Technologies

BIOSMART biometric solutions are designed to identify a person by fingerprint, palm veins and face
BIOSMART systems work as part of ACS and time attendance systems. They help protect business resources from unauthorized access and make the employees' work process as efficient as possible. BIOSMART solutions are used in such spheres as industrial enterprises, transport and construction industries, financial sector, retail, IT, healthcare and public sector companies.

Face Identification

The method implies identifying a person according to individual characteristics of a face.




People's faces have more unique features than their fingerprints. The stereo camera identifies a person with the highest accuracy: it sees the differences in twins' faces and people of various nationalities.
How it works

BIOSMART face identification terminal has a stereo camera with adaptive illumination. 3D technology captures human features with a high level of accuracy in any lighting and even in complete darkness. The image is encrypted as a mathematical template and stored in a database. Later on, the terminal identifies a person by comparing their facial features with the templates in the database.

Benefits

People's faces have more unique features than their fingerprints. The stereo camera identifies a person with the highest accuracy: it sees the differences in twins' faces and people of various nationalities. Facial biometrics provide reliable protection against forgery: unlike an RFID card, a face cannot be lost, forgotten at home, stolen or handed over to a colleague. Our face terminal is equipped with a powerful processor, so identification takes less than half a second. Face recognition is non-contact, which makes it hygienic, convenient and absolutely safe for health.

Safety

BIOSMART produces face identification terminals with built-in protection against spoofing - attempts to deceive the terminal using a fake image. Reliable anti-spoofing face recognition algorithm is the company's know-how. It ensures that the terminal does not grant access to a photo or video.
BIOSMART's joint projects with the Unified Biometric System have shown how face recognition works in real life. As a result, face recognition technology is now successfully used in bio-acquiring systems. A biometric image is used to approve a payment transaction or to help verify a customer's age for purchases that have age restrictions.

Palm Vein Identification

The method implies the identification of a person by the individual structure of a network of venous vessels under the skin of the hand.






The method implies the identification of a person by the individual structure of a network of venous vessels under the skin of the hand.
How it works

The device scans the palm in multispectral infrared light and reads its reflection. The hemoglobin in the veins absorbs some of the infrared emitting, so a pattern of blood vessels appears on the reflection. Mathematical algorithms convert the pattern to a digital code and pack it into an encrypted template file that is only 4 KB in size. To identify a person, the device scans their palm and compares the received biometric template with the templates in the database.

Benefits

The palm vein pattern is individual and has many more unique features than a fingerprint. The pattern is completely formed by the age of 12 and does not change throughout a person's life.
Unlike an RFID card, a palm vein pattern cannot be lost, forgotten at home, stolen or handed over to a colleague.
The condition of the hand surface is irrelevant: the palm vein scanner accurately recognizes a person by a dirty or wet palm, a palm with cuts and calluses, and even a palm in a thin medical glove.
The latest generation palm vein scanners are completely contactless – they are hygienic, convenient and absolutely safe for health.

Security Assurances

The vein pattern is not visible in normal light, so it cannot be photographed or faked. The device scans the palm in several IR spectra at the same time, so it cannot be fooled with a silicone dummy. Only some significant parameters of an individual palm vein pattern are encrypted in the digital template, so it is impossible to restore a full-fledged image of a hand from it. Even if an hacker gains access to the database, they will not be able to use it at all.

Wherever palm vein identification has been used, it has established itself as the most convenient and secure one among all biometric identification methods.

Fingerprint Identification

The method implies identification of a person by individual whorl patterns on the fingertips.





Our biometric fingerprint identification system recognizes a person by an individual whorl pattern. It is the most affordable and versatile biometric solution. Fingerprints are unique and do not change over a lifetime.
How it works

Different fingerprint identification methods involve different types of scanners. The most effective among them are capacitive and optical scanners. Capacitive scanners take an image of a fingerprint and register the difference in electrical potential between the bumps and depressions of the whorl pattern. In optical scanners, the matrix of the built-in camera is responsible for fingerprint recognition. The resulting image is digitized and stored as an encrypted template. Later on, the device identifies a person by comparing their fingerprint with templates in its database.

Benefits

Fingerprint scanning is the most common biometric identification method. It is also the most affordable and versatile biometric solution. Everybody's fingerprints are unique and do not change throughout life. If the skin is damaged, it is then restored. Fingerprint scanning reliably protects against forgery: unlike an RFID card, fingers cannot be lost, forgotten at home, stolen or handed over to a colleague. Optical scanners are durable and resistant to damage: scratches on the outside of the scanner do not affect image quality. Capacitive scanners equipped with a heating system perform their functions and confirm the identity even in sub-zero temperatures.

Security Assurances

Biometric information is stored in encrypted form: the files contain only some significant parameters of a person's whorl pattern, so it is impossible to recover a full-fledged image of a fingerprint from a file. Even if a hacker gains access to the database, they will not be able to use it in any way. Capacitive scanners register the electrical response of the surface of the finger, so they only respond to the finger of a living person. They cannot be fooled with a dummy.

Identification by RFID cards

The method involves the identification of a person using an RFID card.






Identification of a person using RFID cards for the organization of an access control system to premises of any level of complexity.
How it works

When the user brings an RFID card to the reader, he transmits the RFID tag code to the controller, the controller compares it with the codes from the database and acts according to the settings, for example, grants or denies access to the room, activates the relay and controls the indication or sound signal on the reader.

Benefits

RFID card systems have gained popularity all over the world due to the relatively low cost of devices and their maintenance.
RFID card readers belong to the equipment of the low price segment and can be used even in small enterprises.

Security Assurances

Ensuring the effective work of personnel and protecting the company's resources are important elements of building a successful business. Today, these processes can be automated using systems based on RFID cards, and more recently, on the basis of biometric identifiers.