16
www.identytech.com IDENTIFICATION MANAGEMENT SOLUTIONS

IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

www.identytech.com

IDENTIFICATION MANAGEMENT SOLUTIONS

Page 2: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

iDentytech Solutions™ incorporates an R&D center

provides worldwide service with best-in-class complete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched platform of next generation technology suites to our clients.

Available in a modular manner, the IDT™ platform offers interoperability and ease of use, integrating the industry’s best performing cameras, sensors and algorithms. All IDT™ readers are offered in a rugged yet elegant design, with the industry’s required interfaces, enhanced security and convenience, private labeling and other custom options.

Our IDT™ line of biometric readers incorporate precision Multi-Spectral Imaging Fingerprint, Deep Learning Facial Recognition, Iris, Voice and Palm Vein - sensing technologies into an ergonomic computer peripheral that deliver unparalleled performance, reliability and convenience.reliability and convenience.

iDentytech Solutions™ is a global leading providerof intuitive biometric identity management products and solutions.

WHAT WE DO?

WHO WE ARE

Page 3: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

OUR BUSINESS PARTNERS

OUR INTEGRATION PARTNERS

OUR TECHNOLOGY PARTNERS

OUR CLIENTS

OUR CERTIFICATIONS

Page 4: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

PETAH-TIKVA, ISRAEL

Interoperability

The iDentytech Solutions™ platform easily operates with the market leading C4I technologies. Seamless integration of multiple types of hardware and software is easily achieved.

In-house R&D

The iDentytech Solutions™ products and solutions are developed in house. Our team designs the readers, the electronics, and the cables and writes the software, both embedded and on the PC/Server side.

integrated. All international and local government approved technologies.

The iDentytech Solutions™ platform is an end to end solution allowing its partners and customers to scale the projects according to their security needs and available budget.

Open Modular Platforms

MIAMI, FLORIDA USAEMEA/RESEARCH

& DEVELOPMENT

USA, AMERICAS& THE CARIBBEAN

WHERE WE ARE

WHAT WE OFFER

Page 5: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

• Fingerprint Recognition

• PalmVein Recognition

• Facial Recognition

• Iris Recognition

• State of the Art Systems

• Next Generation Analytic

• Global and Local Partnerships

• Virtual Patrol/Tours• Integrated Technology with Security

• Virtual Access Control

Access Control

Video Surveillance

Unified Platform

Virtual Access Control

• Integration with existing platforms or other systems

• World renowned platform

• Engineering Solution Management

Page 6: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

and clean for it to work like you want to!

the smartphone or computer that its actually you and not someone else.

if you or your employees work in an environment that makeshaving clean and dry hands near impossible? How are you supposed to verify their identity while still using biometric security to protect your business?

problems that conventional imaging systems have in less-than-ideal conditions. The core problem was

sensor, a condition that is elusive in the real world.

MULTI-SPECTRAL IMAGING - SEEING BEYOND THE SURFACE

can see the difference in these images

WET

FIN

GER

PRIN

TS

DIRT

Y FI

NG

ERPR

INTS

FINGERPRINT IDENTIFICATION

Page 7: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

The effective solution was based on using multiple spectrums of light and advanced polarization techniques to

detection

Multi-Spectral imaging looks at and beyond the skin

ridges. Different wavelengths of visible light interact with the skin in different ways, enabling

pattern on the surface echoes the subsurface structures from which they arose during development.

Multi-Spectral imaging exploits the dependent

patterns; subsurface data collected by multispectral imaging technology supports and augments surface data

Wet conditions - Coastal/humid regions, sweaty

Dirt conditions - Dusty regions (in rural and urban

Dry conditions -of construction workers and farmers

Variable pressure/contact - Common with children, the elderly

Bright light conditions - Outdoor data collection under bright sunlight.

We SUCCEED where others FAIL

HOW DOES IT WORK?

CAPTURING IN REAL-WORLD CONDITIONS

Page 8: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

IDT Wallmount™

IDT Access™

IDT Jet™

IDT Onyx™

IDT Gate™

IDT Nano FP™

IDT T&A FP™

Function memory capabilities

Integration with Secure IO controller.

Easy installation kit

Support for 13.56Mhz iCLASS SE/SEOS, Mifare (full-range) smart cards, and 125Khz Prox Point card/Tags

Critical information and communication secured and encrypted

sensor :1 : 10,000 templates Reader based expandable to 1 : 100,000 templates1 : 1 up to 1,000,000 templates

PIN - Reader or PC/server based

IP65-rated, robust design with anti-vandal casing

On board relay unit, USB host.Power sources: power supply, PoE, and battery

TCP/IP, RS-232, and RS-485

Wiegand IN/OUT (26bit up to 1024bit)Door status, Fire alarm, Request exit button, breaking glass inputs

2 factor Access Control Reader

identification and Proximity/Smart Card authentication

3 factor Access Control Reader

Proximity/Smart card authentication and PIN code 3.5” touch screenInternal 5mp camera

2 factor Access Control Reader

and Proximity/Smart Card authentication

2 factor Access Control Reader

and Proximity/Smart Card authentication

2 factor Access Control Reader

and Proximity/Smart Card authentication

2 factor Access Control Reader

and Proximity/Smart card authentication

Time & Attendance terminal2 factor Access Control Reader

and Proximity/Smart card authentication

FINGERPRINT TERMINALS

FEATURES THAT MAKE A DIFFERENCE

Page 9: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

hands were other people have been. These reasons could be personal, such as the dislike of germs, or even religious. There are industries that require sterilized work environment, and again touching a biometric sensor is not convenient.But what if you could present your hand to a sensor and without touching it, your biometric palm vein map could be read?

This is a biometric technology that authenticates users on the basis

more security and ease of use and overcomes previous problems related to security concerns.

The PalmVein™ sensor is a biometric authentication device that provides the highest level of security using palm vein authentication technology, that is now able to be used in a wide range of situations thanks to reductions in size, reductions in cost, and

PALMVEIN PATTERN – CONTACTLESS VEIN AUTHENTICATION

through a user’s palm veins. This causes an image of the palm to be captured as a vein pattern, which

computer network.

PALM VEIN IDENTIFICATION

HOW DOES IT WORK?

Page 10: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

Contactless

Because of its contactless feature, it is very hygienic and stress free for even public use.

High security & applicability rate

body. Almost everyone can use it. The only system at the market that gives 100% of ability to enroll.

Easy to use

Just hold your palm over the device, it captures your vein pattern instantly. Will operate with all genders and ages.

Authentication accuracy

The palm vein authentication performs advanced authentication accuracy because the palm vein pattern has many and large size of blood vessels. False Rejection Rate: 0.01%, False Acceptance Rate: 0.00008%

Advanced algorithm

The algorithm creates a several tens of thousands of Minutia points, encrypting each image before

ADVANTAGES

Page 11: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

IDT Sapphire™

IDT Jade™2 factor Access Control Reader

and Proximity/Smart Card authentication

Function memory capabilities

Easy installation kit

IDT Nano PS™

IDT T&A PS™

IP65-rated, robust design with anti-vandal casing

Integration with Secure IO controller

Power sources: power supply, PoE, and battery

On board relay unit, USB host

TCP/IP, RS-232, and RS-485

Door status, Fire alarm, Request exit button, breaking glass inputs

Support for 13.56Mhz iCLASS SE/SEOS, Mifare (full-range) smart cards, and 125Khz Prox Point card/Tags

Critical information and communication secured and encrypted

PalmVein sensor:1 : 10,000 templates Reader or PC/Server based expandable to 1 : 20,000 templates.1 : 1 up to 500,000 templates

PIN - Reader or PC/server based

Wiegand IN/OUT (26bit up to 1024bit)

3 factor Access Control Reader

Proximity/Smart card authentication and PIN code 3.5” touch screenInternal 5mp camera

2 factor Access Control Reader

and Proximity/Smart card authentication

Time & Attendance terminal2 factor Access Control Reader

and Proximity/Smart card authentication3.5” touch screen

PALM VEIN TERMINALS

FEATURES THAT MAKE A DIFFERENCE

Page 12: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

Today most people are accustomed to having cameras or CCTV

accompanied by some sort of networked video recording (NVR) device that keeps video logs of everything happening on yourproperty.

Whenever you or your company need to, you can access this video log and watch recordings of events that have taken place in front

be able to use your recordings to identify an antagonist and use the recordings as evidence of this person’s wrong-doing against you.

But these recordings can only help you after the incident, not during. And if you have multiple cameras in

to piece together the incident narrative. What a chore!

coming onto your company premises? Or what about a home invader – using your system to intelligently track this invader as they move throughout your home, being able to report out exactly where they are to authorities, will that make a difference?

This is what Facial Recognition technology is all about, it can help prevent your antagonist from completing their wrong deeds in your place – saving you and your company from wasting precious time and resources on post-incident recuperations and hassles. Using facial recognition technology combined with your customized Black list, you can rest assured that you and your property are protected in real-time, giving you the ultimate inbiometric securitypeace of mind.

FACIAL RECOGNITION – BIOMETRIC SECURITY PEACE OF MIND

FACIAL RECOGNITION IDENTIFICATION

recognition!

Page 13: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

Illumination Correction

Pose Correction

Diffuse the lightning across the face

Removing hot spots and optic issues

The IDT GateKeeper™ Platform is a facial recognition software

and accurateprocessing of faces from

images, videos and live streams.

THE GATEKEEPER™FACE PIPELINE INCLUDES SEVERAL KEY MODULES

ENHANCEMENT OF DETECTED FACES

Face detection

Face alignment

Facial descriptor extraction

Face matching

Video Management

Real Time monitoring and Tracking

Optimized Memory handling

Extensive multi-threading

High performance of all modules

IDT GATEKEEPER™ PLATFORM

Page 14: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

iDentytech Solutions™ management software platform provides interfaces and operational uses with different technology partners to allow a fully encompassing security solution. Technology leaders that make some of the best advanced security systems in the world partner with us.

IdentyManage™to provide a whole range of enterprise wide solutions using the best in class access control and surveillance technology.

Among its many features, the IdentyManage™ provides you with an integrated Multi-Biometrics

the information.

IdentyManage™ between modalities.

UNIFIED MANAGEMENT PLATFORM

Page 15: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

The IdentyManage™ app provides you with the ability to control all aspects of physical security (access control) and surveillance inside of one software interface. By combining multiple technologies under one “roof” we are able to increase the effectiveness of real-time monitoring by associating cameras to access control points to clearly monitor the security of the facility or building.

MOBILE APPLICATION

Page 16: IDENTIFICATION MANAGEMENT SOLUTIONScomplete identity management solutions. With top tier engineers accompanied by an international executive team, we are able to present an unmatched

iDentyTech Solutions America Inc.

8725 NW 18th Terrace, Suite 105Miami, FL 33172 USA

[email protected]

Office: +1 813 336 5150Toll Free: +1 888 703 7150