Independent Biometric
Authentication Service

Advantages

MARKET AND BUSINESS INDEPENDENCE

Works for any industry (e.g.financial, healthcare);
Has no impact on existing business applications' rules;
Adds as easily and quickly as adding new software regardless of market regulations.

ENCRYPTION PLATFORM INDEPENDENCE

Works with any encryption methods;
Works with any key management system;
Complies with major industry protocols to protect data in storage and transfer;

BIOMETRIC PLATFORM INDEPENDENCE

Makes available all biometric technologies for client applications;
Provides unified interface for virtually any biometric devices from any manufacturer;
Supports unlimited factor authentication.

APPLICATION PLATFORM INDEPENDENCE

Middleware interoperability enables effective deployment model;
No impact on existnig third party applications, no modifications required;
Upgrades to outdated systems are simole and cost effective, as is extending to new areas;

ONE UNIFIED SOLUTION

One solution that works for all users;
Single access point for controlling identification process;
Unified inter face for managing IT security and physical access;
Virtually eliminates identification errors;
Minimizing the cost of integratior, support and maintains;

MODULAR SYSTEM

IDZ's modular construct on permits rapid addition of new technologies, software components or devices;

COMPATIBILITY

Works with any existing security system and with any communications system;
Software platform and integration mode agnostic;
Can work with existing password and token based systems;

SELF-DEVELOPING SYSTEM

Quickly learns from and adopts new technologies

OPTIMAL SCANNING DEVICE SELECTION

Ensures each user has device that works best for them (finger, iris, face, hand, etc.);
Select different factor and/or device for different users in same departament or group;

PROPRIETARY DATA CONFIDENTIALITY

Does not share a customer's or clmpany's confiditional data;
Stores no personality identifiable information;
Enables industry-wide, inter-agency sharing of biometric identities;

Broad Deployment Categories

BY TYPE TO ACCESS CONTROL

Physical access control - use Identacloud to authenticate a person's identify prior to granting access to a facility and/or specific areas in the facility such as floors and rooms.
Logical access control - use Identacloud to authenticate a person's identify prior to granting access in information resourcers, such as systems, programs or processes.

BY TYPE TO ACCESS CONTROL

BY TYPE ACCESS SECURITY LEVEL OPTIONS

FOR EACH INDIVIDUAL USER

Multiple levels based on job description
Management and supervisory levels

FOR EACH LOCATION

Sub groups within a departament or user defined levels
Any other area within an organization

BY INDUSTRY:

FINANCIAL SERVICES

Software based: account management, debit/credit transactions, wire transfers, foreign exchange, teller services, online banking services, loan documentation, fraud and check processing, teller, trust department, etc.
Hardware based: safe deposit vault, cash vault, ATM machine, mobile banking with smartphones, cell phones and other gadgets.

HEALTH

Electronic Record Management and communication, patient authentication, appointment management, electronic prescription entry.
X-Ray exchange utilizing a biometric generated authentication factor as Biometric Mark.

SOCIAL NETWORKING

Profile access and midification
Data (images, video, audio, etc.) uploads, downloads.
Media file protection and management.

INSURANCES

Account management, logon and insurance plan updates, etc.
Physical location based: drive-in facilities, data processing facilities, supply rooms, mail rooms, file rooms, fraud processing facilities, and other physical sites.

LAW ENFORCEMENT AGENCIES

Intellectual Property protection system. Collection processing facilities. .

RETAIL

Customer recognition system.
Sales optimization through linking recognition with customer databases and behavioral analysis.
Marketing research and planning.

GAMING INDUSTRY

User recognition and authentication.

ACCESS AND MANAGEMENT OF DATA COMMUNICATION SYSTEMS:

FTP access and management
Eail account access and managements
Voice based system access and management
Fax systems .
Web upload systems, etc

BY APPLICATION TYPES

FTP access and management
OS account control.
Organizational domain access and domain's users' control.
Time and attendance management.
Application process control.
Appointment management.
Audit trails. .
Database access and management.
Tracking, monitoring and authorization level management (by compartment level, within departments or other areas of organization).
Surveillance systems.