c true presentation v9

29
Copyright © 2009 C-True . All rights reserved. Rudy Shainer – AVP sales October 2009

Upload: rudy-shainer

Post on 16-Jan-2015

407 views

Category:

Documents


1 download

DESCRIPTION

C-True\'s Biometric Facial Recognition solutions

TRANSCRIPT

Page 1: C True Presentation V9

Copyright © 2009 C-True . All rights reserved.

Rudy Shainer – AVP sales

October 2009

Page 2: C True Presentation V9
Page 3: C True Presentation V9

About CAbout C--TrueTrueC-True is a leading provider of real time Biometric Face Recognition

Founded in 2006 and located in Weitzman Science Park in Israel.

Integrated ,turnkey innovative Real Time solution (S.W & H.W) for variety Access Control and personal identity vertical marketsvariety Access Control and personal identity vertical markets

Page 4: C True Presentation V9

The security field uses The security field uses 3 3 different types of Identification:different types of Identification:

Something Something YouYou KnowKnow —— a password, PIN, or piecea password, PIN, or pieceof personal information (such as your mother'sof personal information (such as your mother'smaiden name) maiden name)

Biometrics OverviewBiometrics Overview

maiden name) maiden name)

Something Something YouYou HaveHave —— a card key, smart card, ora card key, smart card, ortoken (like a token (like a SecurIDSecurID card)card)

Something Something You Are You Are —— a a BiometricBiometric

Page 5: C True Presentation V9

Ideal biometricIdeal biometric

Universal: Universal: each person should possess the characteristicseach person should possess the characteristics

Unique: Unique: no two persons should share the Characteristicsno two persons should share the Characteristics

Permanent: Permanent: the characteristics should not changethe characteristics should not changePermanent: Permanent: the characteristics should not changethe characteristics should not change

Collectable: Collectable: easily presentable to a sensor and quantifiableeasily presentable to a sensor and quantifiable

Page 6: C True Presentation V9

User Authentication

Security

User

Authentication

Biometrics

Face Recognition

Page 7: C True Presentation V9

Enrollment to VerificationEnrollment to Verification

Page 8: C True Presentation V9

Face Recognition AdvantagesFace Recognition AdvantagesThe most natural way for people identification

The basic standard in any Travel/ ID document

Non Intrusive

Very Accurate

Very Fast process for Enrollment and Authentication

Clean and hygienic (nothing to touch)Clean and hygienic (nothing to touch)

Very intuitive

Keep track of people face as evidence for the transaction

Attractive by people who use it

Page 9: C True Presentation V9

CC - -True product linesTrue product lines

CC--EntryEntry : Physical Access control, Time &

Attendance tracking

CC--Gates : Gates : face recognition passenger

authentication system

CC--Pass Pass : : e-Passport passenger face

authentication system

CC--Access : Access : OEM projects for ,self service

integration such as ATM, Kiosks, Vending Machines , Cars etc

Page 10: C True Presentation V9

Target markets & example applications Target markets & example applications ((11--33))

Access control to buildings & premises: Access control to buildings & premises: CC--Entry is used to provide access control to enterprise, stadiums etc. Entry is used to provide access control to enterprise, stadiums etc.

Can open the doors in either the main lobby or restricted areas.Can open the doors in either the main lobby or restricted areas.

Airports:Airports: CC--Entry is used to provide access control to the restricted Entry is used to provide access control to the restricted

area in the Airport. In addition Carea in the Airport. In addition C--Gates and CGates and C--Pass can be use .Pass can be use .

National Government: National Government: identity management applications, identity management applications,

ee--ID identification and government services to citizens, population registry ID identification and government services to citizens, population registry and voting systems.and voting systems.

Border control: Border control: by integration with eby integration with e--passport scanner, immigration passport scanner, immigration

authorities ,checks authorities ,checks -- in counters, security gates and boarding gates.in counters, security gates and boarding gates.

Page 11: C True Presentation V9

Healthcare:Healthcare: Doctor’s access to patients’ medical recordsDoctor’s access to patients’ medical recordsandand

databases, pharmacy access control ,patient IDdatabases, pharmacy access control ,patient ID

Financial Services/BankingFinancial Services/Banking: Fast and accurate scanning : Fast and accurate scanning

that required for cashing verification, VIP transaction rooms, and ATM that required for cashing verification, VIP transaction rooms, and ATM authentication. Mandating accurate identification of employees and authentication. Mandating accurate identification of employees and customers. customers.

Target markets & example applications Target markets & example applications ((22--33))

customers. customers.

Visitors control: Visitors control: Keeps a record of all visitors' details on a database. Keeps a record of all visitors' details on a database.

Each time they attend the premises the system that verifies their authorization.Each time they attend the premises the system that verifies their authorization.

Inmates control: Inmates control: Ensures that a prisoner being moved or released is Ensures that a prisoner being moved or released is

the same who was enrolled when they first started their sentencethe same who was enrolled when they first started their sentence

Page 12: C True Presentation V9

Education: Education: Protecting students and personnel against unwanted Protecting students and personnel against unwanted

campus visitors, granting parents access to school's facilities, and campus visitors, granting parents access to school's facilities, and

ensuring examinees identity.ensuring examinees identity.

Critical infrastructure: Critical infrastructure: Power/Oil /Water /Nuclear etc’ Power/Oil /Water /Nuclear etc’

Plants including the assets, systems, and networks, whether physical or Plants including the assets, systems, and networks, whether physical or

Target markets & example applications Target markets & example applications ((33--33))

Plants including the assets, systems, and networks, whether physical or Plants including the assets, systems, and networks, whether physical or virtual, so vital to governments and enterprises.virtual, so vital to governments and enterprises.

Hotels: Hotels: Manage the access of their guests and employees to the hotel’s Manage the access of their guests and employees to the hotel’s

facilities and restricted areas.facilities and restricted areas.

Page 13: C True Presentation V9

Face Recognition ProcessFace Recognition Process

1. Person’s enrollment

2. Person’s authentication2. Person’s authentication

Page 14: C True Presentation V9

CC - -EntryEntry

Physical Access control ,stand alone or networked

Time & Attendance tracking

Various tokens:

RFID (including Mifare)RFID (including Mifare)

Numeric keypad

2D/1D barcode

Magnetic cards

Page 15: C True Presentation V9

FeaturesFeatures (cont.)(cont.)

Authentication speed: < 0.5 sec

Covers person’s height: 1.40m – 2.15 m

Interfaces:Ethernet -TCP/IP support

Weigand 26 protocol supportWeigand 26 protocol support

Dry contact (for external equipment activation like gates ,doors ,etc.)

USB (usually closed, open controlled by Adimin only)

Comprehensive reporting system with images

sort and track mechanisms

Page 16: C True Presentation V9

FeaturesFeatures (cont.)(cont.)

Fastest match process under an extremely large dynamic light conditions

False Acceptance Rate (FAR): ~ 0.001%

False Rejection Rate (FRR): ~2%False Rejection Rate (FRR): ~2%

Operational in harsh operation conditions without performance degradation

Covering skin texture from milky white to deep black

Page 17: C True Presentation V9

FeaturesFeatures (Cont.)(Cont.)

Easy to use by staff (Security, admin.)

Friendly Interface using interactive enroll/authentication features

Fast installation

Insensitive to beard, scull hair or prescription glasses

C-Entry -The most innovative and Advanced Biometric

Face Recognition Solution for Access Control.

Page 18: C True Presentation V9

ConfigurationsConfigurations

1. Standalone C-Entry

2. Networked C-Entry with C-BioServer

3. Networked C-Entry with C-BioServer and 3rd Party A.C

Page 19: C True Presentation V9

CC--Entry System ArchitectureEntry System Architecture

WEIGAND

3rd Party Access Control

System

WEIGAND WEIGAND

lock lock

C-ENTRY Authentication

Configured Terminal

lock

Ethernet Network switch

C-ENTRY Authentication

Configured Terminal

C-ENTRY Enroll +

Authentication Configured

Terminal

C-BioServer Server

Page 20: C True Presentation V9

CC - -PassPass

e-Passport passager face authentication solution

Border control posts, checks in counters, security gates and boarding gates, as well as duty free shops and VIP lounges entrancesduty free shops and VIP lounges entrances

Using 3M e-Passport Reader

Page 21: C True Presentation V9

CC - -PassPasse-Passport passenger face authentication solution

Using e-Passport unprotected electronic face Image (as opposed to other protected biometrics like finger or Iris)

Border control posts, checks in Border control posts, checks in counters, security gates and boarding gates, as well as duty free shops and VIP lounges entrances

Using 3M e-Passport Readere-Passports specifications are published in ICAO Doc 9303 and endorsed by ISO as ISO/IEC 7501. The face image is documented in ISO/IEC 19794-5:2005.

Page 22: C True Presentation V9

CC--Pass Pass Automatic authentication Automatic authentication in few in few

seconds seconds !!

Page 23: C True Presentation V9

CC--GatesGates

Page 24: C True Presentation V9

CC--GatesGates

Page 25: C True Presentation V9

Passenger’s enrollment Passenger’s enrollment The passenger is identified, checked for passport expiration, visa, valid e-ticket etc. before enrollment

At Check In counter – by the agent, after printing the boarding pass and before handling to the passenger

At the Security Check - by the security agent, before allowing the passenger to enter air side

Page 26: C True Presentation V9

CC--Gates Gates -- BCBP usage for Passenger’s enrollment BCBP usage for Passenger’s enrollment

Using standard Bar-Coded Boarding Passes (BCBP), as specified by IATA 792 based on 2D barcodes (PDF417)

Passenger's personal and flight information gathered from Bar-Coded Boarding Passes (BCBP)

Page 27: C True Presentation V9

CC--Gates Gates -- Passenger’s AuthenticationPassenger’s Authentication

Using Boarding Pass

At the Security Check

At the Boarding Gate

C-Gates authentication will occur only if flight no. on BP is the one departing at the specific gateon BP is the one departing at the specific gate

Wrong passenger will be rejected

Detailed reports and transactions logs

Page 28: C True Presentation V9

Airline's and AirportsAirline's and Airports benefitsbenefits

Guaranteed on board passengers identity

Quicker boarding process

Ability to track passenger for security purposessecurity purposes

Ability to quickly identify late passenger in the airport

Departure’s delay prevention

VIP treatment made easy

Human resources savings

Page 29: C True Presentation V9

For information please contactFor information please contact::

Rudy Shainer Rudy Shainer AVP Sales CAVP Sales C--truetrue

Tel: +Tel: +972972--88--93162309316230//1 1 Tel: +Tel: +972972--5454--323996323996

2 2 Prof. Bergman Prof. Bergman stst. , . , Weizman Science Park,Weizman Science Park,Rehovot , Israel , Rehovot , Israel , 7670576705

WEB:WEB: www.ctrueltd.comwww.ctrueltd.com EMAILEMAIL: : [email protected]@ctrueltd.com