Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
News

Cross technology biometric identity management

ImageWare Systems : 10 September, 2007  (New Product)
Identity management software combines information from multiple biometric technologies for identity confirmation.
ImageWare Systems has exhibited its next generation biometric identity management solutions at the 2007 Biometrics Technology Expo held in conjunction with the Biometric Consortium Conference at the Baltimore Convention Center in Baltimore, Maryland.

ImageWare's next generation biometric identity management solutions are based on its award-winning IWS Biometric Engine, a biometric identity management platform for multi-biometric searching and matching that is scalable, technology agnostic and allows organisations to manage population databases of unlimited sizes. The IWS Biometric Engine's multi-biometric enrollment, management and authentication platform allows users to search and match tens of millions of biometrics for identity confirmation. Searches can be 1:1 (verification), 1:N (identification), X:N (investigative) and N:N (enrollment integrity).

ImageWare's IWS Biometric Engine products provide government, law enforcement, border management and enterprise businesses with a wide variety of application-specific solutions that address specific government mandates and technology standards. It also provides the ability to integrate into existing legacy systems and expand based upon customer requirements. The new application suite of products include complete packaged solutions for:

* HSPD-12 Personal Identity Verification (PIV)
* Automated Fingerprint Identification System (AFIS)
* Border Management
* ePassport & eVisa
* Applicant Identity Vetting
* Mobile Acquisition
* Disaster Management
* Physical Access Control
* Single-Sign-On and Logical Access Control
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com