Facial Recognition for Access Control

Slides:



Advertisements
Similar presentations
Access Control with Advanced Facial Recognition Technology The Face ID 3 gives users a contactless and hassle-free verification option. SALES TRAINING|
Advertisements

WELCOME Keyscans Access Control KIMA SECURITY INC.
2014/6/2 Giga-Tms 1 The latest Biometric Technology.
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
BioScrypt (OVP) 4G Lite Series
HID Global Corporate Overview Natacha Jaramillo Regional Sales Manager (Latin America) September 2014 Presentation Title Slide.
[Nom du produit] When it prints, you’re impressed Product Presentation.
Farpointe Data Inc The #1 Independent Reader & Credential Manufacturer!
(Biometrics Consortium)
Morpho Introduction  40 years of focused world-class experience  World’s largest install base  Most industries & toughest environments  Consistently.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
PALM VEIN TECHNOLOGY.
School Management Software
Biometrics and Authentication Shivani Kirubanandan.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Intercard The Right System March 6, 2012 Alberto Borrero Vice-President, Int´l Marketing & Sales Intercard Mobile: Skype: aborrero
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
Lenel OnGuard and Bioscrypt V-Smart
ET3100 BioFlex TimeClock. What is fingerprint scanning?  It is a pattern acquisition and recognition established on a person’s.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Common Proximity Card.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Authentication Approaches over Internet Jia Li
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
Profile Series v.S1 Intelligent Power over Ethernet Access Control Solution With the power of iCLASS.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
The SMARTair Story 1 This is not a presentation about what SMARTair is… 2 What is SMARTair???
® Features and Benefits V3.1. TurboTag ® Features Temperature logger size of credit card Uses RFID reading protocols with EPC product codes More accurate.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
1 NexSentry 4100 Series Controllers Secure, reliable, fast control with 32-bit technology.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Copyright © 2008 FingerTec Worldwide Limited. All rights reserved
Stone Lock ® Pro Facial Recognition for Access Control TM.
Facial Recognition for Access Control
TM © Stone Lock Global, Inc. Stone Lock ® Pro Facial Recognition for Access Control.
Face Recognition Technology By Catherine jenni christy.M.sc.
1/2015 SE LP10 multiCLASS SE ® Integrated Wiegand Access Control Solution Sold through :Installed by:
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
COSEC ARC IP based Access Control Panel.
Key features of version 2.0 Personalised dashboard Wireless locks
FACE RECOGNITION TECHNOLOGY
OFFLine Solution
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Biometric Security Palm Vein Technology
The Evolution of Money and Biometrics
Biometrics.
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
MWS9943.
2N Access Unit 2.0 Multi-technology access control readers.
Presentation transcript:

Facial Recognition for Access Control Stone Lock® Pro Facial Recognition for Access Control TM

Stone Lock® Pro- Rapid, Reliable Confirmation of Identity Ideal For Access Control A frictionless, intuitive, user-friendly experience   Fast, accurate, reliable and secure  Proven to meet the most stringent security requirements  How Stone Lock® Pro Works Merely approaching the faceplate triggers activation, with no contact and minimal effort Stone Lock® Pro projects near-infrared (NIR) wavelengths and then measures the over 200o points of reflectivity confirming identity within 1 second Authentication occurs independent of ambient light (0-6000 Lx)   Faceplate Control Unit The Ultimate in Security + Convenience!

Attributes – FAST! Stone Lock® Pro is FAST! Supports high through-put ~1 second per user authentication Stone Lock® Pro scans a user multiple times a second working to eliminate false rejections Initial enrollment of the biometric profile takes less than 15 seconds and you only have to enroll once Provides instant, highly accurate authentication Stone Lock® Pro is FAST!

STONE LOCK® PRO A secure, frictionless biometric for access control

Attributes – ACCURATE! Stone Lock® Pro is ACCURATE! FAR 1/250k (0.0004%) Stone Lock® Pro measures and maps over 2000 points on a user’s face Proprietary algorithm, firmware and hardware Easily distinguishes between facial expressions Correctly identifies identical twins Stone Lock® Pro is ACCURATE!

Advantages of Near Infrared Near-infrared wavelengths are safe, invisible to the eye, and relatively unaffected by ambient light or temperature Infrared wavelengths penetrate biological tissue almost 7x visible light, allowing for measurement of sub dermal spectroscopic features Infrared is ideal for capturing the intrinsic properties of a face: shape, reflectivity, and expression; while minimizing the unfavorable characteristics of extrinsic factors, such as ambient illumination or mis-alignment Wall Infrared biometric performance factors are ideal for access control, overcoming problems associated with measuring visible light.

Attributes – FIELD PROVEN! Field proven as a reliable solution for the most critical access control demands including; Data centers Biotech/Pharmaceutical Labs Bank cash vaults Commercial/Industrial Facilities Healthcare Luxury apartments / smart homes Over 2,000 Global Installations

General Tech Specs Impact Sensitivity Settings Ambient Light Range Capacity Single Unit - 1,000 1:N profiles - 10,000 1:1 profiles - 300,000 maximum stored records Networked – 1:1 no limit Requires LAN server (additional considerations apply) Integrations supported C•CURE 9000- v.2.20, 2.30, 2.40 OnGuard v. 6.6 & 7.2 Pro-Watch v. 4.2 Symmetry- v. 8.0.1 Security Center- v. 5.3 SR1 Enrollment Time Approximately 15 seconds per user False Acceptance Rate FAR: Better than 1 in a quarter million (1/250,000) (0.0004%) Connectivity: Wiegand / 485 / USB / Cat5/Cat5e/Cat6 Ethernet 2 Form C Contacts Card Reader - HID iClass SE Reader - Supports MIFARE Classic®, MIFARE DESFire® 0.6, MIFARE DESFire® EV1,HID: iCLASS® Standard/SE/SR/Seos; PIV II, Secure Identity Object™ (SIO) & 35 Bit Corporate 1000, 37 bit and 37 bit Infinity Card Formats-all formats are elite key configurable Impact Sensitivity Settings Low – alarm triggered at 300Hz vibration Medium – alarm triggered by a 100Hz vibration High – alarm triggered by a 40Hz vibration Ambient Light Range 0-6000 Lx Temperature -25°c – 55°c (-10°f-130°f) Moisture 20% RH – 95% RH

Questions Stone Lock® Pro www.stonelockpro.com