Ones Technology Products & Solutions

Slides:



Advertisements
Similar presentations
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Advertisements

BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
PALM VEIN TECHNOLOGY.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Authentication, Authorization and Accounting
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Karthiknathan Srinivasan Sanchit Aggarwal
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Open your web browser and navigate to protechra.webex.com Open your web browser and navigate to protechra.webex.com.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Shai Tirosh Windows Server Regional Director artNET Experts.
Advanced Secure Technologies Secure Document Technologies.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Introduction TO Network Administration
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Physical security By Ola Abd el-latif Abbass Hassan.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Speed Cash System. Purpose of the Project  online Banking Transaction Information.  keeping in view of the distributed client server computing technology,
BY G.SRAVAN TEJA. Skype’s Popularity Skype was founded in 2003 by Niklas Zennström and Janus Friis. EBay bought Skype for 2.6 billion dollars in 2005.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Authentication, Authorization and Accounting Lesson 2.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Nexbase Invites You To Our Special Products
BioTime 7.0 Web-Based Time Attendance Software.
Basharat Institute of Higher Education
ICT II Unit 6 Networking.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
COSEC Visitor Management
Data Security & Business Continuity
Chapter One: Mastering the Basics of Security
Access control techniques
SECURITY FEATURES OF ATM
Authentication.
Radius, LDAP, Radius used in Authenticating Users
Introducing MagicInfo Lite I 4.1
BIOMETRICS Libraries have begun to see the value of biometrics M. G
Biometric Security Fujitsu Palm Vein Technology
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Unit 27: Network Operating Systems
Wavestore Integrates…
Networks Software.
Welcome To Money pad November 23, 2018 Sample footer.
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Faculty of Science IT Department Lecturer: Raz Dara MA.
【Date: 】
The Italian Academic Community’s Electronic Voting System
Web-Based Time Attendance Software
Firewall Installation
Computer Security Protection in general purpose Operating Systems
Designing IIS Security (IIS – Internet Information Service)
Web-Based Time Attendance Software
Security Planning and Administrative Delegation
Presentation transcript:

Ones Technology Products & Solutions 2017

CORPORATE ABOUT US Founded in 2008. Innovation & Solution focused technology development especially on Biometric Security Solutions & Technologies. Designed and developed, Social Security Institution’s National Biometric Identity Verification System, one of the biggest biometric projects in the world. Leading to bring biometric technologies into the community & business life with BioAffix® Biometric Identity Verification Product Family since 2013.

CORPORATE SUCCESS STORY Social Security Institution’s National Biometric Identity Verification System, one of the biggest biometric projects in the world (Since 2011) Video 1 28 Million Enrolled Citizens 333 Million Biometric Verifications %38 Decrease in number of patients 1750 installation sites 5800 Biometric Verification Devices İnstalled

CORPORATE SUCCESS STORY Biometric Identity Verification Product Family - BioAffix® SERVER BASED BIOMETRIC MICROSOFT WINDOWS LOGON APPLICATION SERVER BASED BIOMETRIC IDENTITY VERIFICATION APPLICATION THAT CAN BE INTEGRATED TO APPLICATIONS PALM VEIN BASED BIOMETRIC SECURITY ACCESS CONTROL DEVICE CENTRAL BIOMETRIC MANAGEMENT APPLICATION THE APPLICATION SERVER OF THE BIOAFFIX PRODUCT FAMILY BIOMETRIC SECURE PRINT DEVICE

WHY BIOMETRIC IDENTITY VERIFICATION Biometric cannot be faked, it cannot be forgotten as password ! It is secure for any spy software as there is no password ! Biometric Data cannot be shared between users ! Biometric Data cannot be used by unauthorized person ! User Identity can be verified with an undeniable precise ! Biometric Verification is faster than traditional methods ! Operational costs due to forgotten password are eliminated !

WHY PALMVEIN ? Practicality Precision Risk of Fraud Ownership Face Recognition Risk of Fraud Ownership Knowledge Biometrics To be transferred Yes No To be stolen To be forgotten To be copied To be lost To be altered Known methods Keys Tokens Smart card Password PIN “Selfie” Vein Irıs Finger Print Face Voice Key stroke High Voice Recognition Signature IRIS/Retina FingerPrint Finger Vein Practicality Low Low Precision High Sound Finger Print Face Recognition Iris Finger Vein Trace Palm Vein Trace False Acceptance Rate %0,01 %0,001 %1,3 %0,0001 %0,00001 False Rejection Rate %0,3 %0,1 %2,6 PalmSecure® is the only biometric technology with EAL 2 security certificate from Common Criteria

SERVER BASED BIOMETRIC MICROSOFT WINDOWS LOGON APPLICATION

Server Based Biometric Microsoft Windows Logon Application PRODUCTS BIOAFFIX® WINLOGON Server Based Biometric Microsoft Windows Logon Application AIM Prevention of the passwords to be forgotten, hijacked or shared! Elimination of the operational costs arising from changing or reset the password corresponding authorizing process! Prevention of potential data and money loss and also the costly judicial processes that may rise further ultimately! USAGE AREAS Biometric Windows Logon: Logon your Computer which is a member of Microsoft Active Directory Biometric Run As: Run the applications and authorized the users biometrically Biometric Remote Desktop: Connect Remote Desktop (RDP) via Biometric Biometric VPN: Connect Virtual Private Network (VPN) via Biometric

How Biometric Windows Login Works? PRODUCTS BIOAFFIX® WINLOGON How Biometric Windows Login Works? 1 Type your username on Windows Logon screen and click the “Login” button. 2 BioAffix WinLogon starts automatically and captures your biometric data. Login successful 4 Active Directory conducts the login process of the verified user. 3 Biometric data is sent securely to BioAffix Server which will contact with Active Directory at the end of the verification..

SERVER BASED BIOMETRIC IDENTITY VERIFICATION APPLICATION THAT CAN BE INTEGRATED TO APPLICATIONS

Theme Support PRODUCTS BIOAFFIX® APPLOGON BIOAFFIX® APPLOGON Server Based Biometric Identity Verification Application That Can be Integrated To Applications AIM Prevention of the passwords to be forgotten, hijacked or shared! Elimination of the operational costs arising from changing or reset the password corresponding authorizing process! Prevention of potential data and money loss and also the costly judicial processes that may rise further ultimately USAGE AREAS Web Site : Access All Of The Web Applications In A Fast and Secured Way Via Biometric Corporation Applications: Integrate The Biometric Identity Verification To Your Corporate Applications Easily Such As ERP, CRM & Banking Continuous Biometric Verification: Verify Your Users Continuously, End Their Session Automatically While You Are Not On The Computer Theme Support

PRODUCTS BIOAFFIX® APPLOGON How AppLogon Works? Login successful 1 Start the application which BioAffix AppLogon is integrated. Type your username and click the access button. 2 BioAffix AppLogon integrated to your application becomes automatically active and captures your biometric data Login successful 4 The identity verification result is notified to application server and session is opened biometrically. 3 Your biometric is sent securely to BioAffix Server and compared with your enrollment data.

PALM VEIN BASED BIOMETRIC SECURITY ACCESS CONTROL DEVICE

PALMSECURE PALMVEIN BASED BIOMETRIC TURNSTILE SYSTEM PRODUCTS BIOAFFIX® GATE TURNSTILE SYSTEM PALMSECURE PALMVEIN BASED BIOMETRIC TURNSTILE SYSTEM Video 2

BIOAFFIX SECURE PRINTING SOLUTION

PRODUCTS BIOAFFIX® PALMPRINT DEVICE SPECIFICATIONS AIM Unfortunately, card, PIN or fingerprint are not the real solutions due to the potential hygiene, security and also user-friendly issues. BioAffix PalmPrint, which is a Palm Vein based solution overcomes these issue and offers a unique security biometric solution for the global market. Instead of using card, pin, when you arrive to the printer, user simply read his palm onto the biometric device and after the identification of the person, printer logs him to his account. So user can print his documents securely. SPECTS Quad-Core High Frequency Processor (2.4GHz) 30GB SSD, 2GB RAM PalmSecure® Biometric Sensor or any other biometrics sensor Optional ELATEC Card Reader Integrated TPM(Trusted Platform Module) Mul-Sec® (Multi Layered Secure Communications) Supported HSM (Hardware Security Module) Multi-Lingual high quality sound notification 1:N(Up to 5.000), 1:1 (Card), Server based or stand alone working mode Visitor & Companion Modes Multiple Language Support Integration interface module (Web Service, Database, SysLog, Microsoft Active Directory(LDAP)) Secure Remote Diagnostic Connection Match in Device + Match in Server Modes Supports biometric template in card

PRODUCTS BIOAFFIX® PALMPRINT DEVICE SPECIFICATIONS

BIOAFFIX MANAGEMENT

PRODUCTS BIOAFFIX® MANAGEMENT CENTER MANAGEMENT APPLICATION

BIOAFFIX ONESERVER

PRODUCTS BIOAFFIX® ONESERVER SOFTWARE DIAGRAM

PRODUCTS BIOAFFIX® ONESERVER SECURE COMMUNICATIONS The communication between all BioAffix family products, especially biometric data transfer operations, is performed through the double layered SSL tunnel. This protocol of communication developed by Ones Technology and named as “Multi Layered Secure Communications (MulSec)” is secure against all known attacks.

PRODUCTS BIOAFFIX® ONESERVER INDEPENDENT OF BIOMETRIC TECHNOLOGY Palmvein Face Fingerprint IRIS Other Biometrics BioAffix family products can be adapted to all of the biometric technologies through its biometric integration interfaces and supports all of the technologies such as “Palm Vein Recognition”, “Face Recognition”, “Finger Print” ,”Iris Recognition”, etc.

Microsoft Active Directory PRODUCTS BIOAFFIX® ONESERVER EASY INTEGRATED Easy and fast integration thanks to Bioaffix ‘s Data Source Connection Interface LDAP Database Web Service Microsoft Active Directory

Thanks… v26.16.12.13.01