top of page

G&A Surveillance Biometric Technology

 

The use of biometrics—standardized measurement of various physical and behavioral features are available to provide our clients with top notch security. The science of using physical characteristics (fingerprints, eyes, hands) to identify a person and some of the products used in this system include fingerprint readers and retinal scanners.

 

 

Face Recognition Biometric Security – This is one of the most flexible methods as it can be done without the person being aware that they are being scanned. This system analyzes specific features that everyone’s face has like the distance between the eyes, width of the nose, position of cheekbones, jaw line and chin to only name a few.

 

 

Fingerprint Identification – Your fingerprints remain the same throughout your life and no two fingerprints are alike. This may not work in industrial applications as this requires clean hands and some people may have injury to their prints that prevent proper identification.

 

 

 

 

Hand Geometry Biometric Security – This will work in harsh environments, does not require clean conditions and uses a small dataset. It is not considered as intrusive and is often used in industrial environments.

 

 

Retina/Iris Scan – There is just no known way to replicate a retina and, as far as is known, the pattern of the blood vessels at the back of the eye is totally unique and never changes. The downside is that it takes about 15 seconds of careful concentration to do a good scan but this still remains a standard one in military and government installations.  This is very difficult to duplicate and stays the same for your lifetime.

 

 

 

Voice Analysis – This method of security biometric can be accomplished without the person’s knowledge although it is easier to fake by using a tape recording but it cannot be done by trying to imitate another person’s voice.

 

 

 

 

 

Biometric Signature Security – This type of security is easy to gather and is not physically intrusive.  It captures the act of signing in 'real time' and not an igmine of the signature.

 

bottom of page