biometric identification solutions
" My heroes are those who risk their lives every day to protect our world and make it a better place - police, firefighters and members of our armed forces. "
Sidney Sheldon
CIAS
Criminal Identification and Authentication System
CIAS is a fast and easy to use application to enrol, search and analyse suspects, criminals or delicts.
Fingerprint and Face Recognition are the main engines who delivers fast access and real time identification in central databases.
​
Specifications
-
User friendly.
-
Registers suspects.
-
Real time response of searched fingerprints.
-
Investigates latent fingerprints.
-
Prints out European Fingerprint Sheet and can be customized to any fingerprint sheet.
-
Fingerprint sheets can be automatically stored as pdf.
-
AFIS web enabled.
-
According the international biometric standards
-
Digital Signature enabled.
MABIS
Mobile Automated Biometric Identification System
The application is capable of registering and identifying fingerprints and faces within a matter of seconds. The backend is supported by a high-speed AFIS that is minex compliant, as well as military and police-grade 2D/3D face recognition algorithms.
Running on a standard Android OS, the app is easily and quickly deployable without requiring any special hardware investments. The mobile camera captures high-quality images for fingerprint acquisition.
Mabis is secured by biometric access control that manages access through fingerprint, face, or voice verification.
It is an ideal tool for police forces, border control, citizen services, and immigration services.
Silent Watch
Non Cooperative Face Recognition Platform
Silent Watch is a Non Cooperative Access Control using face recognition through video streaming.
Silent Watch enrolls every face at the entrance, anomalously and checks in the Watch List if the face is a possible suspect.


Silent Watch is a tool for police forces, security organizations to control the access during sport events, at railway stations, airports, embassies and on high risk events like G8.
Or prevent shoplifting.

The technology have been implemented for Police Forces, Counter-Terrorism, National ID programs, National Elections and on high risk events.
PreCog
Real time threat analysis, identification & response