Specifications

FIELDMARSHAL INTEGRATED SECURITY SERVICES
13
FCC certified
GSA - GS-24-F-1008B
DHS Approved Equipment List
ACCESS CONTROLS
Sys-BioAccess - Access
control with biometrical
authentication
1. Biometrical applications
Applications and possibilities to interact with other systems are nomally useful in
the following contest:
Access control to dedicated areas
User certification
Network and computer security
Biometrical recognition methods
Retina recognition
It is based on the acquisition and the verification of the human eye vascular map.
Iris recognition
This method is, so far, one of the most precise methods available. It’s not affected
by external problems niether subject to restrictions as a result of external or inner
factors. No matter if someone is drug addicted, wearing contact lenses or affected
by glaucoma, he can be easily identified.
Fingerprints recognition
This is a widely applied method wich benefits from the continuous development of
the solid state sensors.
Palm recognition
Precise enough, this method is based on the shape and precise size analysis of
the hand
Face and voice
Thsi method is frecquently used.
The SYS-BioMetric system
The solution is based on the optical iris reading and the authentication process
management with a particular software application installed on a PC located in a
safety area.
The software was developed by TempestiniGroup in order to satisfy the system
requirements and faciliate the integration with the access gates automation
systems.
Biometric Facial Recognition
System
Objective analysis, evaluation and modification of facial images quality.
Images features assessment and optimization within the International
standards.
Setting: The image quality is decisive for the biometric recognition.
The individuals’ facial images allows for quick and accurate recognition this is
the reason why these images are included in official documents all over the world.
The electronic passport the new International passport also includes, a a photo
digital identification of the subject.
Facial images used in the facial biometrics recognition process must comply with
specific quality standards. The machines’ Images and characteristics must be
objectively verified and optimized based on objective international standards ,
excluding all subjective criteria. The same requirements also apply to other
electronic documents, such as the driving license and recognition/identity card.
NEC’s experience in facial biometrics field, gained in over 30 years, as well as the
fingerprint recognition, delivers solution of an extremely high professionalism in
response to these new and complex issues. QTF solution is also available in SDK
version, ensuring flexibility in the creation of a customized application on a
personal requirements basis.
Procedure
A 3-step process for the modification for the rendering of images compatible with
the biometric identification.
Facial images are analyzed and optimized by the system accordingly to the
standard ISO 19794-5, which states the facial images’ geometry and the setting
requirements.
Digital facial images are processed in 3-step..
!
Wireless RF Biometric Access
Control
Highly Secure Access System Upgrade and Expansion
Features & Benefits:
Flexible and secure access control solution offering integrated or standalone
security.
Biometric fingerprint security eliminates identity fraud and cannot be stolen,
forged or forgotten.
Wireless operation for maximum flexibility and hassle-free installation.
Flexible RF communications allow for multi-receiver activation.
Multiple receivers allow for increased functionality and multi-site utilisation.
Save time and improve productivity with a one-off enrolment and simple
subsequent identity checks.