Bing Business Directory Identity & Security Management - Products

Identity & Security Management

Contactless Biometrics

Identity Assurance – Contactless Biometrics


Facial recognition algorithms identify facial features by extracting landmarks or features from an image of the subjects face. An algorithm analyses the relative position, size and or shape of the eyes, nose, cheekbones and jaw. These features are then used to search for other images with matching features. Facial recognition uses sensors to capture information about the shape of a face, such as the contour of the eye, sockets, nose and chin. Facial recognition is not majorly affected by changes in lighting and can identify a face from a range of viewing angles, including a profile view. The solutions offered provide 1:1 authentication, 1:G and 1:N matching, with interface to access control, logical access and enterprise rights management



Palm vein recognition works by scanning the veins inside of your hand and creating a digital template that represents your vein pattern. To use the system, you hold your hand a few inches above a sensor, which records the pattern of your palm veins on a digital template.

Palm vein patterns are unique to each individual – even identical twins have different patterns. An individual’s vein pattern image is captured by radiating his/her hand with near-infrared rays. The reflection method illuminates the palm using an infrared ray and captures the light given off by the region after diffusion through the palm. This vein pattern is then verified against a preregistered pattern to authenticate the individual. The solutions offered provide 1:1 authentication, 1:G and interface with access control, logical access and enterprise rights management.