10 July 2019

      High quality slap and rolled acquisition Ergonomic and attractive design Extra thin and lightweight USB powered Enhanced user experience Typical use cases Mass enrollment On-site capture of citizens’ data to build civil registry, electoral database, etc. Border control Enrollment and matching for foreign travelers. Criminal identification Suspect identification and police investigation. E-KYC […]

Paylaş
27 May 2016

Strong Authentication and Screen Security Time-based Access with the world’s leading biometric technologies Manufacturer Independent Biometrics Reader support Manufacturer Independent Camera support Windows Login with biometrics Applications Login with biometrics Multilingual Interface High level Computer Security Real-time User Control (If user moves away from the PC, the screen locks) Unauthorized User Control (If unauthorized user […]

Paylaş
01 April 2016

The Morpho 3D Face Reader™ provides lightning-speed, hands-free access to offices and restricted areas. By analyzing the three-dimensional structure of the user’s face, it achieves extremely accurate matching while ensuring high throughput.   With Morpho 3D Face Reader™, access control is highly secure and as simple as a quick glance! SPEED The real-time 3D imaging technology […]

Paylaş
20 August 2016

Through an easy-to-use and intuitive user interface, Morpho Video Investigator reviews and analyzes large quantities of raw video data. It then automatically provides insights by identifying points of interest throughout video recordings. Law enforcement and intelligence agencies accumulate video content from a multitude of sources. While enormously valuable information can be found in videos, the […]

Paylaş
01 April 2016

The SIGMA family welcomes new members! Engineered with the same attention to detail and performance as their predecessor, the MorphoAccess® SIGMA Lite terminals are specifically designed to equip narrow mounting surfaces, such as glass/aluminum door mullions, turnstiles, or server rack doors. With two designs and multiple card reader options, there are a variety of models […]

Paylaş
01 April 2016

Fast contactless fingerprint capture on the move. This innovative solution captures images of the user’s 4 fingertips from a single wave of the hand in less than a second. Its unique dynamic acquisition capability allows subjects to be ‘on the move’ during fingerprint capture. MorphoWave is therefore unchallenged in a wide range of applications where […]

Paylaş
01 April 2016

The MorphoAccess® VP Series of terminals brings for the first time the benefits of finger vein/fingerprint multimodal technology to your physical access control systems, in any kind of environment. Universal and easy-to-adapt: they are well suited to individuals who experience difficulties with mono-modal devices while offering the same simplicity and ease of use as for […]

Paylaş
01 April 2016

Eliminate long waiting queues and accelerate authentication throughput nano NXT is a PoE miniaturized iris-based recognition system. The nano NXT is an ideal replacement for card-based systems, and seamlessly controls access to secured entrances, server rooms and any other physical space. Authentication: Video-Based iris authentication in-motion and at-a-distance. Matching: On-board matching and authentication. Connection: Wiegand, F2F, OSDP and […]

Paylaş
05 October 2015

General Features Ergonomic design All-in-one solution: superior performance for Enrollment, Verification and Identification FBI PIV IQS certification and fake finger detection FIPS 201 and MINEX compliant Extensive security features, including encryption and digital signature Access to PC and Applications with biometrics data Authentication on PC and devices Technical Specifications While most fingerprint terminals on the […]

Paylaş
05 October 2015

HIGH PERFORMANCE WITH 2 DIFFERENT BIOMETRY Higher performance and more precise results are obtained by identifying both fingerprint and finger vein’s method at a time. HIGH SECURITY CERTIFIED K!M pozitif has FIPS 201, the FBI PIV IQS, PCI, EMV and Common Criteria certificates with high security criterias. 1:N (MULTI) COMPARISON K!M pozitif with 1:N feature […]

Paylaş