image recognitions iris recognition voice … recognitions iris recognition voice recoognition...

4
Biometric Security Solutions Portfolio Innovation | Collaboration | Evolution | Results Image Recognitions Iris Recognition Voice Recoognition Credit Card Capture

Upload: dangdieu

Post on 11-Mar-2018

229 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Image Recognitions Iris Recognition Voice … Recognitions Iris Recognition Voice Recoognition Credit Card Capture SOFTEL Communications – Complete Biometric Security Solutions Portfolio

Bio

metr

ic S

ecu

rity

So

lutio

ns

Po

rtfo

lio

Innovation | Collaboration | Evolution | Results

Image Recognitions Iris Recognition

Voice Recoognition Credit Card Capture

Page 2: Image Recognitions Iris Recognition Voice … Recognitions Iris Recognition Voice Recoognition Credit Card Capture SOFTEL Communications – Complete Biometric Security Solutions Portfolio

SOFTEL Communications – Complete Biometric Security Solutions Portfolio

Many business facilities and security organizations are taking advantage of the latest developments in

biometric security systems. These core systems drive security through scanning and identification providing

the best methods for protecting property and the people that are part of the organization. Developed

Biometric systems, based on security requirements, maintain unique characteristics of individuals, ensuring

high levels of secure identification. SOFTEL's experience in both Biometrics and secured systems provides

the perfect blend of innovation and collaboration delivering enhanced security for enterprises.

SOFTEL has developed many vertical market applications in this expanding area of authentication technology. Biometric security is the unique

representation of an individual's characteristics such as a person's voiceprint, facial image, or fingerprint. These forms of identification provide

cost effective, reliable, and secure multifactor authentication. They can be used with mobile speech, smartphone security access, or

photographic applications as well as in emerging multi-channel environments such as WebRTC platforms and Microsoft Skype for Business

applications. The core technologies, operating systems, authentication methods, and access rules are held separately from endpoint devices

ensuring remote security is maintained and can be centrally administered. From smartphone app devices, through facilities management

security devices to logistics, banking and healthcare devices, Biometric security is fast becoming the preferred method for identification,

authentication, access, and security through innovations within the Internet of Things (IoT).

When combining these disparate, remote methods into an enterprise platform, SOFTEL works with their technology partners to provide

robust Biometric security systems which provide 99.9% lock-out security and 97% first-time access for end users/requestors.

SOFTEL Biometric Security Solutions

Business Partners

Enrolment

Capture

Transmission

Authentication

Access

Page 3: Image Recognitions Iris Recognition Voice … Recognitions Iris Recognition Voice Recoognition Credit Card Capture SOFTEL Communications – Complete Biometric Security Solutions Portfolio

Devices and Endpoints

Devices and endpoints for Biometric security are only limited by the means to provide accessibility to the authentication method. Whether

in-line with Smartphone devices which cater for a multitude of methods or offline, through interfacing technology methods, SOFTEL provides

the means to bring state-of-the-art biometric authentication to almost any on-line system or process.

SMARTPHONES | WEARABLE TECHNOLOGY | IOT & FACILITIES | IOT & LOGISTICS | IOT & SECURITY

Capture Methods

The means to capture any number of image-related authentications is possible with Smartphone devices where image matching on a remote

service can be applied. Coupled with this is the device’s on-board authentication methods which can be leveraged and extended to an

enterprise solution. IoT devices, peripherals, and physical device add-ons can provide connected methods of authentication.

BIOMETRIC | TELEMETRIC | IMAGE CAPTURE | PIN/PASSCODE | LOCATION-SPECIFIC

Transmission Method and Security

Secure transmission and receipt of authentication protocols for Smartphones is achieved through standardised Internet and data

authentication protocols, separated from the end device’s local authentication methods. This means centralised control and access can be

administered remotely, for any device. IoT devices require a remote service solution, peripheral to local authentication methods.

HTTPS | S-FTP | TLS | WEP | WPA

Access Security

Secure transmission and receipt of authentication protocols for Smartphones is achieved through a standardised Internet and data

authentication protocols, separated from the end device’s local authentication methods. This means centralised control and access can be

administered remotely, for any device. IoT devices require a remote service solution, peripheral to local authentication methods

AUTHENTICATION | ACCESS | RESTRICTIONS | USER BASED ADMINISTRATION

Smartphone

Devices iOS and Android

IoT Web TCP/IP, HTTPS, WebRTC, SDK, middleware interoperability (AS400/VAX, etc.)

Smartphone

Devices Swipe patterns, retina, facial, fingerprint, voiceprint, photo capture, and location

IoT PIN, passcode, stand-alone scanners, and readers

Smartphones

Devices Device protocol to device, device service to device, device-only

IoT Device service to device

Enterprise

Solutions LDAP/Active Directory, RSA SecureID, LAN/WAN/GAN

Commercial

Solutions Cloud authentication services, pass-through services, turnkey solutions

Innovation | Collaboration | Evolution | Results

Page 4: Image Recognitions Iris Recognition Voice … Recognitions Iris Recognition Voice Recoognition Credit Card Capture SOFTEL Communications – Complete Biometric Security Solutions Portfolio

Biometric Authentication Processing

Enrolment is the initialization of Biometric security method begins with a verified capture, using standard identification methods. Once initiated,

the method of identification is held in a remote, secure, and centralized location.

Capture of the subsequent access requests are conducted using the Biometric method, with standard identification procedures as a secondary

(back-up). In the majority of cases, this results in a specific data package being secured locally, ready for transmission.

Transmission of the data package is identified and secured prior to transmission to a centralized location.

Authentication is the validation of the data package, through comparison with the requestor’s Enrolment version is conducted remotely.

Access is a pre-defined series of actions for access that are transmitted back to the requestor’s device, enabling local access or operation.

Why SOFTEL Biometric Security Solutions? SOFTEL has been providing and supporting solutions and services to business enterprises for over two decades. Working in sectors as diverse

as Finance, Health Care, Retail, Utilities and Transportation, our knowledge of security through Biometrics has benefitted dozens of leading

global organizations who operate complex technologies. Coupled with our experience in enterprise environments, SOFTEL provides a

professional, front-line service. We understand the bottom line. Biometric level security is paramount to the security of an organization.

System failures or authentication issues are expensive to resolve. With industry level delivery methodology, SOFTEL’s Biometric Security

Solutions offer superior solution delivery and attention to detail. We are dedicated to providing a fully encompassing solution delivery service

with our technology partners, while minimizing the impacts to business operations. From single to multiple application implementations,

across platforms, solutions, environments, and technologies, SOFTEL supplies, manages, delivers, and supports Biometric Security Solutions

in the present, viable for the future.

SOFTEL is passionate about providing Best in Class Biometric Security Solutions & Services to your Enterprise

Operations. To find out more about our unique Solutions & Service Packages, contact us today;

© SOFTEL Communications 2015

Enrolment Capture Access RulesInitialization

Transmission� � � � � �

Centralized Authentication� �

Access� � � � � �