tag:blogger.com,1999:blog-52104169225256254112024-03-05T22:09:39.757-08:00Biometric DevicesBiometric Identification Systems and Security DevicesUnknownnoreply@blogger.comBlogger19125tag:blogger.com,1999:blog-5210416922525625411.post-91425926500893908332009-01-02T11:46:00.000-08:002011-01-29T05:06:24.537-08:00Ringdale Terminal with Fingerprint ReaderThe Ringdale Time and Attendance Display Terminal contains a built-in optical fingerprint reader and numeric keypad that can be used singularly or together for multi-factor authentication. The 3.5 inch screen displays the correct system time and employee name when used for clocking in or out.<br /><br />The clean design and stylish enclosure make the Time & Attendance Terminal suitable for any business decor. Its anodized aluminum, water resistant finish makes it durable for high usage and environment hardened locations.<br /><a name='more'></a><br />The Terminal's graphics display has a white backlighting that allows the device to be used in any language and in multilingual environments.<br /><br />When an employee walks up to the Terminal and uses the identification (ID) readers, the Terminal signals the Sentinel Server Software to authenticate the employee. If the employee is successfully authenticated, he or she then touches the IN or OUT function button on the Terminal to complete the transaction. There is also a CANCEL button to stop the transaction before it is completed.<br /><br />As with all of Ringdale’s Sentinel Access Control solutions, the Time & Attendance Terminal uses Power over Ethernet (PoE) to allow easy deployment. Deployment in multi-drop applications is easily achieved by using a dedicated or existing Ethernet network.<br /><br />Ringdale specializes in Power over Ethernet (unused pair method), because it allows even easier deployment as there is only the CAT 5, CAT 5e or CAT 6 cable (with all 4 pairs connected) required.<br /><br />The Time and Attendance Terminal also has a USB Port for an optional ID reader or relay, such as:<br /><ul><li>Ringdale Serial RS232 Interface to HID USB Converter - for barcode, MIFARE and other readers that provide numeric or ASCII data on an RS232 interface<br /></li><li>Ringdale Wiegand to HID USB Converter - for all Wiegand data output compatible reader devices<br /></li><li>Ringdale HID USB Swipe Card Reader<br /></li><li>Ringdale USB SPS Relay - for opening a door or allowing access through a turnstile<br /></li></ul>The Ringdale Time & Attendance Terminal can be used with existing and future Sentinel Authentication Software.<br /><br /><strong>Features</strong>:<br /><ul><li>3.5 inch diagonal, high contrast 8-line display screen with white backlighting<br /></li><li>USB port for optional ID reader or relay<br /></li><li>Built-in optical fingerprint reader<br /></li><li>Built-in keypad for alternative or multi-factor authentication<br /></li><li>10/100Base-T Ethernet connection<br /></li><li>Compatible with Ringdale USB - Wiegand, USB - Serial RS232, and USB - USB HID converters<br /></li><li>Power Input from 8 to 54 Volts - 7 watts via terminals or Power over Ethernet (PoE) - Ringdale's unused pair standard<br /></li><li>Environment hardened and water resistant finish and function buttons using Ringdale Touch technology<br /></li></ul><strong>Specifications</strong>:<br /><ul><li><strong>Input Voltage</strong><br /></li><li>8 to 54 Volts DC, 7 Watts<br /></li><li><strong>Dimensions</strong><br /></li><li>Wall Mount HxWxD - 7.5in x 6in x 1.7in<br /></li><li><strong>Display</strong><br /></li><li>64 x 64 dot graphics display (8 lines)<br /></li><li><strong>Backlight</strong><br /></li><li>White<br /></li><li><strong>Keypad</strong><br /></li><li>10 keys of 0..9, *and # as well as three Function Buttons using Ringdale Touch technology<br /></li><li><strong>Fingerprint Reader</strong><br /></li><li>Optical 500 dpi<br /></li><li><strong>Option Ports</strong><br /></li><li>2 x USB 1.2 (5V DC - 400mA max)</li></ul><br />Product by Ringdale<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/biometric-face-logon-system.html"><strong>Biometric Face Logon System</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/guardianxl-fingerprint-biometric-door.html"><strong>GuardianXL Fingerprint Biometric Door Lock</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/signdoc-biometric-handwritten-signature.html"><strong>SignDoc Biometric Handwritten Signature</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/palmsecure-palm-vein-authentication.html"><strong>PalmSecure Palm Vein Authentication System</strong></a>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-5210416922525625411.post-75250228780567430592008-12-21T23:58:00.000-08:002011-01-29T05:06:05.152-08:00Motorola Mobile AFIS Fingerprint IdentificationThe Motorola Mobile AFIS (Automated Fingerprint Identification System) on the MC70/75 with biometric attachment enables the capture of fingerprints (up to ten fingers) and facial images (MC75 only) with uncompromising speed and accuracy. The GSA FIPS 201 certified fingerprint sensor enables the capture of high quality images in most environmental conditions. The advanced Mobile AFIS quality analysis tools further ensure the capture of images that increase matching accuracy. Intuitive software enables easy auto capture and auto submission of fingerprint data enabling officers to focus on the individual and the situation at hand. The MC75’s 2MP auto-focus color camera with illumination and user-controlled flash facilitates the capture of facial images in almost any environmental condition.<br /><a name='more'></a><br />With optional ISO compliant contact and contactless card readers, the motorola mobile AFIS is ideal for identity verification against secure credentials such as ePassports/visa, TWIC documents, PIV ID cards, and smart-card enabled employee ID badges.<br /><br />This robust Mobile AFIS solution on the MC70 and MC75 rugged enterprise digital assistants (EDA’s) utilizes advanced wireless networks such as HSPDA (3G) and CDMA/EVDO Rev.A. This, in combination with Mobile AFIS support for NIST compliant packages, delivers rapid transmission of fingerprint images or templates, and facial images resulting in immediate identity verification in field operations.<br /><br />Beyond advanced biometric identification and verification, the Motorola Mobile AFIS on the MC70/75 delivers return on investment second to none. The MC70/75 EDA’s robust capabilities and cost-effective anytime, anywhere data connectivity makes this the ideal platform to launch additional applications such as eCitation, asset management, GPS location, and advance streaming video software packages. In addition to phone and data capabilities, the solution (including biometric attachment) are built rugged receiving an IP54 rating for sealing, tested for 5ft drop to concrete, and providing full operation in extreme weather conditions.<br /><br />The Motorola Mobile AFIS on the MC70/75 with biometric attachment is ideal in applications such as:<br /><ul><li>Local law enforcement<br /></li><li>Border crossings<br /></li><li>Remote field operations<br /></li><li>Refugee management<br /></li><li>US VISIT Entry/Exit<br /></li><li>Sporting events<br /></li><li>Commercial security applications<br /></li><li>TWIC<br /></li><li>PIV/CAC<br /></li><li>Traffic stops<br /></li><li>Jail Movement<br /></li><li>Court Identification<br /></li><li>Voting<br /></li><li>Social Services<br /></li><li>Healthcare<br /></li><li>Case Management<br /></li></ul><br />Product by Motorola<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/finger-payment-fingerprint-biometrics.html"><strong>Dermalog Finger Payment - Fingerprint Biometrics</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/signature-verification-system.html"><strong>Signature Verification System</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/futronic-fs80-usb-fingerprint-scanner.html"><strong>Futronic FS80 USB Fingerprint Scanner</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/glossary-security-biometric-terms.html"><strong>Glossary of Security and Biometric System Terms</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-45177594804862981392008-12-15T09:06:00.000-08:002011-01-29T05:05:24.055-08:00Panasonic BM-ET330 Iris RecognitionIris recognition uses individual differences in the complex patterns found in the iris of the human eye to authenticate individual identities. Iris recognition is the most precise of all biometric identification systems. The false acceptance ratio is so low that the probability of falsely identifying one individual as another is virtually zero.<br /><a name='more'></a><br />High Precision, Quick Recognition, Up to 5,000 Users, Flexible interface.<br /><ul><li>Built-in (COTS) off the Shelf Support for 13.56 MHz HID iClass(tm) Readers<br /></li><li>High Speed Processor - Recognition in 0.8 seconds<br /></li><li>1,000 Local User Cache, 5,025 User Base Server Capacity<br /></li><li>Wiegand Input and Output - supports 125 KHz Proximity Cards<br /></li><li>Encrypted TCP/IP Interface<br /></li><li>SDK Availability for Custom Integration<br /></li><li>Enhanced RS-485 Interface<br /></li><li>Integrated Analog CCTV Camera - Connect to DVR<br /></li><li>Additional Language Support - Custom Audio prompts<br /></li><li>Built-in Real-time Clock for Time & Attendance Applications<br /></li><li>Supported by a Global Network of Access Control Manufacturers & Solution Providers<br /></li><li>Tamper Proof Design<br /></li></ul>When both eyes are reflected in the mirror, the system automatically captures the iris images and completes recognition in one second or less. The quick identification process prevents waiting in line.<br /><br />Product by Panasonic<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/fusion-biometric-handheld-device.html"><strong>Fusion Biometric Handheld Device</strong></a><br /><a href="http://biometric-devices.blogspot.com/2009/01/ringdale-terminal-fingerprint-reader.html"><strong>Ringdale Terminal with Fingerprint Reader</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/motorola-fingerprint-identification.html"><strong>Motorola Mobile AFIS Fingerprint Identification</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/signature-verification-system.html"><strong>Signature Verification System</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-46038575870827197982008-12-03T13:23:00.000-08:002011-01-29T05:04:57.294-08:00Fujitsu MBF200 Fingerprint SensorThe Fujitsu MBF200 is a 500-dpi, 8-bit grayscale solid-state fingerprint sensor that reliably captures fingerprint information. The MBF200 is designed to integrate into devices for improved security and convenience. Applications for the MBF200 include: computer and network logon, physical access control, Point-of-Sale terminals, transportation security, medical information protection, card-holder ID validation and many other uses. The Fujitsu MBF200 provides a reliable, quick and user-friendly alternative to passwords, PIN's and other forms of user authentication.<br /><a name='more'></a><br /><strong>Features</strong><br /><br />• Rugged, solid-state capacitive fingerprint sensor<br />• High resolution 500-dpi, 8-bit grayscale imager<br />• Large image area:<br />– 12.8mm x 15.0mm (0.5" x 0.6")<br />– 256 x 300 pixel array (50µM pitch)<br />• Programmable gain adapts to wet/dry fingers<br />• Small size: 24mm x 24mm x 1.4mm<br />• Multiple interfaces: USB1.1, 8-bit MCU, SPI<br />• Lead-free and RoHS compliant<br />• Durable:<br />– ESD to 8kV (FCC-B/CE certified)<br />– Silicon operating temperature: -20°C to +85°C<br />– Hard protective coating<br />• 8-bit analog-digital converter<br />• Auto finger-detection for low power sleep mode<br />• Low Power:<br />– 3.3V<br />– 20mA active, less than 200µA sleep, 20µA standby<br /><br /><strong>Description</strong><br /><br />The Fujitsu MBF200 solid-state fingerprint sensor is a rugged, thin, low power, cost effective direct-contact fingerprint image capture device. The MBF200 fingerprint sensor scans the finger at 500 dots-per-inch (dpi) and 8-bit grayscale for high-resolution fingerprint images that meet AFIS image quality standards. The MBF200 is manufactured in standard CMOS technology and integrates an 8-bit analog-to-digital converter to digitize the information from the sensor array. The MBF200 sensing area is 0.5" x 0.6" (12.8mm x 15.0mm) and passes FCC-B (8kV) and CE ESD and EMI requirements.<br /><br />The Fujitsu MBF200 is a capacitive sensing device that automatically adjusts the MBF200 sensor to its optimal settings, enabling industry-leading image capture reliability for a wide range of wet, dry and damaged fingers. A hard passivation layer on the surface of the MBF200 provides excellent abrasion resistance. When a person presses their finger on the sensor, the varying capacitive values across the array are converted into an image of the MBF200 Solid-State Fingerprint Sensor fingerprint. In less than one second, the sensor can capture a fingerprint image, adapt to various finger types, process the image and authenticate a user’s identity.<br /><br />Each MBF200 fingerprint sensor supports three standard bus interfaces:<br /><br />1. USB 1.1 for integration into computer applications.<br />2. 8-bit parallel MCU interface<br />3. SPI interface, a serial interface with four wires.<br /><br />The MBF200 has an Automatic Finger Detection (AFD) circuit that allows the sensor to enter a low power ‘sleep’mode and generate an interrupt when a finger is detected. In AFD mode the MBF200 draws less than 200µA of current. Normal image acquisition of the sensor operates at 3.3V and requires typically 20mA of current during active image capture. Silicon operating temperature is -20°C to +85°C, and storage temperature is -65°C to +150°C.<br /><br />The Fujitsu MBF200 fingerprint sensor can be programmed using the DKF200 software development kit that includes the driver software and a minutia-based matching algorithm.<br /><br />The Fujitsu MBF200 Solid-State Biometric Fingerprint Sensor is a robust, cost effective fingerprint image capture device with 500-dpi image resolution, low power, small size and high durability, making it an excellent choice for a wide variety of user authentication applications.<br /><br /><strong>Applications</strong><br /><br />• Computer peripherals – improves security and convenience<br />• Transportation systems – validation of operators, drivers and inspectors<br />• Medical equipment – authorization of operator or technician<br />• Physical access systems – approval for entry<br />• Kiosks and vending machines – confirmation of person receiving the selection<br />• Point of sale terminals – authentication of tellers and cashiers<br /><br />Product by FUJITSU<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/glossary-security-biometric-terms.html"><strong>Glossary of Security and Biometric System Terms</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/motorola-livescan-station-4000-portable.html"><strong>Motorola LiveScan Station 4000 Portable</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/panasonic-bm-et200-iris-reader.html"><strong>Panasonic BM-ET200 Iris Reader</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/gka-90-fingerprint-access-control.html"><strong>GKA-90 Fingerprint Access Control</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-426462314099090292008-11-24T05:37:00.000-08:002011-01-29T05:04:15.231-08:00Dermalog Finger Payment - Fingerprint BiometricsThis secure and trendsetting process is not only extremely practical for buyers – once they are registered, they no longer need a change purse for a spontaneous purchase – this form of payment is also efficient for the seller, as it makes card swiping or changing money superfluous.<br /><br />The payment process on average takes only two seconds instead of fifty. That reduces the checkout lines enormously and saves personnel costs.<br /><a name='more'></a><br />As the fingerprint is not saved as an image, but rather only reference samples are saved from the biometric customer data and these are also encoded, the potential worries of privacy advocates are unfounded.<br /><br />No other institution can access the saved data and carry out comparisons. Even the slightly higher acquisition costs of the high-tech point-of-sale terminals in comparison to conventional systems will already be paid off within six months on average. That is principally due to the fact that the registered customers generate virtually no debit costs, which in turn reduces the insurance sums for the debit costs. At the same time, the system increases customer retention and provides a marketing benefit right from the beginning – as something new always generates curiosity.<br /><br />Product by Dermalog Identification Systems<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/biometric-face-logon-system.html"><strong>Biometric Face Logon System</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/guardianxl-fingerprint-biometric-door.html"><strong>GuardianXL Fingerprint Biometric Door Lock</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/signdoc-biometric-handwritten-signature.html"><strong>SignDoc Biometric Handwritten Signature</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/palmsecure-palm-vein-authentication.html"><strong>PalmSecure Palm Vein Authentication System</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-53346266717494076432008-11-15T10:44:00.000-08:002011-01-29T05:03:54.065-08:00Signature Verification SystemSVS - Signature Verification System is a solution for signing and sealing electronic documents in a tamperproof and legally binding manner using the biometric characteristics of a person's signature.<br /><br />After defining a signing area within an electronic document using SVS, an authorizing person may sign the document in exactly the same manner that they would sign a piece of paper.<br /><a name='more'></a><br />This kind of biometric signature is captured using one of many supported signature capturing devices such as a pen pad, a writing tablet or a Tablet PC.<br /><br />The authenticity of the signature can be verified at any point in time either manually, or using SVS’s unique automatic combo-verification to provide a high level of trustworthiness. The integrity of the signature and the document is secured using state-of-the art technologies.<br /><br /><span style="font-weight:bold;">Benefits</span>:<br /><br />• Complete elimination of paper.<br /><br />• Cost effective: Eliminates costs of scanning and archiving.<br /><br />• Protection against forgery: Electronic Signature contains biometric footprints, unique to every individual and cannot be reproduced.<br /><br />• Supports Popular Formats such as Microsoft Word, PDF and Adobe LiveCycle applications.<br /><br />• More secure than wet ink signature or static signature.<br /><br />• Adaptable to existing processes.<br /><br />• Seamless Integration in e-Workflow.<br /><br /><br /><span style="font-weight:bold;">Applications</span>:<br /><br />• Finance: At account opening, standing orders, exemption orders for capital gains, loans, any other contract processes.<br /><br />• Telecommunication: Phone contracts, subscriptions.<br /><br />• Industry: Audit trails, production process and servicing journals, test reports, receipts.<br /><br />• Retail: Payment processes, receipts at the point of sale, or point of delivery.<br /><br />• Real Estate: Contracts, audit trails, journals.<br /><br />• Health Sector: Electronic Medical Record, patient consent forms, lab reports, discharge letters, prescriptions.<br /><br />• Education: Various forms of documentation, papers exchanged in a correspondence course, orders (e.g. interlending).<br /><br />Product by Bayometric<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/10/glossary-security-biometric-terms.html"><strong>Glossary of Security and Biometric System Terms</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/finger-payment-fingerprint-biometrics.html"><strong>Dermalog Finger Payment - Fingerprint Biometrics</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/futronic-fs80-usb-fingerprint-scanner.html"><strong>Futronic FS80 USB Fingerprint Scanner</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/motorola-fingerprint-identification.html"><strong>Motorola Mobile AFIS Fingerprint Identification</strong></a>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-5210416922525625411.post-89731576621858554592008-11-05T07:17:00.000-08:002011-01-29T05:02:07.828-08:00Futronic FS80 USB Fingerprint ScannerFS80 USB 2.0 Fingerprint Scanner uses advanced CMOS sensor technology and precise optical system to deliver high quality fingerprint image. It can capture an almost un-distorted raw fingerprint image into PC in 100ms and is good for any fingerprint recognition application.<br /><br />The finger scanning window is a crown glass with a thickness of 14 millimeters. It is much more reliable and robust compared to any semiconductor type fingerprint sensor.<br /><a name='more'></a><br />The finger is illuminated by 4 infra-red LEDs during scanning and the light intensity is automatically adjusted according to scanning fingerprint's characteristics (wet, dry, blurred, etc) to optimize the quality of the captured fingerprint image.<br /><br />Special electronic circuit is built into FS80 to do Live Finger Detection (LFD). With appropriate software in PC, user can select this LFD feature so that only live finger's fingerprint will be scanned into PC. Fake fingers made from silicone rubber, play-doh, etc, will be rejected. And the LFD feature is included in all Futronic's standard software.<br /><br />Futronic provides USB drivers and API for FS80 to capture a raw fingerprint image on the following platforms:<br /><ul><li>Windows 2000/XP<br /></li><li>Vista 32bit and 64 bit<br /></li><li>Linux with kernel 2.4 or after (for both x86 and ARM9)<br /></li><li>Windows CE 5.0 and 6.0 (for both x86 and ARM9)<br /></li></ul>Specification<br /><ul><li>Fingerprint scanning window size is 16x24mm<br /></li><li>Image resolution is 480x320 pixel, 500 DPI<br /></li><li>Raw fingerprint image file size is 150K byte<br /></li><li>With Live Finger Detection (LFD) feature<br /></li><li>USB 2.0 compatible interface, plug and play device<br /></li><li>WHQL approved for Vista 32bit and 64bit<br /></li><li>With a 2M standard USB cable<br /></li><li>Small size, 45 x 63 x 26 mm<br /></li><li>Light weight, 120 gram<br /></li><li>Operation temperature: -10 to +55 Degree Celsius<br /></li></ul>Electrical characteristics<br /><ul><li>Light source: Infrared LED<br /></li><li>Supply voltage: DC 4.5-5.5V via USB port<br /></li><li>Power consumption:<br /></li><li>active less than 500mW (during scanning)<br /></li><li>standby less than 200mW (when scanner is connected PC but no scanning)<br /></li><li>sleep mode less than 5mW (activated by standard USB bus event only)<br /></li><li>ESD contact - 8KV and air discharge - 16KV, no permanent damage<br /></li></ul><br />Product by Futronic<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2009/01/ringdale-terminal-fingerprint-reader.html"><strong>Ringdale Terminal with Fingerprint Reader</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/motorola-fingerprint-identification.html"><strong>Motorola Mobile AFIS Fingerprint Identification</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/panasonic-bm-et330-iris-recognition.html"><strong>Panasonic BM-ET330 Iris Recognition</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/fujitsu-mbf200-fingerprint-sensor.html"><strong>Fujitsu MBF200 Fingerprint Sensor</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-30703336235352955332008-10-29T20:31:00.000-07:002011-01-29T05:01:53.712-08:00Glossary of Security and Biometric System Terms<strong>Access Control</strong><br />Access control is a function of security management that ensures only authorized users have access to resources they are entitled to.<br /><br /><strong>Advanced Encryption Standard (AES)</strong><br />Also known as Rijndael, is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively, as was the case with its predecessor, the Data Encryption Standard (DES). AES was adopted by National Institute of Standards and Technology (NIST) as US FIPS PUB 197 in November 2001 after a 5-year standardization process. The National Security Agency (NSA) reviewed all the AES finalists, including Rijndael, and stated that all of them were secure enough for US Government non-classified data. In June 2003, the US Government announced that AES may be used for classified information.<br /><a name='more'></a><br /><strong>AFIS</strong><br />Automated Fingerprint Identification System - A highly specialized biometric system that compares a single finger image with a database of finger images. AFIS is predominantly used for law enforcement, but is also being put to use in civil applications. For law enforcement, finger images are collected from crime scenes, known as latents, or are taken from criminal suspects when they are arrested. In civilian applications, finger images may be captured by placing a finger on a scanner or by electronically scanning inked impressions on paper.<br /><br /><strong>Algorithm</strong><br />A limited set of well-defined instructions to solve a task, which leads reliably from a given starting point to a corresponding identifiable end point. It can also be described as a systematic procedure for carrying out a calculation or solving a problem in a limited number of stages. Many algorithms can be implemented as computer programs. In biometric systems, specific algorithms are used, for example, to indicate how a smart card determines whether the input fingerprint matches the template stored on the card or in the database.<br /><br /><strong>ANSI 378</strong><br />Refers to interoperability standard for fingerprint templates developed by the American National Standards Institute (ANSI). The US governmental requires the use of ANSI 378 templates for Homeland Security Directive (HSPD-12) and Personal Identity Verification (PIV). The US Federal requirements for ANSI 378 are designed to ensure that all employees and contractors are able to use their badges for identification and access to all government facilities.<br /><br /><strong>API</strong><br />Application Program Interface - A set of services or instructions used to standardize an application. An API is computer code used by an application developer. Any biometric system that is compatible with the API can be added or interchanged by the application developer. APIs are often described by the degree to which they are high level or low level. High level means that the interface is close to the application and low level means that the interface is close to the device.<br /><br /><strong>ASIC</strong><br />Application Specific Integrated Circuit - An integrated circuit (silicon chip) that is specially produced for a biometric system to improve performance.<br /><br /><strong>Asymmetric Encryption System</strong><br />The asymmetric system uses a two-part key, such as RSA and El Gamal. Each recipient has a private key that is kept secret and a public key that is published for everyone.<br />The sender looks up or is sent the recipient's public key and uses it to encrypt the message. The recipient uses the private key to decrypt the message and never publishes or transmits the private key to anyone. Thus, the private key is never in transit and remains invulnerable. This system is sometimes referred to as using public<br />keys.<br /><br /><strong>Authentication</strong><br />The process of validating that a user, computer, service or process is who or what it claims to be. The presentation of a username and password is the most common means of authentication used today.<br />Any systematic method of confirming the identity of an individual. Some methods are more secure than others. Simple authentication methods include user name and password, while more secure methods include token-based one-time passwords. The most secure authentication methods include layered or "multi-factor biometric procedures. This is independent of authorization.<br /><ul><li><strong>1-Factor Authentication</strong><br /></li></ul>The classic fingerprint-without-card technology is simple and in many cases what serves our customers’ basic needs best. The fingerprint reader solution replaces codes or passwords.<br /><ul><li><strong>2-Factor Authentication</strong><br /></li></ul>Precise Biometrics also offers products with 2-factor authentication, combining smart card and fingerprint. With this solution the fingerprint is stored on the smart card. Using templates on a card offers vast scalability, higher security and fast matching times. Using the correct access keys can only access the fingerprint data.<br /><ul><li><strong>3-Factor Authentication</strong><br /></li></ul>A product with 3-factor authentication, combines smart card, fingerprint and PIN code.<br /><ul><li><strong>Multi-Factor Authentication</strong><br /></li></ul>More than one method<br /><br /><strong>Authorization</strong><br />The administration of person-specific rights, privileges, or access to data or corporate resources.<br /><br /><strong>Automatic ID / Auto ID</strong><br />An umbrella term for any biometric system or other security technology that uses automatic means to check identity. This applies to both one-to-one verification and one-to-many identification.<br /><br /><strong>Behavioral Biometric</strong><br />A biometric which is characterized by a behavioral trait that is learned and acquired over time rather than a physiological characteristic.<br /><br /><strong>Bifurcation</strong><br />A branch made by more than one finger image ridge.<br /><br /><strong>Benchmarking</strong><br />The process of comparing measured performance against a standard, openly available, reference.<br /><br /><strong>Biometrics</strong><br />The automatic recognition of persons based on unique combinations of measurable physical or behavioral characteristics. Examples include fingerprints, iris scanning, face and voice recognition, or hand geometry. All of these biometric techniques are differentiated by speed, durability, reliability, and cost effectiveness. Fingerprints are generally considered the most practical biometric identifier in use today.<br /><br /><strong>Biometric Authentication Mode</strong><br />The way biometric data (e.g. fingerprints) is used for authentication. The mode chosen for a biometric installation depends on the specific needs of a site, where either convenience or security may be emphasized. BioCert fingerprint devices may use either of two biometric authentication modes, identification or verification.<br /><br /><strong>Biometric Data</strong><br />The extracted information taken from the biometric sample and used either to build a reference template or to compare against a previously created reference template.<br /><br /><strong>Biometric Engine</strong><br />The software element of the biometric system which processes biometric data during the stages of enrolment and capture, extraction, comparison and matching.<br /><br /><strong>Biometric Information</strong><br />The stored electronic information pertaining to a biometric. This information can be in terms of raw or compressed pixels or in terms of some characteristic (e.g. patterns).<br /><br /><strong>Biometric Sample</strong><br />Raw data representing a biometric characteristic of an end-user as captured by a biometric system (for example the image of a fingerprint).<br /><br /><strong>Biometric System</strong><br />An automated system capable of a) capturing a biometric sample from an end user; b) extracting biometric data from that sample; c) comparing the biometric data with that contained in one or more reference templates; d) deciding how well they match; and e) indicating whether or not an identification or verification of identity has been achieved.<br /><br /><strong>Biometric Template</strong><br />Biometric templates are representations of a fingerprint or other biometric using series of numbers and letters. Templates are created using sophisticated algorithms, a mathematical process.<br /><br /><strong>Capacitance</strong><br />A finger image capture technique that senses an electrical charge, from the contact of ridges, when a finger is placed on the surface of a sensor.<br /><br /><strong>Capture</strong><br />The method of taking a biometric sample from the end user.<br /><br /><strong>CCD</strong><br />Charge-Coupled Device - A CCD is a semiconductor device that records images electronically.<br /><br /><strong>Certification</strong><br />The process of testing a biometric system to ensure that it meets certain performance criteria. Systems that meet the testing criteria are said to have passed and are certified by the testing organization.<br /><br /><strong>Cipher</strong><br />The core algorithm used to encrypt data. A cipher transforms regular data (plaintext) into a coded set of data (ciphertext) that is not reversible without a key. For example, AES and DES are examples of secret key block ciphers. The complete encryption algorithm is the cipher plus the technique used to apply the cipher to the message, which can be a very intricate series of steps.<br /><br /><strong>Claim of Identity</strong><br />When a biometric sample is submitted to a biometric system to verify a claimed identity.<br /><br /><strong>Claimant</strong><br />A person submitting a biometric sample for verification or identification whilst claiming a legitimate or false identity.<br /><br /><strong>Closed-Set Identification</strong><br />When an unidentified end-user is known to be enrolled in the biometric system.<br /><br /><strong>Comparison</strong><br />The process of comparing a biometric sample with a previously stored reference template or templates.<br /><br /><strong>Contactless Card</strong><br />Smart cards or memory cards which communicate by a radio signal. The range is normally up to 10 cm from the reader.<br /><br /><strong>Crossover Error Rate</strong><br />Synonym for Equal Error Rate.<br /><br /><strong>Cryptography</strong><br />The discipline that embodies the principles, means, and methods for the transformation of data in order to hide their semantic content, prevent their unauthorized use, or prevent their undetected modification.<br /><br /><strong>Database</strong><br />Any storage of biometric templates and related end user information. Even if only one biometric template or record is stored, the database will simply be a database of one. Generally speaking, however, a database will contain a number of biometric records.<br /><br /><strong>D Prime</strong><br />A statistical measure of how well a biometric system can discriminate between different individuals. The larger the D Prime value, the better a biometric system is at discriminating between individuals.<br /><br /><strong>Digital Signature</strong><br />The encryption of a message digest with a private key.<br /><br /><strong>Discriminant Training</strong><br />A means of refining the extraction algorithm so that biometric data from different individuals are as distinct as possible.<br /><br /><strong>DPI</strong><br />Dots Per Inch - A measurement of resolution for finger image biometrics.<br /><br /><strong>Dual Interface Card</strong><br />Dual interface cards have contact and contact less interfaces for data and transmission in both directions.<br /><br /><strong>Encryption</strong><br />Making information unreadable/difficult to read for unauthorized persons.<br />The act of converting biometric data into a code so that people will be unable to read it. A key or a password is used to decrypt (decode) the encrypted biometric data.<br />A method of taking information that is readable and making it unreadable. Encryption uses a set of mathematical rules or algorithms to transform clear text into an unreadable format. Encryption is an effective way of safeguarding important and confidential information.<br /><br /><strong>End User</strong><br />A person who interacts with a biometric system to enrol or have his/her identity checked.<br /><br /><strong>Enrollee</strong><br />A person who has a biometric reference template on file.<br /><br /><strong>Enrollment / Enrolling</strong><br />The process of collecting biometric samples from a person and the subsequent preparation and storage of biometric reference templates representing that person's identity.<br /><br /><strong>Enrollment Time</strong><br />The time period a person must spend to have his/her biometric reference template successfully created.<br /><br /><strong>Equal Error Rate</strong><br />The error rate occurring when the decision threshold of a system is set so that the proportion of false rejections will be approximately equal to the proportion of false acceptances.<br /><br /><strong>Extraction</strong><br />The process of converting a captured biometric sample into biometric data so that it can be compared to a reference template.<br /><br /><strong>Failure to Acquire</strong><br />Failure of a biometric system to capture and extract biometric data (comparison data).<br /><br /><strong>Failure to Acquire Rate</strong><br />The frequency of a failure to acquire.<br /><br /><strong>Failure to Enroll</strong><br />Failure of the biometric system to form a proper enrolment template for an end-user. The failure may be due to failure to capture the biometric sample or failure to extract template data (of sufficient quality).<br /><br /><strong>Failure to Enroll Rate</strong><br />The proportion of the population of end-users failing to complete enrolment<br /><br /><strong>False Acceptance Rate</strong><br />FAR - When a biometric system incorrectly identifies an individual or incorrectly verifies an impostor against a claimed identity. Measures how frequently unauthorized persons are accepted by the system due to erroneous matching. Potentially serious.<br /><br /><strong>False Match Rate</strong><br />Alternative to False Acceptance Rate. Used to avoid confusion in applications that reject the claimant if their biometric data matches that of an enrollee. In such applications, the concepts of acceptance and rejection are reversed, thus reversing the meaning of False Acceptance and False Rejection.<br /><br /><strong>False Non-Match Rate</strong><br />Alternative to False Rejection Rate. Used to avoid confusion in applications that reject the claimant if their biometric data matches that of an enrollee. In such applications, the concepts of acceptance and rejection are reversed, thus reversing the meaning of False Acceptance and false Rejection.<br /><br /><strong>False Rejection Rate</strong><br />FRR - When a biometric system fails to identify an enrollee or fails to verify the legitimate claimed identity of an enrollee. Measures how frequently registered users are rejected by the system. This usually amounts to nothing more than inconvenience, since it requires users to try again.<br /><br /><strong>Filtering</strong><br />The process of classifying biometric data according to information that is unrelated to the biometric data itself. This may involve filtering by age, hair color or other distinguishing factors, and including this information in an end users database record. This term is particularly used in conjunction with Automated Fingerprint Identification Systems.<br /><br /><strong>Finger Geometry</strong><br />A physical biometric that analyses the shape and dimensions of one or more fingers.<br /><br /><strong>Finger Image</strong><br />A physical biometric which looks at the patterns found in the tip of the finger.<br /><br /><strong>Finger Scanning</strong><br />The process of finger image capture.<br /><br /><strong>Fingerprint Template</strong><br />A description of all the detected minutiae in a fingerprint pattern. The template contains each minutia's x/y coordinate, slope, and type, thus summarizing the characteristics of the fingerprint for purposes of matching the fingerprint against candidates.<br /><br /><strong>FIPS 201</strong><br />Federal Information Processing Standards 201 creates the framework from the smart card security for PIV IDs.<br />The US General Services Administration’s (GSA) Approved Products List (APL), is an important requirement in the procurement process for the US Federal Government Homeland Security Presidential Directive 12 (HSPD-12). By fall this year all US Government agencies must initiate the deployment of smart card based ID cards, the so-called PIV (Personal Identity Verification) Cards.<br /><br /><strong>GSA APL</strong><br />In order to eliminate the need for every agency to test and certify products to implement into HSPD-12, The General Services Administration (GSA) was asked to create an Approved Products List (APL). The GSA APL will serve as the buying guide for all of the US Federal Government Agencies. As agencies begin to implement their HSPD-12 and PIV solutions they will use the GSA APL to provide assurance that the products they are purchasing meet guidelines and technical specifications.<br /><br /><strong>Hand Geometry</strong><br />Measurement of the layout of the physical characteristics of the hand.<br /><br /><strong>HSPD-12</strong><br />Abbreviation for US Federal government's Homeland Security Presidential Directive, which is a set of requirements for government agencies to improve their security infrastructure.<br /><br /><strong>Identification</strong><br />Also known as one-to-many or 1:n comparison. Authentication mode that compares the current biometric data set against all other reference data of persons previously recorded in the system. This method does not require any accompanying information to be provided with the fingerprint. It is user-friendly but inherently slower and less secure than the verification mode.<br /><br /><strong>Impostor</strong><br />A person who submits a biometric sample in either an intentional or inadvertent attempt to pass him/herself off as another person who is an enrollee.<br /><br /><strong>Iris Recognition</strong><br />The technique of measuring the veins in the Iris to identify a person. This biometric technology is exceptionally accurate.<br /><br /><strong>ISO</strong><br />International Organization for Standardization.<br /><br /><strong>Latent Fingerprint</strong><br />Latent fingerprints are "left over" fragments usually caused by the build-up of oily residues on the optic sensor window after repeated use.<br /><br /><strong>Matching</strong><br />Biometric data (e.g. fingerprints) are matched to another sample to confirm a person’s identity (authentication).<br /><br /><strong>Matching Method Algorithms for Fingerprint ID Systems</strong>:<br /><ul><li><strong>Minutiae Based Method</strong><br /></li></ul>Minutia based algorithms compare several minutia points (ridge ending, bifurcation, and short ridge) extracted from the original image stored in a template with those extracted from a candidate fingerprint. Similar to the pattern-based algorithm, the minutia-based algorithm must align a fingerprint image before extracting feature points. This alignment must be performed so that there is a frame of reference.<br /><ul><li><strong>Pattern Matching Method</strong><br /></li></ul>Pattern based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. This requires that the images be aligned in the same orientation. To do this, the algorithm finds a central point in the fingerprint image and centers on that. In a pattern-based algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match.<br /><br /><strong>Live Capture</strong><br />The process of capturing a biometric sample by an interaction between an end user and a biometric system.<br /><br /><strong>Live Scan</strong><br />The term live scan is typically used in conjunction with finger image technology. Synonym for Live Capture.<br /><br /><strong>Mifare</strong><br />Mifare is an interface for contact less smart cards and smart card readers. It has been developed by Philips and influencing the ISO14443 Standard.<br /><br /><strong>Minutiae</strong><br />The unique, measurable physical characteristics scanned as input and stored for matching by biometric systems. For fingerprints, minutiae include the starting and ending points of ridges, bifurcations and ridge junctions among other features.<br /><br /><strong>Multiple Biometric</strong><br />A biometric system that includes more than one biometric system or biometric technology.<br /><br /><strong>NIST</strong><br />Abbreviation for the National Institute for Standardization of Technology, which is an agency of the US Federal Government which establishes standards and guidelines for private and public sector purposes.<br /><br /><strong>One-to-a-Few</strong><br />A hybrid of one-to-many identification and one-to-one verification. Typically the one-to-a-few process involves comparing a submitted biometric sample against a small number of biometric reference templates on file.<br /><br /><strong>One-to-Many</strong><br />Synonym for Identification.<br /><br /><strong>One-to-One</strong><br />Synonym for Verification.<br /><br /><strong>Optical</strong><br />A finger image capture technique that uses a light source, a prism and a platen to capture finger images.<br /><br /><strong>Performance Criteria</strong><br />Pre-determined criteria established to evaluate the performance of the biometric system under test.<br /><br /><strong>Physiological Biometric</strong><br />A biometric that is characterized by a physical characteristic rather than a behavioral trait.<br /><br /><strong>PIN</strong><br />Personal Identification Number - A security method whereby a (usually) four digit number is entered by an individual to gain access to a particular system or area.<br /><br /><strong>PIV-card</strong><br />Personal Identity Verification Card required to be issued to all US Federal employees and contractors under HSPD-12.<br /><br /><strong>Precise Match-on-Card</strong><br />The company's technology for storing and matching fingerprints on smart cards. The smart card has built-in software which matches the template saved on the card against the input biometric image. As such, the template never leaves the secure environment of the smart card, protecting both the biometric information and the user's personal privacy.<br /><br /><strong>Recognition</strong><br />A generic term used in the description of biometric systems (e.g. face recognition or iris recognition) relating to their fundamental function. The term recognition does not inherently imply verification, closed-set identification or open-set identification (watchlist).<br /><br /><strong>Record</strong><br />The template and other information about the end-user (e.g. access permissions)<br /><br /><strong>Response Time</strong><br />The time period for a biometric system to return a decision on identification or verification of a biometric sample.<br /><br /><strong>Retina Scanning</strong><br />Scanning the veins at the back of the eye (on the retina) - usually for use in an identification or verification algorithm.<br /><br /><strong>Ridge</strong><br />The raised markings found across the fingertip.<br /><br /><strong>Ridge Ending</strong><br />The point at which a finger image ridge ends.<br /><br /><strong>RF</strong><br />A unique type of finger image capture that uses RF signals to capture the finger image under the outer layer of the skin, to the live layer below.<br /><br /><strong>ROC</strong><br />Receiver Operating Curves - A graph showing how the false rejection rate and false acceptance rate vary according to the threshold.<br /><br /><strong>Score</strong><br />The level of similarity from comparing a biometric sample against a previously stored template.<br /><br /><strong>SHA-1</strong><br />SHA-1, published in 1995, is a hash algorithm designed by the NSA. The size of the output of this algorithm is 160 bits. In 2005, a theoretical method was published to find collisions in SHA-1 with effort smaller than that required for brute force on average.<br /><br /><strong>Smart card</strong><br />A smart card is a plastic card, which holds a processing chip – like those found in computers. The chip on the card is designed to protect the information stored on it using various security mechanisms.<br /><br /><strong>Strong Passwords</strong><br />A strong password is sufficiently long, random, or otherwise producible only by the user who chose it, that successfully guessing it will require too long a time. The length of time deemed to be too long will vary with the attacker, the attacker's resources, the ease with which a password can be tried, and the value of the password to the attacker. A student's password might not be worth more than a few seconds of computer time, whilst a password controlling access to a large bank's electronic money transfer system might be worth many weeks of computer time.<br /><br /><strong>Template</strong><br />The biometric reference pattern of a person stored for matching.<br />Data, which represents the biometric measurement of an enrolee, used by a biometric system for comparison against subsequently submitted biometric samples.<br /><br /><strong>Template Ageing</strong><br />The degree to which biometric data evolves and changes over time, and the process by which templates account for this change.<br /><br /><strong>Template Size</strong><br />The amount of computer memory taken up by the biometric data.<br /><br /><strong>Thermal</strong><br />A finger image capture technique that uses a sensor to sense heat from the finger and thus capture a finger image pattern.<br /><br /><strong>Threshold / Decision Threshold</strong><br />The acceptance or rejection of biometric data is dependent on the match score falling above or below the threshold. The threshold is adjustable so that the biometric system can be more or less strict, depending on the requirements of any given biometric application.<br /><br /><strong>Throughput Rate</strong><br />The number of end users that a biometric system can process within a stated time interval.<br /><br /><strong>Tokens</strong><br />A physical device that an authorized user of computer services is given to aid in authentication. Hardware tokens are often small enough to be carried in a pocket or purse. Some may store cryptographic keys, like a digital signature, or biometric data, like a fingerprint.<br /><br /><strong>Types of Fingerprint Readers</strong>:<br />There are several different types of fingerprint readers that are each designed for a different task with varying functionality and reliability. They are generally divided into two segments - Optical and Capacitance which refers to the technology being used to capture the minutiae or pattern matching data and are either Touch Sensors or Swipe Sensors which refers to the method of obtaining the fingerprint data.<br /><ul><li><strong>Passive capacitance</strong><br /></li></ul>A passive capacitance sensor uses the principle outlined above to form an image of the fingerprint patterns on the dermal layer of skin. Each sensor pixel is used to measure the capacitance at that point of the array. The capacitance varies between the ridges and valleys of the fingerprint due to the fact that the volume between the dermal layer and sensing element in valleys contains an air gap. The dielectric constant of the epidermis and the area of the sensing element are known values. The measured capacitance values are then used to distinguish between fingerprint ridges and valleys.<br /><ul><li><strong>Active capacitance</strong><br /></li></ul>Active capacitance sensors use a charging cycle to apply a voltage to the skin before measurement takes place. The application of voltage charges the effective capacitor. The electric field between the finger and sensor follows the pattern of the ridges in the dermal skin layer. On the discharge cycle, the voltage across the dermal layer and sensing element is compared against a reference voltage in order to calculate the capacitance. The distance values are then calculated mathematically, using the above equations, and used to form an image of the fingerprint. Active capacitance sensors measure the ridge patterns of the dermal layer like the ultrasonic method. Again, this eliminates the need for clean, undamaged epidermal skin and a clean sensing surface.<br /><ul><li><strong>Live layer capacitance scanning</strong><br /></li></ul>This method of scanning sends an RF current through the surface of the skin or Epithelial layers of dead skin cells to the live skin cell layer. As we age, our skin becomes thinner, less resilient and the individually identifiable characteristics of our fingerprints become harder to read. This fact makes elderly individuals more susceptible to False Rejection Rate based upon the sensors inability to get a good quality print. In 1998, AuthenTec developed a unique semiconductor-based fingerprint reader that uses small RF signals to detect the fingerprint ridge and valley pattern. The RF electronic imaging mechanism called (TruePrint technology ) works by reading the fingerprint pattern from the live, highly-conductive layer of skin that lies just beneath the skin's dry outer surface layer. AuthenTec's TruePrint-based sensors are less affected by common skin surface conditions - including dry, worn, calloused, dirty or oily skin - that can impair the ability of other sensors to acquire accurate fingerprint images. That makes TruePrint sensor technology capable of acquiring everyone's fingerprint under virtually any condition.<br /><ul><li><strong>Optical Scanner</strong><br /></li></ul>Optical fingerprint imaging involves capturing a digital image of the print using visible light. This type of sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the finger is placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer which illuminates the surface of the finger. The light reflected from the finger passes through the phosphor layer to an array of solid state pixels (a charge coupled device) which captures a visual image of the fingerprint. A scratched or dirty touch surface can cause a bad image of the fingerprint. A disadvantage of this type of sensor is the fact that the imaging capabilities are affected by the quality of skin on the finger. For instance, a dirty or marked finger is difficult to image properly. Also, it is possible for an individual to erode the outer layer of skin on the fingertips to the point where the fingerprint is no longer visible. However, unlike capacitive sensors, this sensor technology is not susceptible to electrostatic discharge damage.<br /><ul><li><strong>Swipe Sensors</strong><br /></li></ul>This is a sensor whereby the finger is swiped over the sensor in one fluid motion.<br /><ul><li><strong>Touch Sensors</strong><br /></li></ul>This is a sensor whereby the finger is placed on the sensor in a static fashion.<br /><br /><strong>Ultrasound</strong><br />A technique for finger image capture that uses acoustic waves to measure the density of a finger image pattern.<br /><br /><strong>User</strong><br />The client to any biometric vendor. The user must be differentiated from the end user and is responsible for managing and implementing the biometric application rather than actually interacting with the biometric system.<br /><br /><strong>Validation</strong><br />The process of demonstrating that the system under consideration meets in all respects the specification of that system.<br /><br /><strong>Valley</strong><br />The corresponding marks found on either side of a finger image ridge.<br /><br /><strong>Verification / Verify</strong><br />Also known as one-to-one or 1:1 comparison. The verification procedure confirms whether the person in question is actually the person they claim to be. The person’s current biometric data are compared only with their own reference data. This authentication mode requires another unique identifier such as a User ID, PIN, or smart card. Verification is inherently faster and more secure than the identification method.<br /><br /><strong>Vulnerability</strong><br />Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.<br /><br /><strong>Whorl</strong><br />A fingerprint pattern in which the ridges are circular or nearly circular. The pattern will contain two or more deltas.<br /><br /><strong>Wiegand</strong><br />Wiegand is the trade name for a technology used in card readers and sensors, particularly for access control applications. Wiegand devices were originally developed by HID Corporation.<br />A Wiegand card looks like a credit card. It works according to a principle similar to that used in magnetic-stripe cards, such as those used with bank automatic teller machines (ATMs). Instead of a band of ferromagnetic material, the Wiegand card contains a set of embedded wires. The wires are made of a special alloy with magnetic properties that are difficult to duplicate. This makes Wiegand cards virtually counterfeit-proof. The set of wires can contain data such as credit card numbers, bank account numbers, employee identification information, criminal records, and medical history. The card is read by passing it through, or bringing it near, a device called a Wiegand sensor.<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/fusion-biometric-handheld-device.html"><strong>Fusion Biometric Handheld Device</strong></a><br /><a href="http://biometric-devices.blogspot.com/2009/01/ringdale-terminal-fingerprint-reader.html"><strong>Ringdale Terminal with Fingerprint Reader</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/motorola-fingerprint-identification.html"><strong>Motorola Mobile AFIS Fingerprint Identification</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/panasonic-bm-et330-iris-recognition.html"><strong>Panasonic BM-ET330 Iris Recognition</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-88365277517407810172008-10-21T20:49:00.000-07:002011-01-29T05:01:13.275-08:00Biometric Face Logon SystemBiometric Face Logon System is a face recognition system that allows users to login to their account without constantly typing their account information. Authorized user just walks up to the computer and the system unlocks. The system locks automatically when the user steps out of the view.<br /><a name='more'></a><br /><ul><li>Ideal for Shared Workstations<br /></li><li>Network and Application login<br /></li><li>Reduces IT support time<br /></li><li>Cost Effective<br /></li><li>Excellent ROI<br /></li><li>Faster Workflow<br /></li></ul>This system ensures that computer access procedures don't compromise workplace efficiency and is tailored to operate in small and big organizations.<br /><br />Environments:<br /><ul><li>Healthcare<br /></li><li>Finance<br /></li><li>HR<br /></li><li>Manufacturing<br /></li><li>Government<br /></li></ul>Features:<br /><ul><li>Multiple users can maintain their open applications while sharing the same computer without compromising application data<br /></li><li>Prevents "tailgating" on shared computers. Each user always accesses just their login and applications<br /></li><li>Audit trial to review all authorized and unauthorized login attempts<br /></li><li>Records user images for both successful and unsuccessful authentication attempts<br /></li><li>Face Learning Capability: Adapts to physical changes such as beard growth and hair style<br /></li><li>All database information is stored in an encrypted database<br /></li><li>Alarm facility available if the camera is broken or disabled<br /></li><li>Continuous authentication-Looks for the right face every few seconds<br /></li><li>Locks automatically as soon as the user walks away from the computer<br /></li><li>Works with standard web cam<br /></li><li>API available for programmers to make it talk to other programs<br /></li></ul><br />Product by Bayometric Inc.<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/glossary-security-biometric-terms.html"><strong>Glossary of Security and Biometric System Terms</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/motorola-livescan-station-4000-portable.html"><strong>Motorola LiveScan Station 4000 Portable</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/panasonic-bm-et200-iris-reader.html"><strong>Panasonic BM-ET200 Iris Reader</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/gka-90-fingerprint-access-control.html"><strong>GKA-90 Fingerprint Access Control</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-89684094566205701942008-10-01T09:55:00.000-07:002011-01-29T04:59:49.731-08:00GuardianXL Fingerprint Biometric Door LockThe BioCert iQBio GuardianXL Fingerprint Biometric Door Lock runs exclusively on battery power. Powered by 4 AA batteries, it can be operated for up to a year without changing the batteries. Fingerprint enrollment is quick and easy. Up to 30 users can be enrolled and removed from enrollment immediately directly on the BioCert Fingerprint Biometric Door Lock at the door.<br /><a name='more'></a><br />The Guardian XL uses a high-performance algorithm to capture and identify each user and doesn’t actually store your fingerprint, but only a small subset of the representative features of your fingerprint called minutiae in a fingerprint template. This mathematical template cannot be removed from the lock to create a replica of your fingerprint by any method. The Guardian XL door lock has a capacity of 30 (XL30) unique fingerprint templates and can identify a specific person (1:N) in less than 2 seconds.<br /><br />Specifications:<br /><ul><li>Fingerprint Sensor: 500 DPI optical sensor<br /></li><li>Verification Time: 1 sec<br /></li><li>Registration Capacity: XL30 - 30 fingerprints + 30 password numbers<br /></li><li>Verifying time: less than 1.0s<br /></li><li>FRR: less than 0.1%<br /></li><li>FAR: less than 0.0001%<br /></li><li>Password length: 6-14 digits<br /></li><li>Standby current: 15μA (Typical)<br /></li><li>Power supply: 4 AA-size alkaline batteries or 4 AA-size rechargeable batteries (1.2V 1800mA.h)<br /></li><li>Battery Life Span A: At least 1 year (assuming 10 uses of lock per day)<br /></li><li>Emergency Key Over-Ride Function: 8 pin key cylinder<br /></li><li>Dimensions: 192mm X 72mm<br /></li><li>Operating temperature: -10c - 65c<br /></li><li>Operating humidity: 10% - 80%<br /></li></ul><br />Product by iQBio<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/biometric-face-logon-system.html"><strong>Biometric Face Logon System</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/panasonic-bm-et200-iris-reader.html"><strong>Panasonic BM-ET200 Iris Reader</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/signdoc-biometric-handwritten-signature.html"><strong>SignDoc Biometric Handwritten Signature</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/palmsecure-palm-vein-authentication.html"><strong>PalmSecure Palm Vein Authentication System</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-86559158457357963522008-09-30T19:06:00.000-07:002011-01-29T04:59:35.523-08:00SignDoc Biometric Handwritten SignatureSignDoc is a solution for signing and sealing electronic documents in a tamperproof, and legally-binding manner using the biometric characteristics of a person's signature.<br /><a name='more'></a><br /><ul><li>After defining a signing area within an electronic document using SignDoc, an authorizing person may sign the document in exactly the same manner that they would sign a piece of paper.<br /></li><li>This kind of electronic signature - also known as a "dynamic signature" or a "biometric signature" - is captured using one of many supported signature capture devices such as a pen pad, a writing tablet or a Tablet PC.<br /></li><li>The authenticity of the signature can be verified at any point in time either manually, or using SOFTPRO's unique automatic combo-verification to provide a high level of trustworthiness.<br /></li><li>The integrity of the signature and the document is secured using state-of-the art technologies for encryption and and integrity protection.<br /></li></ul>A dynamic signature captured and embedded with SignDoc looks identical in all respects to a person’s original wet ink signature. However, it is much more than just an electronic image. The signature contains biometric information about how the signature was signed such as speed, patterns, habits, and pressure of pen strokes. These characteristics represent a biometric footprint which is unique to every individual and can not be reproduced by a forger.<br /><br />Dynamic signatures also offer some of the best biometrics with respect to uniqueness and repeatability thus sealing your transactions in a secure manner and removing any question as to the identity of the signer.<br /><br />SignDoc is based on the SignWare Software Development Kit which includes SOFTPRO's unique signature combo-verification. It compares both the static image characteristics and dynamic signals to a known reference signature. The verification automatically takes into account the natural variations in the signer's signature characteristics so that the capture and verification is effective in any situation. If the character set is not within a certain tolerance level, the signature has highly likely been forged.<br /><br />In the absence of dynamic signature parameters, static features may be used for comparison. Static technology has been successfully user for more than a decade in financial institutions worldwide.<br /><br />This allows smooth transition from the paper to the electronic world.<br /><br />Product by SOFTPRO<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/finger-payment-fingerprint-biometrics.html"><strong>Dermalog Finger Payment - Fingerprint Biometrics</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/signature-verification-system.html"><strong>Signature Verification System</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/futronic-fs80-usb-fingerprint-scanner.html"><strong>Futronic FS80 USB Fingerprint Scanner</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/glossary-security-biometric-terms.html"><strong>Glossary of Security and Biometric System Terms</strong></a>Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-5210416922525625411.post-87087026038240796172008-09-30T15:11:00.000-07:002011-01-29T04:59:19.223-08:00PalmSecure Palm Vein Authentication SystemAs organizations search for more secure authentication methods for data access, physical access and other security applications, many are discovering biometrics, which has gained recognition as one of the mainstream security technologies. Biometric usage in identification management is getting attention across the markets, with organizations and individuals demanding more reliable, highly accurate and efficient methods of confirming a person's identity.<br /><a name='more'></a><br />Fujitsu provides a biometric authentication system based on its leading-edge palm vein pattern recognition technology. PalmSecure features authentication accuracy with extremely low false rates, and the non-intrusive and contactless reader device provides ease of use with virtually no physiological restriction for all users.<br /><br />PalmSecure can be implemented within a wide range of markets, including security, government, healthcare, financial, banking, commercial enterprises and educational facilities. Applications for the device include:<br /><ul><li>Physical access control - Time and Attendance<br /></li><li>User authentication to PCs or server systems<br /></li><li>Government or Commercial identity management systems<br /></li><li>OEM terminal devices (POS, ATMs or information kiosks)<br /></li><li>Other industry-specific applications<br /></li></ul>Features:<br /><ul><li>Unique: vein patterns are unique to individuals and contain detailed characteristics<br /></li><li>Accurate: advanced matching algorithms produce high level of accuracy<br /></li><li>Universal Applicability: technology can be used by virtually everyone<br /></li><li>Versatile: readily deployable to wide range of applications<br /></li><li>Hygienic: contact-less user interface addresses hygiene concerns<br /></li><li>Non-invasive: simple to use user interface promotes high level of user acceptance<br /></li><li>Reliable: field proven technology with built-in forgery protection<br /></li></ul>Specifications:<br /><ul><li>Supply voltage (from US bus power): 4.4 to 5.4V (Input current: up to 500mA)<br /></li><li>Power consumption: 2.5W or less<br /></li><li>Interface: USB 2.0 / 1.1 (Hi speed or full speed)<br /></li><li>Photography distance (from filter surface): 50mm (+/- 10mm)<br /></li><li>Acoustic noise: None<br /></li><li>Operating temperature: 0° to 60°C<br /></li><li>Storage Temperature: -20° to 70° C<br /></li><li>Outer dimensions: 35mm x 35mm x 27mm<br /></li><li>Weight: 50g (approx.)<br /></li><li>Supported OS: Client: Windows 2000 Pro, XP Pro, Redhat Linux ver. 3 & 4<br /></li><li>Server: Windows Server 2003, Redhat Linux ver. 3 & 4<br /></li></ul><br />Product by FUJITSU<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2009/01/ringdale-terminal-fingerprint-reader.html"><strong>Ringdale Terminal with Fingerprint Reader</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/motorola-fingerprint-identification.html"><strong>Motorola Mobile AFIS Fingerprint Identification</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/panasonic-bm-et330-iris-recognition.html"><strong>Panasonic BM-ET330 Iris Recognition</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/fujitsu-mbf200-fingerprint-sensor.html"><strong>Fujitsu MBF200 Fingerprint Sensor</strong></a>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-5210416922525625411.post-63626361653666010772008-09-29T11:34:00.000-07:002011-01-29T04:58:50.780-08:00Why Biometrics is Important?Are you who you claim to be?<br /><br />This is a question that is increasingly being asked of individuals by governments and business organisations in their bid to fight fraud, organised crime and terrorism, as well as to combat illegal immigration. Biometrics technology using advanced computer techniques is now widely adopted as a front-line security measure for both identity verification and crime detection, and also offers an effective crime deterrent. A term derived from ancient Greek: ‘bios’ meaning ‘life’ and ‘metric’, ‘to measure’ – biometrics embraces a range of techniques such as fingerprinting and hand-writing recognition for identity verification using physical data and/or behavioural patterns.<br /><a name='more'></a><br />Measurement of physical features such as height, eye colour, scars, etc, as a method of personal identity is known to date back to the ancient Egyptians. Archaeological evidence of fingerprints being used to at least associate a person with some event or transaction is also said to date back to ancient China, Babylonia and Assyria. But it was not until the end of the 19th century that the study of biometrics entered the realm of crime detection. Alphonse Bertillon, a French police clerk and anthropologist, pioneered a method of recording multiple body (anthropometric) measurements for criminal identification purposes. Known as ‘Bertillonage’ it was adopted by many police authorities worldwide during the 1890s, but soon became obsolete once it was recognised that people could indeed share the same physical measurements.<br /><br />Meanwhile, the quest for a physical identifier that was unique to each individual gained significant ground when British anthropologist, Sir Francis Galton, worked on the principle that fingerprints were permanent throughout life, and that no two people had identical fingerprints. Galton calculated the odds of prints from two people being identical to be 1 in 64 billion and also identified characteristics – known as ‘minutiae’ – that are still used today to demonstrate that two impressions made by the same finger match. Minutiae are points of interest formed by the endings or forking of the friction skin ridges on each finger and are defined as one of the following:<br /><ul><li>Ridge ending – the point at which a ridge terminates<br /></li></ul><ul><li>Bifurcation – the point at which a single ridge splits into two ridges<br /></li></ul>It is the arrangement of all the minutiae in terms of their location, orientation of ridge flow and type (i.e. ridge ending or bifurcation) that make an individual’s fingerprints unique. The flow of the friction skin ridges also form the patterns – the whorl, arch and loop of each finger – that were identified by Galton.<br /><br />Galton’s patterns provided the basis of the first fingerprint file established in 1891 by Juan Vucetich, an Argentine police officer, who became the first to use a bloody fingerprint to prove the identity of a murderer during a criminal investigation. In 1897, Sir Edward Henry, a British police officer serving as Inspector General of the Bengal Police in India, also developed an interest in the use of fingerprints for identifying criminals, even though the Bengal Police was at that time using Bertillonage. Based on Galton’s observations, Henry and colleagues established a modified classification system allowing fingerprints captured on paper forms using an ink pad to be classified, filed and referenced for comparison against thousands of others. By 1901, Henry’s fingerprinting system had been adopted in the UK by Scotland Yard and its use then spread through most of the world (the exception being South America, where the Vucetich system was used) to become a standard method of identity detection and verification in criminal investigations.<br /><br />With the advent of computers and digital technology in the 1970s, fingerprinting took on a new dimension. As a result, the UK’s fingerprint service now records 120,000 sets of fingerprints each year – a volume of records that was simply untenable before computerisation. Within a century, biometrics had evolved from tape measure, ink and pad techniques requiring vast manual filing and archiving resources, to an automated biometric digital scanning process using computerised storage, automated search and find/match techniques, plus extensive archiving and access systems with worldwide links. Such technology now provides for the capture and processing of biometrics information and has transformed fingerprinting techniques and procedures.<br /><br />In the mid-1960s, the Royal Canadian Mounted Police (RCMP) adopted an automated video tape-based filing system allowing identification officers to make fingerprint comparisons on-screen. A similar ‘Videofile System’ was installed at New Scotland Yard in 1977. Around the same time, the USA’s Federal Bureau of Investigation (FBI) was working with industry to build the first automated fingerprint card reader, which was implemented in 1974. Over the next five years, the FBI and other organisations in Canada, Japan and the UK, developed further core technologies including fingerprint matching hardware, plus automated classification software and hardware. By the early 1980s, this culminated in the automatic fingerprint identification system (AFIS), which allowed the automatic matching of one or many unknown fingerprints against an electronic database of known prints; another major forward step in the world of crime detection and international security. Such systems have since reduced the manual capture, store, search and match processes for fingerprints from weeks and months, to hours and minutes, and have led to AFIS being deployed by law enforcement agencies in Europe and world-wide.<br /><br />Current Biometric Information Systems (BIS)<br /><br />Biometrics is, essentially, based on the development of pattern recognition systems. Today, electronic or optical sensors such as cameras and scanning devices are used to capture images, recordings or measurements of a person’s ‘unique’ characteristics. This digital data is then encoded and can be stored and searched on demand, via a computer. Such biometric search is not only very rapid (often taking place in real-time), it is also a process that is accepted globally in establishing forensic evidence in a law court. Consequently, there are numerous forms of biometrics now being built into technology platforms. The most widely applied methods include:<br /><br />Fingerprints and palmprints – uses impressions printed on paper or card with ink, or digital scans of an individual’s fingers (or palms) to record their unique characteristics. The risk of a duplicate print/scan occurring is now estimated at being 10 to the 48th power: in other words, each finger print is as close to being ‘unique’ as you can get. Fingerprints therefore remain the most powerful and widely used biometric technology in forensics. A common statistic however, is that 30% of crime scenes include palmprints, which is why these are also captured and processed using the latest AFIS solutions.<br /><br />Facial recognition – identifies people by the sections of the face that are less susceptible to alteration, e.g. the upper outlines of the eye sockets, the areas around the cheekbones and the sides of the mouth. 2D facial recognition, as the name suggests, uses information from a two dimensional image of a face –such as a photograph – and relies on the comparison of relative positions of facial features. Substantial work has been devoted to 2D facial recognition but, more recently, advances in techniques for 3D facial recognition (which includes information on depth and enables images to be viewed and analysed from a range of orientations) show promise in improving match accuracy. It should also be noted that facial recognition is the only viable recognition technology able to operate without the subject’s cooperation, since facial characteristics can be captured from video cameras or closed-circuit television (CCTV). The accuracy of facial recognition however, is heavily dependent on the quality of the facial image and the consistency of its capture. As such, there are four types of facial recognition that vary in accuracy. The most accurate results are obtained from systems where the image capture is tightly controlled:<br /><br />Type 1: Photo ID recognition – whereby the picture image on an identification document is compared to the individual carrying the document. The picture image could also be compared to an image captured when the document was issued, to ensure that the document is not a forgery<br /><br />Type 2: High restriction live image – the individual places their chin on a certain spot while their picture is taken. This picture is then compared to the an original image stored on a computer<br /><br />Type 3: Low restriction live image – the individual is asked to stand in a marked area and look forward while their image is captured and then matched or rejected when compared to an original image stored on a computer<br /><br />Type 4: No restriction – the individual walks through a security area and their image is captured and compared to the original image<br /><br />Iris recognition – uses a high-quality camera to capture a black-and-white, high-resolution image of the iris (the coloured ring surrounding the pupil). It has been estimated that with an average of approximately 250 distinctive characteristics in an iris, the odds of two people having the same pattern are 1 in 7 billion. One approach to Iris recognition is to use these distinctive characteristics to define the boundaries of the iris, establish a coordinate system over the iris and then define the zones for analysis within the coordinate system. The accuracy of Iris recognition however, is dependent on the cooperation of the subject. For example, criminals have been known to use eye drops to dilate their pupil to hide the majority of their Iris.<br /><br />Emerging Biometric Information Systems<br /><br />Although fingerprints, facial images and iris recognition offer a proven methodology for mainstream applications, biometric alternatives are still being developed. Other physiological or behavioural characteristics have, and are, being researched – some of which are not yet viable, while others, although available commercially, are inappropriate for mass market application:<br /><br />Hand geometry – the capture of measurements encompassing the width, height and length of the fingers, distances between joints and shapes of the knuckles. While reasonably diverse, the geometry of an individual’s hands is not necessarily unique.<br /><br />Voice recognition – focuses on differences resulting from the shape of vocal tracts and learned speaking habits. Operates best when there’s no background noise.<br /><br />Signature recognition – analyses a series of movements that contain unique biometric data such as personal rhythm, acceleration and pressure flow. Since these movements can vary with each signing, differentiating between the consistent and the behavioural parts of a signature is difficult.<br /><br />Keystroke recognition – assesses the user’s typing style, including how long each key is depressed (dwell time), time between key strokes (flight time) and typical typing errors. This is more suited as an internal security technology, such as providing computer access within an organisation.<br /><br />Gait recognition – captures a sequence of images for analysis of how an individual walks. Still in an early stage of research & development.<br /><br />Biometrics in the European Union (EU)<br /><br />Biometric technologies are being utilised across a variety of applications – from security, fraud prevention and border control, to public aid/social benefits, customs, immigration, passport and healthcare identity verification, as well as commercial enterprise use. The Serbian Ministry of Interior (MoI) has implemented a contract to issue both national and government IDs, as well as driving licences, that will use the latest smartcard and multi-modal biometrics technology (fingerprint and facial). In Switzerland, a national AFIS with fingerprint-enabled border checks has been deployed by the National Police. And in Belgium, the MoI’s Refugee Bureau has created a national AFIS for immigration and asylum, which interfaces to EURODAC – the pan-European asylum fingerprint system operated by the European Commission (EC).<br /><br />EURODAC enables all immigration authorities in the European Union, plus Norway and Iceland, to search an asylum applicant’s fingerprints, or those of someone who is suspected of being an asylum seeker, against the existing stored data, to prove whether or not the individual has applied for asylum in another of these countries since January 2003. If the individual is identified as having applied for asylum first in another of these countries, he/she can then be returned without a lengthy and expensive expulsion process.<br /><br />Biometrics technology has become an integral part of key, EC programmes that will facilitate free movement across borders, as set out in the Schengen Agreement. Such programmes include:<br /><ul><li>Development of a second-generation Shengen Information System (SIS II) – the original SIS is at the heart of the Schengen mechanism. It was created to allow all border posts, police stations and consular agents from Schengen signatory States to access data on specific individuals, vehicles or objects that have been lost or stolen. The new SIS will include storage of biometrics data.<br /></li></ul><ul><li>Introduction of a Visa Information System (VIS) – a central database of demographic information, digitised photographs and fingerprints, supporting Common Visa Policy for the exchange of visa information (including biometrics) between Member States. By 2010, VIS could become the largest biometric database in the world, holding 70 million sets of fingerprints. This programme also calls for the creation of a Biometric Matching System (BMS).<br /></li></ul><ul><li>United States Visitor and Immigrant Status Indicator Technology (US-VISIT) programme – although outside of EU jurisdiction, the US-VISIT programme is important because it requires those travelling to the US to have computer-readable passports containing biometric identifiers that comply with ICAO standards (i.e. digital fingerprints and photos). This has prompted an EU mandate that all future passports issued by Member States contain biometric identifiers.<br /></li></ul><br />Big Brother Fears<br /><br />Not everyone sees biometrics as a helpful tool. Objections may focus on cost, effectiveness or inconvenience, while others simply do not like the idea of biometrics. Some consider it physically intrusive to, for example, pause and position themselves in relation to a biometric capture device while presenting their biometric. Verifying one’s identity via a hardware device rather than by human interaction is sometimes deemed as ‘too impersonal’. Fingerprint systems, in particular, face opposition because of their association with criminal applications.<br /><br />Hygiene may also be a concern. For example, people may object to hand geometry scanners because they do not like to place their palms on the same surface as others. There are even fears that devices that scan sensitive areas of the body, such as eyes, may cause physical damage. Such concerns are often an emotional response to biometrics, however, that doesn’t mean they can be ignored.<br /><br />The greatest barrier to widespread adoption stems from public concern that biometrics technology will be used to track not just the ‘bad guys’ but also law-abiding citizens – creating a ‘Big Brother’ scenario. The possibility that biometric information could be gathered without permission or for an explicitly defined purpose, and used for applications other than identity management, is known as ‘function creep’ and this raises key questions:<br /><ul><li>What data should be included or linked to a biometric identification card or e-passport?<br /></li></ul><ul><li>Who should have access to such information, legitimately or otherwise?<br /></li></ul><ul><li>How can people who can access such data be controlled?<br /></li></ul>Clearly such questions call for a study of the type of public policies and legislation required, as well as directives based on international agreements on how biometric databases should be used. Formulating a workable privacy framework which extends existing data protection legislation and embraces the principles of protecting personal privacy whilst not compromising national security, will require leadership at all levels if the aims of better identity management via biometric technologies are to be realised.<br /><br />Why biometrics is important?<br /><br />The need to facilitate the increasing levels of international trade, migration and travel while combating organised crime and national security threats, has placed identity management high on the agenda of governments world-wide. The implementation of biometrics technology in ID-cards, passports and other travel documents is under consideration because biometrics combines two processes key to verifying the identity of an individual and establishing the validity of their documents:<br /><br />Enrolment – uses the capture of an individual’s unique characteristics to create a secure credential that ties their identity to the document. This then facilitates the next process of:<br /><br />Identification and verification:<br /><ul><li>Identification: one-to-many (1:N) recognition – determines a person’s identity by searching against a biometric database. Positive identification answers the question: “Who is this person?” The response could be anything from a name or an employee’s ID number, to a criminal’s alias.<br /></li></ul><ul><li>Verification: one-to-one (1:1) matching or authentication – establishes the validity of a claimed identity by comparing a verification template to an enrolment template. Verification answers the question: “Am I who I claim to be?”<br /></li></ul>The International Civil Aviation Organization (ICAO) has already defined standards for machine readable passports that include a facial biometric as mandatory for global interoperability. Finger and iris are also recommended by ICAO as secondary biometrics to be included at the discretion of the passport issuing authority with fingerprints becoming mandatory in 2008. Wireless technologies such as TETRA, APCO-P25, GSM/GPRS or professional mobile radio (PMR), are also adding a further dimension. Mobile solutions for example, comprising ruggedised laptops, two-finger scanning devices and wireless connectivity to a central AFIS, have been implemented in a number of European countries for law enforcement and border control. Such systems ensure remote and timely access to valuable information, such as fingerprints, facial images, and relevant demographic records and documents.<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/10/glossary-security-biometric-terms.html"><strong>Glossary of Security and Biometric System Terms</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/fusion-biometric-handheld-device.html"><strong>Fusion Biometric Handheld Device</strong></a><br /><a href="http://biometric-devices.blogspot.com/2009/01/ringdale-terminal-fingerprint-reader.html"><strong>Ringdale Terminal with Fingerprint Reader</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/motorola-fingerprint-identification.html"><strong>Motorola Mobile AFIS Fingerprint Identification</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/panasonic-bm-et330-iris-recognition.html"><strong>Panasonic BM-ET330 Iris Recognition</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-50760642028350435352008-09-29T11:17:00.000-07:002011-01-29T04:57:50.004-08:00Motorola LiveScan Station 4000 PortableDesigned for field use, this LiveScan solution provides complete biometrics acquisition in a portable form factor complete with a ruggedized case with battery power. Capture fingerprints, palmprints, mugshots, iris images, signature details and descriptive data (such as scars and tattoos) in remote environments.<br /><a name='more'></a><br />Features:<br /><ul><li>FBI Appendix F certified software<br /></li><li>Sequence checking for fingerprints and palmprints<br /></li><li>3 part full palm capture (upper/lower/writer)<br /></li><li>Capture maximum image size allowable by the NIST, the FBI and all state agencies<br /></li><li>No moving platen or capture camera<br /></li><li>An FBI certified 3-part full palm scanner, option for 1000 ppi scanner<br /></li><li>Newly ergonomically redesigned ruggedized cabinet<br /></li><li>Instant live video of fingerprint and palmprint images feedback<br /></li><li>Sealed platen to provide water resistance<br /></li><li>Foot pedal to provide exact control over scanner<br /></li><li>Auto scanner calibration upon startup<br /></li><li>XML or NIST based foreign system interface<br /></li></ul><br />Product by Motorola<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/glossary-security-biometric-terms.html"><strong>Glossary of Security and Biometric System Terms</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/signature-verification-system.html"><strong>Signature Verification System</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/panasonic-bm-et200-iris-reader.html"><strong>Panasonic BM-ET200 Iris Reader</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/gka-90-fingerprint-access-control.html"><strong>GKA-90 Fingerprint Access Control</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-18441355106983169332008-09-29T08:34:00.000-07:002011-01-29T04:56:37.667-08:00Panasonic BM-ET200 Iris ReaderBiometric technology overcomes many of the disadvantages of conventional ID and verification techniques such as keys, ID cards and passwords. Instead, Panasonic's solution uses an Iris Reader to verify the identity of authorized persons - positively and definitively - with virtually no chance of mis-identification.<br /><br />The BM-ET200 offers more accurate, faster, non-contact entry/exit control utilizing biometric technology for iris recognition. The system can be used to check IDs in a variety of applications, including airports and entry/exit control for many types of industries. Simple and easy to configure, the BM-ET200 has recognition results in 0.3 seconds.<br /><a name='more'></a><br />The system involves no lasers, bright lights, or any hazardous technology at all. It's as safe to use as any video camera. And it's compliant with worldwide standards, including, CENELEC, (EN 60825-1) and ANSI RP-27.1-96.<br /><ul><li>Fast, high-speed capture engine<br /></li><li>Distance Guide Indicator<br /></li><li>Three Settings for Voice Guidance<br /></li><li>Tamper Detection<br /></li><li>25 User License Included<br /></li><li>Access Log Can be Searched by Time<br /></li><li>Detection of Eyes: Auto<br /></li><li>Recognition Time (Minimum): 0.3 seconds (approximate)<br /></li><li>Voice Guidance: Yes (14-Language)<br /></li><li>Maximum Registration Data (per camera): Stand alone mode: 50 Users<br /></li><li>Network mode: 5,025 Users<br /></li><li>Maximum Registration Data (per system): 10,025 users (4 cameras)<br /></li><li>Power: 12V DC or 24V DC<br /></li><li>Dimensions (H x W x D): 7.5'' x 8'' x 3.0625''<br /></li><li>Weight: 1.98 lbs<br /></li></ul><br />Product by Panasonic<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/biometric-face-logon-system.html"><strong>Biometric Face Logon System</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/guardianxl-fingerprint-biometric-door.html"><strong>GuardianXL Fingerprint Biometric Door Lock</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/signdoc-biometric-handwritten-signature.html"><strong>SignDoc Biometric Handwritten Signature</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/09/palmsecure-palm-vein-authentication.html"><strong>PalmSecure Palm Vein Authentication System</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-86882214625255172182008-09-29T01:23:00.000-07:002011-01-29T04:56:14.982-08:00GKA-90 Fingerprint Access ControlGlobal Keyaccess provides fingerprint Access Control and Time & Attendance digital device for any firms which need security and attendance functions. Based on optical sensor technology, GKA90 is capable to store 1,500 fingerprints, 10,000 ID card capacity and 50,000 events with quite competitive price. GKA90 is a new developed Fingerprint+Smart card mode system, which has fingerprint access and smart card access functions together.<br /><br />GKA90 is TCP/IP, RS485 based and able to register on keypad or software, so it is very convenient to be operated with.<br /><a name='more'></a><br />Global Keyaccess provides fingerprint Access Control and Time & Attendance digital device for any firms which need security and attendance functions. Based on optical sensor technology, GKA90 is capable to store 1,500 fingerprints, 10,000 ID card capacity and 50,000 events with quite competitive price. GKA90 is a new developed Fingerprint+Smart card mode system, which has fingerprint access and smart card access functions together. GKA90 is TCP/IP, RS485 based and able to register on keypad or software, so it is very convenient to be operated with.<br /><br />Global Keyaccess provides fingerprint Access Control and Time & Attendance digital device for any firms which need security and attendance functions. Based on optical sensor technology, GKA90 is capable to store 1,500 fingerprints, 10,000 ID card capacity and 50,000 events with quite competitive price. GKA90 is a new developed Fingerprint+Smart card mode system, which has fingerprint access and smart card access functions together. GKA90 is TCP/IP, RS485 based and able to register on keypad or software, so it is very convenient to be operated with.<br /><br />Features:<br /><ul><li>Built in strong U.S.A Intel32bit fingerprint embedded standalone module, it is easy to integrate with various systems<br /></li><li>Support finger 360 degree identification, easy to use<br /></li><li>CMOS automated exposure and intelligent compensation improved image quality<br /></li><li>Adjusting image distortion, assure fingerprint matching consistency<br /></li></ul>FAQ:<br /><ul><li>What operation system of PC support your Fingerprint access controller?<br /></li></ul>Win 98, Win 2000, Win XP. the introduction says it is based on Lunix system, that's because we need to describe our hardware is developed based on Linux. But for software installation environment, only Windows system could support our software, Linux doesn't support fingerprint access control & time attendance software.<br /><ul><li>Does GKA90 has USB port so we can download the transaction record to USB disk?<br /></li></ul>Yes, GKA90 has USB port option, you may insert the USB disk to download transaction without any problem.<br /><br />Specifications:<br /><ul><li>Size: 145(L)X118(W)X45(H)mm<br /></li><li>Fingerprint capacity: 1,500<br /></li><li>EM 125KHz card capacity: 10,000(Mifare 1K built-in reader could be customized)<br /></li><li>Transaction Storage: 50,000<br /></li><li>Access Control : 50 Time Zone ,5 Groups, 10 Combination, Holiday Management , support standalone work<br /></li><li>Communications: RS232 ,RS485 ,TCP/IP<br /></li><li>Door Control: 12V 2A<br /></li><li>Identification time : <=2S </li><li>False accept rate: <=0.0001% </li><li>False reject rate: <=1% </li><li>Sensor: GKA Sensor<br /></li><li>Standard: Access control, time and attendance<br /></li><li>Keyboard and Display: LCD with 80 character and figure keypad<br /></li><li>Algorithm version: 2007 Version GKA new algorithm<br /></li><li>Hardware platform: GKA100/GKA400/GKA500<br /></li><li>Standard: Wire Doorbell, Wiegand OUT, Wiegand IN<br /></li><li>Optional: ID/HID/Mifare card, Webserver, USB host, Short message, Workcode, RIS, Antipass-back<br /></li><li>Yes, GKA90 has USB port option, you may insert the USB disk to download transaction without any problem.<br /></li></ul><br />Product by GKA<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/finger-payment-fingerprint-biometrics.html"><strong>Dermalog Finger Payment - Fingerprint Biometrics</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/signature-verification-system.html"><strong>Signature Verification System</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/11/futronic-fs80-usb-fingerprint-scanner.html"><strong>Futronic FS80 USB Fingerprint Scanner</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/10/glossary-security-biometric-terms.html"><strong>Glossary of Security and Biometric System Terms</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-87124256940637591652008-09-28T20:41:00.000-07:002011-01-29T04:55:29.936-08:00Fusion Biometric Handheld DeviceDesigned from the ground up for military and law enforcement personnel operating in a variety of austere environments around the globe, the new Cogent Fusion handheld device provides these professionals a lightweight, wireless, multi-modal biometric collection and identification solution. Built to U.S. Department of Defense MIL-STD 810 and Ingress Protection (IP) standards, the Fusion device fits in the cargo pocket of standard tactical trousers.<br /><a name='more'></a><br />The Fusion device, Cogent’s latest state-of-the-art biometric tool, captures and stores 10,000-plus (scalable) records: forensic-quality fingerprints, latent fingerprints, iris images, photos and textual data. Other features include internal matching against stored records, wireless connectivity via 802.11b/g or Bluetooth, GPS tagging of all records collected, and the lightest weight of any device of its type on the market today – just over one pound.<br /><br />Key Features:<br /><ul><li>1 x 1 in. 500 dpi optical fingerprint scanner<br /></li><li>EBTS (FBI/DoD) compliant<br /></li><li>Supports capture/matching of 10 flat fingerprints<br /></li><li>Latent fingerprint capture<br /></li><li>Iris image capture<br /></li><li>Facial photo capture (with view of photo during capture and retrieval)<br /></li><li>Integrated RF communications: 802.11b/g, Bluetooth, GSM/GPRS (EV-DO/EDGE optional)<br /></li><li>3.5 in. LCD (touchscreen optional)<br /></li><li>Weight of 1.2 pounds<br /></li><li>Biological or biomedical analysis<br /></li></ul>Physical Specifications:<br /><ul><li>Length: 8.74 in.<br /></li><li>Width (at widest point): 4.61 in.<br /></li><li>Height: 2.91 in.<br /></li><li>Weight: 1.2 lbs<br /></li><li>Display: 3.5 in. color QVGA (touchscreen optional)<br /></li><li>Keypad: Expanded QWERTY<br /></li><li>Expansion Slot: 8 GB SD (scalable)<br /></li><li>Battery: Rechargeable 8+ hours continuous operation, hot swappable<br /></li></ul>Performance Specifications:<br /><ul><li>Operating System: Linux (Windows CE optional)<br /></li><li>Memory: 128 MB SDRAM/128 MB FLash (internal SD card scalable)<br /></li><li>Interface: USB 2.0 Client, USB 1.1 Host<br /></li></ul>Collection Specifications:<br /><ul><li>Fingerprint: 1 x 1 in., 500 ppi forensic-quality optical, FBI-certified<br /></li><li>Iris: 2 megapixels<br /></li><li>Face: 1.3 megapixels<br /></li></ul>Wireless Specifications:<br /><ul><li>WLAN: 802.11b/g (supports standard WiFi encryption)<br /></li><li>WWAN: GPRS, GSM (EV-DO/EDGE optional)<br /></li><li>WPAN: Bluetooth (version 2.0)<br /></li><li>Embedded GPS (files automatically tagged)<br /></li></ul>Compliance:<br /><ul><li>RoHS<br /></li><li>MIL-STD-810<br /></li><li>IP 65<br /></li></ul>Certifications:<br /><ul><li>FCC<br /></li><li>CE<br /></li></ul>Product by Cogent Systems<br /><br /><img alt="biometricsbar1707" border="0" height="1" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbxh7LOmreUBBXNmAdFAY6Md_bQd8cKZasiW9yR95C7HAtbMmc8fkcmJNDv09WzpiTZJDBbZBwbioW-LUWVwsoSjyzhhNB7-DM_cT6SEDY-D7sO5Pzaeaak2qR-vT9iz-pMfUw_S4qPdgE/s1600/biometricsbar1707.gif" width="707" /><br /><br />See also:<br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html"><strong>Why Biometrics is Important?</strong></a><br /><a href="http://biometric-devices.blogspot.com/2009/01/ringdale-terminal-fingerprint-reader.html"><strong>Ringdale Terminal with Fingerprint Reader</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/motorola-fingerprint-identification.html"><strong>Motorola Mobile AFIS Fingerprint Identification</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/panasonic-bm-et330-iris-recognition.html"><strong>Panasonic BM-ET330 Iris Recognition</strong></a><br /><a href="http://biometric-devices.blogspot.com/2008/12/fujitsu-mbf200-fingerprint-sensor.html"><strong>Fujitsu MBF200 Fingerprint Sensor</strong></a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-59985380293060562232008-09-27T19:17:00.000-07:002011-01-12T17:12:10.444-08:00Sitemap<a href="http://biometric-devices.blogspot.com/2009/01/ringdale-terminal-fingerprint-reader.html">Ringdale Terminal with Fingerprint Reader</a><br /><a href="http://biometric-devices.blogspot.com/2008/12/motorola-fingerprint-identification.html">Motorola Mobile AFIS Fingerprint Identification</a><br /><a href="http://biometric-devices.blogspot.com/2008/12/panasonic-bm-et330-iris-recognition.html">Panasonic BM-ET330 Iris Recognition</a><br /><a href="http://biometric-devices.blogspot.com/2008/12/fujitsu-mbf200-fingerprint-sensor.html">Fujitsu MBF200 Fingerprint Sensor</a><br /><a href="http://biometric-devices.blogspot.com/2008/11/finger-payment-fingerprint-biometrics.html">Dermalog Finger Payment - Fingerprint Biometrics</a><br /><a href="http://biometric-devices.blogspot.com/2008/11/signature-verification-system.html">Signature Verification System</a><br /><a href="http://biometric-devices.blogspot.com/2008/11/futronic-fs80-usb-fingerprint-scanner.html">Futronic FS80 USB Fingerprint Scanner</a><br /><a href="http://biometric-devices.blogspot.com/2008/10/glossary-security-biometric-terms.html">Glossary of Security and Biometric System Terms</a><br /><a href="http://biometric-devices.blogspot.com/2008/10/biometric-face-logon-system.html">Biometric Face Logon System</a><br /><a href="http://biometric-devices.blogspot.com/2008/10/guardianxl-fingerprint-biometric-door.html">GuardianXL Fingerprint Biometric Door Lock</a><br /><a href="http://biometric-devices.blogspot.com/2008/09/signdoc-biometric-handwritten-signature.html">SignDoc Biometric Handwritten Signature</a><br /><a href="http://biometric-devices.blogspot.com/2008/09/palmsecure-palm-vein-authentication.html">PalmSecure Palm Vein Authentication System</a><br /><a href="http://biometric-devices.blogspot.com/2008/09/why-biometrics-is-important.html">Why Biometrics is Important?</a><br /><a href="http://biometric-devices.blogspot.com/2008/09/motorola-livescan-station-4000-portable.html">Motorola LiveScan Station 4000 Portable</a><br /><a href="http://biometric-devices.blogspot.com/2008/09/panasonic-bm-et200-iris-reader.html">Panasonic BM-ET200 Iris Reader</a><br /><a href="http://biometric-devices.blogspot.com/2008/09/gka-90-fingerprint-access-control.html">GKA-90 Fingerprint Access Control</a><br /><a href="http://biometric-devices.blogspot.com/2008/09/fusion-biometric-handheld-device.html">Fusion Biometric Handheld Device</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5210416922525625411.post-63784560057701075372008-09-27T13:24:00.000-07:002011-01-11T22:28:28.688-08:00Privacy Policy<a name='more'></a>We recognize that privacy of your personal information is important. Here is information on what types of personal information we receive and collect when you use visit, and how we safeguard your information. We never sell your personal information to third parties.<br /><br />Log Files: As with most other websites, we collect and use the data contained in log files. The information in the log files include your IP (internet protocol) address, your ISP (internet service provider, such as AOL or Shaw Cable), the browser you used to visit our site (such as Internet Explorer or Firefox), the time you visited our site and which pages you visited throughout our site.<br /><br />Cookies and Web Beacons: We do use cookies to store information, such as your personal preferences when you visit our site. This could include only showing you a popup once in your visit, or the ability to login to some of our features, such as forums.<br /><br />We also use third party advertisements on to support our site. Some of these advertisers may use technology such as cookies and web beacons when they advertise on our site, which will also send these advertisers (such as Google through the Google AdSense program) information including your IP address, your ISP , the browser you used to visit our site, and in some cases, whether you have Flash installed. This is generally used for geotargeting purposes (showing New York real estate ads to someone in New York, for example) or showing certain ads based on specific sites visited (such as showing cooking ads to someone who frequents cooking sites).<br /><br />You can chose to disable or selectively turn off our cookies or third-party cookies in your browser settings, or by managing preferences in programs such as Norton Internet Security. However, this can affect how you are able to interact with our site as well as other websites. This could include the inability to login to services or programs, such as logging into forums or accounts.<br /><br />We use third-party advertising companies to serve ads when you visit our website. These companies may use information (not including your name, address, email address, or telephone number) about your visits to this and other sites in order to provide advertisements about goods and services of interest to you.<br /><br />Google, as a third party vendor, uses cookies to serve ads on our site. Google's use of the DART (DoubleClick DART cookie) cookie enables it to serve ads to our users based on their visit to our sites and other sites on the Internet. Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy (www.google.com/privacy_ads.html).Unknownnoreply@blogger.com