S.I.C. Business Develops and integrates high-end fingerprint biometric solutions Corporate and government applications: - High-security identification.

Slides:



Advertisements
Similar presentations
Access Control with Advanced Facial Recognition Technology The Face ID 3 gives users a contactless and hassle-free verification option. SALES TRAINING|
Advertisements

California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
SYNAPSE I.S. Ticket Sales & Management. SYNAPSE I.S. What is Olympia ? Olympia is NOT just another internet sales service. Olympia is a tool for the ticketing.
RFID Access Control System March, 2003 Softrónica.
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
BioScrypt (OVP) 4G Lite Series
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
Access Control Line Up Samsung Techwin Europe Ltd.
CONDO MANAGER The Leader in Association Accounting and Management Software Mailing Address: P.O. Box Charlotte, North Carolina Web Site
CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001.
We make it easier for businesses of all sizes to safely accept checks transmodus offers clients automation utilizing our online processing platform for.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
CM-707 Standalone Fingerprint Access Control System CM -707 is biometrics fingerprint recognition standalone access control system.It can store up to 800,1500.
WHY POS?  Streamline operations  Track inventory  Control cash  Spend more time with your customers  Increase your profitability The easiest way.
PALM VEIN TECHNOLOGY.
LP 400. General Issues faced by Business Organizations:  Attendance Proxy through “buddy punching”  Errors when computing time  Cost of paper time.
Biometrics and Authentication Shivani Kirubanandan.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Confidential Document 1 EverAccess Product Overview By Julian Garcia.
Intercard The Right System March 6, 2012 Alberto Borrero Vice-President, Int´l Marketing & Sales Intercard Mobile: Skype: aborrero
GE job title/1 GE internal information - Not for external distribution 1 GE Security EMEA BioScrypt Bio 4G Biometric FingerPrint readers of the newest.
HOW TO SELL HARBORTOUCH AND MAKE MONEY.  Devalued terminal market creates opportunities in valued POS market  Higher acquisition cost and market saturation.
Motor Control Center MNS iS with Condition Monitoring
ET3100 BioFlex TimeClock. What is fingerprint scanning?  It is a pattern acquisition and recognition established on a person’s.
REMOTE SITE MANAGEMENT SOLUTION. AGENDA 2  About KoçSistem  Current Situation in Base Stations  Remote Site Management System: Sitelink  Sitelink.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Truly Powerful. Flexibility, Scalability, Reliability User Friendly Software  Predefined parameters  Scaled down for easy admin  Personalised reporting.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
1 Sales Academy Training Inner Range Product Advantages, Competitors & The Future.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
ACCESS CONTROL ExpansE - Distributed Access Control.
1 The Networked Transaction Environment. 2 Blackboard’s Product Strategy Leading institutions are wiring their campuses to connect people and resources.
How to Sell T-Link TL250/300. T-Link Internet & Network Alarm Communicators Internet alarm communications for multi-branch Financial Institutions, Governments,
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Target Market: High Level Enterprise Description: The Flagship system for large enterprises allowing customised integration. Applications: The IXP400i.
Confidential Document 1 EverAccess Product Overview By Rodney Guinto.
Controlsoft have 25 years experience in the development, manufacture and distribution of Access Control Solutions. With over 10,000 systems in daily use.
Access Control Hardware IXP20TOUCH System Controllers iTRT Door Controller 125kHz Antenna Readers FINGKEY Access Plus I mpro provide a wide.
CompactLogix Controllers Portfolio
PROPRIETARY INFORMATION - © 2015 WOODWARD, INC. PAGE 1 HighPROTEC-2 MRI4-2 Feeder Relay Sales presentation 2015/08/10.
LOGO Electronic Volume Converter TZ, PTZ ”Flougas-T”
enterprise Software Solutions Lab Pvt Ltd
Biometric Time & Attendance Solutions + Access Control
Nexbase Invites You To Our Special Products
2N® Access Commander New features of the upcoming versions
Reference Sites about US. Reference Sites about US.
COSEC ARC IP based Access Control Panel.
Matrix Video Surveillance Solution for Banking
2N® Access Unit Bluetooth
2N® Access Unit Touch Keypad
2N® Access Unit Fingerprint reader
FACE RECOGNITION TECHNOLOGY
KeyGuard Key Management System
IP-AK2 Access Control Solution
StorFly-IES Intelligent External Storage for Industrial-IoT ®
Biometric Security Palm Vein Technology
2N® Access Unit Touch Keypad
WELCOME!.
Matrix Video Surveillance Solution for Manufacutring Industry
【Date: 】
Designed for powerful live monitoring of larger installations
X7– Fingerprint Access Control terminal
Presentation transcript:

S.I.C. Business Develops and integrates high-end fingerprint biometric solutions Corporate and government applications: - High-security identification - Finance and banking transactions (ATMs) - Physical access control (High secured assets) - Custom and immigration - etc...

The mission of S.I.C. Biometrics Inc is to conceive, assemble and market biometric solutions which are characterized by their facility of use, their reliability, their flexibility while being at a competitive price and at the greatest satisfaction of the customer. Our Mission Winner of the best security product in Canada

2000 : Launch Market analysis R&D « Cobra » product line 2001: R&D Technological platform (T.E.S.S.) 2003: Implementation of the initial distribution network 2004: Pre commercialisation America and Europe Finalising T.E.S.S. development Addition of value added features 2005: Proactive commercialisation, Canada, Mexico and France Pre commercialisation in U.S.A. Financing History

40% growth for the next 4 years Source: copyright 2004 IBG (International Biometric Group) Global Biometric Market ( Billion US$)

Biometric Market Description Source: copyright 2004 IBG (International Biometric Group)

Market Positioning Judiciary AFIS compliant Limited to Criminal market High end corporate class Excellent growth Higher margins S.I.C. Low end mass market Capacitive technology High volume Low margins

Priority Market Major Account & Government Target sectors Finance & Banking Petrochemical Transportation Utilities, Gas, Hydro Biotech Telecom Government Agencies Defense Treasury Technology & Information Health Law Enforcement Major Account short term revenues, higher margins Government Medium term revenues, high volume

Details area Minutiae points Conversion in numeric file … Fast and precise S.I.C. Technology

Reader models* Contact surface : Tempered glass Housing material : Machined aluminium Indicator : Tri-color LED and buzzer Operation temperature : -30°C to 50°C Power : 9 to 48V DC DC) Type of communication : RS-485, RS-232, TCPIP, Wiegand, PS-2, S.I.C. X-Protocol (Hi-security) Weatherproof Recessed Display Input Keypad & Display * Many combinations can be done Auto ID

Automatic finger reading. Local buffer of events bits Wiegand, RS-232, Dry contact, PS-2, X-Protocol Output. Method of comparison 1 to many. Identification time 2 seconds on 500 fingers. Caméléon Auto ID Use the full power of biometrics

Caméléon with Keypad (& Display) Capacity of fingerprint templates Local buffer of events Pin number 1 to 4 digits. Method of comparison 1 to 1 Verification time 2 seconds Use the full power of biometrics 3-50 bits Wiegand, RS-232, Dry contact, PS-2, X-Protocol Output

Caméléon with Input Capacity of fingerprint templates Local buffer of events 3-50 bits Wiegand, RS-232, Dry contact, PS-2 Input Method of comparison 1 to 1 Verification time 2 seconds Use the full power of biometrics 3-50 bits Wiegand, RS-232, Dry contact, PS-2, X-Protocol Output

Capacity of fingerprint templates Local buffer of events Available in Indoor model Result displayed Caméléon with Display Events exporter software module available Use the full power of biometrics 3-50 bits Wiegand, RS-232, dry contact, PS-2, X-Protocol Output

Available for every models (except display) Operating temperature : -30°C to 50°C Cover retained on three sides Openning tamper switch Caméléon Weatherproof 3 million cycles kepad, U.V. resistant Use the full power of biometrics 100% humidity resistant

Recognitions Compliant to CE, FCC, IP 65 Dealer’s Choice Award 2002 and 2003

Disruptive Uniqueness Highest level of security and accuracy - Higher security detection: F.A.R. (False Acceptance Rate) of 1/ F.R.R. (False Rejection Rate) of 1/ Interoperability - The most flexible interface in the industry allows incomparable interoperability with existing systems regardless of type and brand. Scalability - Our solution can scale and maintain an unmatched response time of 0.7 seconds for users per reader! Coupled with a capacity of several thousand readers up to an unlimited number of users. - Components are both autonomous and platform-controlled to continue working in a failing environment. - Architecture with no single point of failure.

Wiegand RS-232 PS-2 Dry Contact TTL RS-485 S.I.C. X-Protocol Multi- Protocol Interface Readers Specifications TCP-IP, RS-232, RS-485, Wi-Fi* 9-48v DC Up to 96 Minutiae Points Fingers Optical Sensor Operating Temperature -20 °F to 120°F Anti Vandalism Aluminum Housing ID Engine Specifications TCP-IP, RS-485, Wi-Fi* 120/240v AC Steel Enclosure Autonomous Database 1: Templates in 0.6 sec Fingers 1:N, Fingers 1:1 Product Specifications ID Engine Wi-Fi*, Q2,2006

Identification Process

Enrollment Process                   Creation of Encrypted or ANSI/INCITS Template Extraction Up To 96 Minutiae Points Finger Reading PROCESS Database Save in Database and/or Smartcard

S.I.C. Biometrics Platform Software Accessories Hardware O.E.M. Kits T.E.S.S. Platform

RS-485 IDENTIFICATION PROCESS Local Templates & Events Memories EQUIPMENTSAPPLICATIONS Access Control Transportation Time & Attendance Access Controller PLC Multi-Protocols Interface Chameleon S.I.C. Database Users & Readers Management Software Synchronize Readers       Enrollment & ID Readers Template ID Readers Protocol Converter Hub/Router LAN/WAN S.I.C. System Management

APPLICATIONS Cougar Local Users & Templates Database RS-485 TCP-IP P.O.S. A.T.M. ID Engine ID Engine ID Card S.I.C. Database Users & Readers Management Software Synchronize Readers & ID Engines       Enrollment & ID Readers Template ID Readers Hub/Router Cougar FINGER READING LAN/WAN IDENTIFICATION PROCESS S.I.C. System Management

S.I.C. Database IDENTIFICATION PROCESS Local Templates & Events Memories Local Users & Templates Database EQUIPMENTSAPPLICATIONS Access Control Transportation Time & Attendance Access Controller PLC RS-485 TCP-IP P.O.S. A.T.M. Users & Readers Management Software Synchronize Readers & ID Engines          Enrollment & ID Readers Template Protocol Converter ID Engine ID Engine Application’s Software Application’s Database Additional Users & Readers Management Software S.I.C. Dry Contact Module Smart Card Third Party SoftwareIdentification reader Chameleon Reader Smart Card Reader Smart Card ID Card Access Authorization Multi-Protocols Interface RS-485 Third Party Application’s System LAN/WAN S.I.C. System Management Cougar Chameleon ID Readers T.E.S.S. Platform FINGER READING Software Access Hub/Router

Biometric Systems The Basic Elements The Basic Elements - Enrolment - Database - Local - Central - Portable - Verification - Identification - Log of events © All Rights Reserved S.I.C. Biometrics

Access controller … Maximum of flexibility and security Access control application SImpleTouch software Caméléon readers Access control RS-232RS-485 Database Wiegand Protocol converter Enrollment reader Access control S.I.C. X-Protocol

Access controller Contrôle d’accès RS-232RS-485 PS-2 RS-232 X- Protocol Production Operations Applications SImpleTouch software Database Protocol converter Enrollment reader Caméléon readers … Maximum of flexibility and simplicity Applications Storage Time and attendance

Access controller Starter Kit SImpleTouch software Caméléon readers Access control RS-232RS-485 Database Wiegand Protocol converter Enrollment reader Access control S.I.C. X-Protocol

HardwareAccesoriesSoftwareTools Protocol converter Dry contact modules Wiegand converter S.I.C. X-Protocol SimpleTouch Network STNetwork Server STNetwork Light STN DB Back-Up STN DB Restore ST DB Transaction Cougar serie ID Engine Wiegand Analyser Caméléon T-Splice ST Events Report ST Logs Report ST Network ID Reader Unlock Communication.DLL Capture.DLL Caméléon Serie … Solutions for todays need T.E.S.S. Platform ST remote access

Programming Five small steps 1. Configurations 2. Readers 3. Users 4. Enrollment 5. Download SimpleTouch Network (98/ME/NT/2000/XP) Use the full power of biometrics

Programming Five small steps 1. Configurations 3. Users 4. Enrollment 5. Download SimpleTouch Network (98/ME/NT/2000/XP) 2. Readers Use the full power of biometrics

SimpleTouch Network (98/ME/NT/2000/XP) Use the full power of biometrics Programming Five small steps 1. Configurations 3. Users 4. Enrollment 5. Download 2. Readers

SimpleTouch Network (98/ME/NT/2000/XP) Use the full power of biometrics Programming Five small steps 1. Configurations 3. Users 4. Enrollment 5. Download 2. Readers

SimpleTouch Network (98/ME/NT/2000/XP) Use the full power of biometrics Programming Five small steps 1. Configurations 3. Users 4. Enrollment 5. Download 2. Readers

SimpleTouch Network (98/ME/NT/2000/XP) Use the full power of biometrics Programming Five small steps 1. Configurations 3. Users 4. Enrollment 5. Download 2. Readers

… simple et pratique SimpleTouch Network Events Report Salle des serveurs

FinancialCommercial Industrial CorporativeHospitalEducational Financial Industrial Hospital - Vault - Account Access - ATMs - Protected payments - Points of sale and terminals - Member’s identification - Inventory Physical Access - Time & Attendance – Entrance and employe’s room – Locker room –Computer room-Computer network access – e-commerce – Parking lots - Productions equipment - Parts store and warehouse - Hazardous products - Restrictive areas - Offices and rooms - Project time management - Sensitive computer files - Protected payment - Pharmacy and cabinets - Supplies room - Psychiatric’s department - Access to Personal Information - Cafeteria - Paper room - Equipment rental - Laboratories - R&D departments Target Sectors Target Sectors Anyplace where there is a significant benefit - Presence - PC/Network Residential - Common areas - Wine room - Parking & Garage - Swimming pool

- - Convenience - No recurring costs - No theft - No duplication - Nothing to lose or forget DuplicationTheftForgetLossRecurring Costs KeyXXXXX CardXXXXX CodeX-X-X Biometrics----- The advantages of using biometrics

Complete platform to design a custom system for your needs Low management costs in comparison with other methods Very high security level Flexibility of software and hardware integration Durable and reliable products; aluminium housing and tempered glass Completely weatherproof design Different models for different needs Why using S.I.C. readers Why using S.I.C. solutions No third parties, S.I.C. own all the T.E.S.S. platform R.O.I. < 12 months Maintenance free … Use the full power of biometrics

By using S.I.C. fingerprint readers, you do not have to worry about forgetting or loosing cards, keys or badges… Use the full power of biometrics

Just use your fingertip! Use the full power of biometrics