paired with optional detachable contact or contactless smart card reader module Contact and contactless card reader modules available for in-the-field customization Built-in time and attendance functionality TLS encrypted communication Secure USB This reader combines fingerprint and PIN authentication for fast and secure access Government buildings Prison access Military access Airport facility security Employee time and attendance Office buildings access Factory shop floor management Schools Data centers access Banks Protected OTG port for added security Reader is sandbox API framework supported The outdoor design features an Ingress Protection Level (IP) 65 with built-in TLS encrypted Ethernet and PIV scanners TLS encrypted communication Secure USB Multi-purpose biometric reader designed to take on the outdoor elements Airport facility security Seaport facility security TWIC Government building security PIV/FICAM Military access CAC Prison access Employee time and attendance Office buildings access Factory shop floor management Schools Data centers access Banks Facilitates multi-factor identification Combines contactless smart card, biometric fingerprint technology and numerical PIN TWIC approved TLS encrypted communication Secure USB Able to use multiple card technology, fingerprint, PIN, contact and contactless smart card Airport facility security Seaport facility security TWIC Government building security PIV/FICAM Military access CAC Prison access Employee time and attendance Office buildings access Factory shop floor management Schools Data centers access Banks Can be customized to comply with specific government security standards applied by different countries Is both a PC/SC contact and MIFARE /DESFire contactless smart card reader TWIC approved TLS encrypted communication Secure USB Multi-function biometric access control reader designed for basic access control at a lower price Prison access Office buildings access Schools Data center access Banks Designed for centralized or stand-alone management Compatible with the MiY-Security Manager software TLS encrypted communication Secure USB 3M.com/IdentityManagement 11

12 Complete security begins with 3M As a partner, 3M uses powerful strategies, products and systems to create complete solutions for your security challenges. To learn more, visit 3M.com/IdentityManagement or call When you work with us, you leverage the resources of 3M a 100+ year-old global company with more than $31 billion in revenues. You can feel confident we re here to stay, which is critical when it comes to identity management system integration and support. Important Notice to Purchaser 3M offers complete solutions and a range of security products to protect against article and/or document identity counterfeit, alteration, diversion, duplication, simulation and substitution. However, no security products can guarantee absolute protection against attempts to successfully accomplish these illegal activities. For specific 3M product and solution warranties please see 3M.com/IdentityManagement. Warranty, Limited Remedy and Limited Liability THE FOLLOWING IS MADE IN LIEU OF ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 3M warrants that its products will meet 3M s written specification at the time of shipment. 3M s obligation and your exclusive remedy shall be, at 3M s option, to replace or repair the 3M product or refund the purchase price of the 3M product. IN NO EVENT WILL 3M BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES, INCLUDING, BUT NOT LIMITED TO, LOSS OF PROFITS, IN ANY WAY RELATED TO THE PRODUCTS REGARDLESS OF THE LEGAL THEORY ASSERTED. User is responsible for determining whether the 3M product is fit for a particular purpose and suitable for user s application. Warranties, remedies and limitations may vary by product and jurisdiction. Please consult 3M product quote or agreement, or contact 3M for specific information about individual products. Android is a trademark of Google Inc. BlackBerry is the property of Research In Motion Limited and is registered and/or used in the U.S. and countries around the world. IOS is a trademark or registered trademark of Cisco in the U.S. and other countries and is used under license. Windows is a registered trademark of Microsoft Corporation in the United States and other countries. Public Security United States and Latin America 3M Center, Building 225-4N-14 St. Paul, MN U.S.A M.com/IdentityManagement Europe, Middle East and Africa 3M United Kingdom PLC 3M Centre Cain Road Bracknell RG12 8HT United Kingdom +44(0) Asia Pacific 1 Yishun Avenue 7 Singapore Canada 1545 Carling Avenue Ottawa, ON Canada K1Z8P M Cogent, Inc. 639 N. Rosemead Blvd. Pasadena, CA Please recycle. Printed in U.S.A. 3M, BlueCheck and MICROS are trademarks of 3M. 3M All rights reserved. Used under license in Canada

ID Document Scanning and Biometric Solutions

ID Document Scanning and Biometric Solutions ID Document Scanning and Biometric Solutions PRODUCT CATALOGUE Contents ID DOCUMENT SCANNING & BIOMETRIC SOLUTIONS Advanced ID document reading solutions Typical applications ID document scanning process

More information

Complete. security. begins with 3M

Complete. security. begins with 3M Complete security begins with : Global Helping to protect people, documents and goods Leadership in the Security Industry For more than 30 years, Security has been a trusted partner, helping governments

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

2014 Suprema, Inc. Suprema and identifying product names and numbers herein are registered trademarks of Suprema, Inc. All non-suprema brands and

2014 Suprema, Inc. Suprema and identifying product names and numbers herein are registered trademarks of Suprema, Inc. All non-suprema brands and 2014 Suprema, Inc. Suprema and identifying product names and numbers herein are registered trademarks of Suprema, Inc. All non-suprema brands and product names are trademarks or registered trademarks of

More information

Full page passport/document reader Regula model 70X4M

Full page passport/document reader Regula model 70X4M Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses

More information

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS BIMS BIOMETRIC DATA ACQUISITION BIMS Biometric Data Acquisition is an application for persons biographical and biometrical data collection in real time or from

More information

MegaMatcher Case Study

MegaMatcher Case Study MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and

More information

SYMMETRY PRODUCT OVERVIEW

SYMMETRY PRODUCT OVERVIEW ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations

More information

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Biometrics Overview Neal Latta US-VISIT IDENT Program Manager 1 Importance of Biometric Standards in Post 9/11 Environment Dramatic Increase in Utilization of Biometric

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

Deriving a Trusted Mobile Identity from an Existing Credential

Deriving a Trusted Mobile Identity from an Existing Credential Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile

More information

Next Generation Web-Based Time & Attendance

Next Generation Web-Based Time & Attendance Next Generation Web-Based Time & Attendance PerfectTIME Take control of labor costs and workforce management Streamline PerfectTIME is an intuitive, convenient and efficient web-based time and attendance

More information

CRESCENDO SERIES Smart Cards. Smart Card Solutions

CRESCENDO SERIES Smart Cards. Smart Card Solutions CRESCENDO SERIES Smart Cards Smart Card Solutions Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution. Crescendo smart cards allow me to

More information

FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION

FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION MAKE THE SWITCH TO MONEXgroup ecommerce I Mobile I Wireless I Integrated I Countertop Solutions IN-STORE ON-THE-GO ONLINE Accept secure debit and credit card

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

PalmSecureID for the EDUCATION MARKETPLACE

PalmSecureID for the EDUCATION MARKETPLACE PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings

More information

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS USER BIOMETRIC DATA ACQUISITION OPERATOR BIOMETRIC IDENTIFICATION OPERATOR DOCUMENT VERIFICATION OPERATOR VIDEO ANALYTICS OPERATOR FINGERPRINT AND FACE EXPERTS

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg [email protected]

- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg Security & Time Attendance System - BIOMETRIC LiteStar Singapore Pte Ltd LiteStar Singapore Pte Ltd Tel : +65-6286 8300 Website : www.litestar.com.sg [email protected] Biometric Systems Biometrics

More information

SINGLE DEVICE FOR MULTIPLE TASKS

SINGLE DEVICE FOR MULTIPLE TASKS ViZRO s BioMate M043 SINGLE DEVICE FOR MULTIPLE TASKS Datasheet ViZRO S BioPad Vizro Technologies www.vizro.net INDEX 1. Introduction 2. Main Application Area 3.Technical Specifications 4.Product Picture

More information

FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION

FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION MAKE THE SWITCH TO MONEXgroup ecommerce I Mobile I Wireless I Integrated I Countertop Solutions PAYMENTS IN-STORE PAYMENTS ON-THE-GO PAYMENTS ONLINE Accept

More information

One Platform for all your Print, Scan and Device Management

One Platform for all your Print, Scan and Device Management One Platform for all your Print, Scan and Device Management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in

More information

Mobile Driver s License Solution

Mobile Driver s License Solution Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity

More information

AX.S Series Access Control and I.AM Series Identity Access Management

AX.S Series Access Control and I.AM Series Identity Access Management AX.S Series Access Control and I.AM Series Identity Access Management We selected the Kaba Embedded Access Control System for its features and functions, but what we like the most is how rock solid the

More information

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards Converged Smart Card for Identity Assurance Solutions Crescendo Series Smart Cards Crescendo is the proven smart card solution for a combined logical and physical access control solution. Crescendo smart

More information

All About Fingerprints. SUPREMA Presentation APR 2010

All About Fingerprints. SUPREMA Presentation APR 2010 All About Fingerprints SUPREMA Presentation APR 2010 I. About SUPREMA Suprema at a Glance Annual Revenue KRW 28.7 billion (2009) Employees Global Business 75 (over 45 engineers in R&D) 100 countries worldwide

More information

Biometric Enabled Access and Time & Attendance Solutions

Biometric Enabled Access and Time & Attendance Solutions Biometric Enabled Access and Time & Attendance Solutions Certified Partner The Ultimate Set of Keys The Ultimate Fingerprint Readers Cost-effective Protection Throughout Your Organization How to protect

More information

1. Product Overview 2. Product Feature 3. Product Value 4. Development Environment 5. Software Development Kit 6. Product Application 7.

1. Product Overview 2. Product Feature 3. Product Value 4. Development Environment 5. Software Development Kit 6. Product Application 7. www.acs.com.hk 1. Product Overview 2. Product Feature 3. Product Value 4. Development Environment 5. Software Development Kit 6. Product Application 7. Product Roadmap 8. Q & A 2 3 ACR88 Handheld Smart

More information

BES10 Self-Service. Version: 10.2. User Guide

BES10 Self-Service. Version: 10.2. User Guide BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create

More information

Strong Identity Authentication for First Responders

Strong Identity Authentication for First Responders Strong Identity Authentication for First Responders Entrust Solutions for Compliance to U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) Standards Entrust Inc. All

More information

22 nd NISS Conference

22 nd NISS Conference 22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO

More information

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company 3M Cogent, Inc. White Paper Beyond Wiegand: Access Control in the 21st Century a 3M Company Unprecedented security features & capabilities Why Wiegand? The Problem with Wiegand In 1970, John Wiegand invented

More information

Modular biometric architecture with secunet biomiddle

Modular biometric architecture with secunet biomiddle Version 2.1 Modular biometric architecture with secunet biomiddle White Paper Version 2.0, 25/03/10 secunet Security Networks AG Copyright 2010 by secunet Security Networks AG This document is for information

More information

L-1 Fingerprint Reader Solutions. V-Flex 4G

L-1 Fingerprint Reader Solutions. V-Flex 4G L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in

More information

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs 1 GOVERNMENTS ADOPTING DIGITAL STRATEGIES Governments designing/operating digital ecosystems to create, transform and optimize

More information

The Rise of Mobile Access to Your ERP Data. An Epicor White Paper

The Rise of Mobile Access to Your ERP Data. An Epicor White Paper The Rise of Mobile Access to Your ERP Data An Epicor White Paper Abstract Mobile user access to ERP and other back office systems has become a core requirement as organizations seek operational efficiency

More information

ONE PLATFORM FOR ALL YOUR PRINT, SCAN, AND DEVICE MANAGEMENT

ONE PLATFORM FOR ALL YOUR PRINT, SCAN, AND DEVICE MANAGEMENT ONE PLATFORM FOR ALL YOUR PRINT, SCAN, AND DEVICE MANAGEMENT MANAGE ALL PRINTING & SCANNING WITH ONE SINGLE PLATFORM Incorporating uniflow into your document processes will lead to real improvements in

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

Cisco Enterprise Mobility Services Platform

Cisco Enterprise Mobility Services Platform Data Sheet Cisco Enterprise Mobility Services Platform Reduce development time and simplify deployment of context-aware mobile experiences. Product Overview The Cisco Enterprise Mobility Services Platform

More information

Executive Summary P 1. ActivIdentity

Executive Summary P 1. ActivIdentity WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they

More information

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies Complete solutions for commercial security Verex delivers leading intrusion, access and video products to protect today s companies Scalable, cost-effective security designed for today s businesses Designed

More information

How To Make A Card Reader Secure And Reliable

How To Make A Card Reader Secure And Reliable Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Keywords: fingerprints, attendance, enrollment, authentication, identification

Keywords: fingerprints, attendance, enrollment, authentication, identification Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

The Leading Provider of Identity Solutions and Services in the U.S.

The Leading Provider of Identity Solutions and Services in the U.S. THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that

More information

We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in

We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in the market at competitive prices. - Profile - Digital

More information

Important Bluetooth. and Software Considerations for Wireless Barcode Scanner Deployments

Important Bluetooth. and Software Considerations for Wireless Barcode Scanner Deployments Important Bluetooth and Software Considerations for Wireless Barcode Scanner Deployments By LEN OTT, Chief Technical Officer, Socket Mobile, Inc. February 2011 Before deploying a Bluetooth barcode scanner,

More information

Enabling Supply Chain Visibility Through Mobile Computing

Enabling Supply Chain Visibility Through Mobile Computing Driver Communications Fleet Management Warehouse Operations Cross Dock Operations Yard Management Fleet Maintenance Time and Attendance Enabling Supply Chain Visibility Through Mobile Computing Helping

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion

More information

innovative solutions for your applications

innovative solutions for your applications innovative solutions for your applications Being the Very Best! Pertech Industries vision is to be the recognized world leader in providing top-end image acquisition solutions and the reliable source of

More information

One platform for all your print, scan and device management

One platform for all your print, scan and device management One platform for all your print, scan and device management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in

More information

Modular Components. Superior Technology. Flexible Software

Modular Components. Superior Technology. Flexible Software Modular Components Superior Technology Flexible Software SINGLE-SPOT GUIDANCE SYSTEM LICENSE PLATE RECOGNITION SMARTPARK SOFTWARE SMART RENTAL SOFTWARE EXIT VERIFIER PAY-ON-FOOT TICKET DISPENSER CASHIER

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

BlackBerry Enterprise Solution and RSA SecurID

BlackBerry Enterprise Solution and RSA SecurID Technology Overview BlackBerry Enterprise Solution and RSA SecurID Leveraging Two-Factor Authentication to Provide Secure Access to Corporate Resources Table of Contents Executive Summary 3 Empowering

More information

New Security Features

New Security Features New Security Features BlackBerry 10 OS Version 10.3.1 Published: 2014-12-17 SWD-20141211141004210 Contents About this guide... 4 Advanced data at rest protection... 5 System requirements... 6 Managing

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification.

FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification. Discover a new conception for customer verification and electronic contract management Your benefit is our task. FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and

More information

Wayne EMV Solutions. Protect your business with a complete EMV Solution inside and out.

Wayne EMV Solutions. Protect your business with a complete EMV Solution inside and out. Wayne EMV Solutions Protect your business with a complete EMV Solution inside and out. The transition to Europay, MasterCard, Visa (EMV) standards: Significantly reduce your risk of payment card fraud

More information

Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify

More information

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE. About Identiv Identiv is a global security technology company that establishes trust in the connected world, including premises, information, and everyday items. Global organizations in the government,

More information

Coesys Border Management

Coesys Border Management Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,

More information

Coesys Border Management

Coesys Border Management Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,

More information

solutions Biometrics integration

solutions Biometrics integration Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability

More information

Access Control System Access Control System is designed for the places where need for crucial security.

Access Control System Access Control System is designed for the places where need for crucial security. rt RichtonTec as a company based on biometric and RFID technology has been supplying access control solution and time and attendance terminals for over 6 years. Over this time we developed our own unique

More information

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric

More information

Gallagher Command Centre

Gallagher Command Centre DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software

More information

ACER ProShield. Table of Contents

ACER ProShield. Table of Contents ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...

More information

Your Ticket to Automation. Increase productivity and revenue, cut costs and improve officer safety with Intermec e-citation Solutions.

Your Ticket to Automation. Increase productivity and revenue, cut costs and improve officer safety with Intermec e-citation Solutions. Your to Automation Increase productivity and revenue, cut costs and improve officer safety with Intermec e-citation Solutions. Limited resources. Dismissed tickets. Officer safety risks. You re counting

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Collaboration solutions for midsized businesses Buyer s guide

Collaboration solutions for midsized businesses Buyer s guide Collaboration solutions for midsized businesses Buyer s guide Increase productivity by improving collaboration across and beyond your business. Give employees access to the information, people and resources

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments

More information

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks

More information

POS systems rise to new status

POS systems rise to new status December 2006 POS systems rise to new status To optimize inventory, ordering and pricing, new point-of-sale (POS) systems are collecting more detailed sales and customer data at the point of purchase.

More information

OmniLink i-series Smart Solutions for Retail

OmniLink i-series Smart Solutions for Retail Mobile. Smart. Connected. OmniLink i-series Smart Solutions for Retail pos.epson.com/omnilink Join the retail revolution with Epson. OmniLink i-series Smart Solutions for Retail pos.epson.com/omnilink

More information

How To Use Uniflow

How To Use Uniflow One platform for all your print, scan and device management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in

More information

Kaba EACM The SAP module for efficient access organisation

Kaba EACM The SAP module for efficient access organisation The SAP module for efficient access organisation THINK 360 Secure Holistic Simple THINK 360 Security can be this simple Lean and efficient organisation processes are more important today than ever. Yet

More information

Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance

Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance María del Carmen Prudente-Tixteco [email protected] Linda Karina Toscano-Medina [email protected] Gualberto

More information

Dell Wyse Cloud Connect

Dell Wyse Cloud Connect Dell Wyse Cloud Connect Secure productivity from work, home, and on the go. The ultra-compact personal cloud device that can make any HDMI/MHL-equipped display your own. For personal access to all of your

More information

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria

More information

INTEGRATED SOFTWARE SOLUTIONS

INTEGRATED SOFTWARE SOLUTIONS INTEGRATED SOFTWARE SOLUTIONS 1.0 INTEGRATED SOFTWARE SOLUTIONS > B.A.S.I.S. ET650 from Stanley Security Solutions combines flexibility with enormous capabilities. Using a single database server and a

More information

Innovation with a difference

Innovation with a difference Innovation with a difference The Smallest, Super Stylish User Engagement Tool Available Today Just 38cm high Perfect for Desk Top Use In Store Shelf Edge Use Mini Kiosk And so much more Not much bigger

More information

Advanced Biometric and RFID Solutions for Access Control

Advanced Biometric and RFID Solutions for Access Control Advanced Biometric and RFID Solutions for Access Control Out of seven billion people on earth, no two fingerprints or faces are the same. ZK Technology is a leading global developer of security and time

More information

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies

More information

New Security Features

New Security Features New Security Features BlackBerry 10 OS Version 10.3.2 Published: 2015-06-08 SWD-20150608104314635 Contents About this guide... 4 What's new... 4 NFC smart card support... 5 OCSP stapling support in the

More information

Development of Attendance Management System using Biometrics.

Development of Attendance Management System using Biometrics. Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.

More information

How To Be Successful In A Competitive Market

How To Be Successful In A Competitive Market 2015 2015 Global Fingerprint Biometrics for Mobile Devices Customer Value Leadership Award Frost & Sullivan 1 We Accelerate Growth Contents Background and Company Performance... 2 Industry Challenges...

More information

Skynax. Mobility Management System. System Manual

Skynax. Mobility Management System. System Manual Skynax Mobility Management System System Manual Intermec by Honeywell 6001 36th Ave. W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

Electronic Signature Capture with Authentication

Electronic Signature Capture with Authentication Electronic Signature Capture with Authentication The E-Signature Solution Trusted by the World's Leading Banks, Telecom Operators, Insurance Agencies and Many More Using FSN s solutions to fill out electronic

More information