Biometrics: Market Shares, Strategies, and Forecasts, Worldwide, 2013 to 2019

Biometrics: Market Shares, Market Strategies, and Market Forecasts, 2015 to 2021

WinterGreen, Date of Publication: Oct 16, 2015, 1003 Pages
US$4,000.00
WG9854

Biometrics Market Shares and Market Forecasts

Next generation biometrics implements smart devices that leverage better technology, they support high quality data gathering in the specific milieu in which they are being used. Devices are targeted to specific situations. Hybrid devices increase identification accuracy by combining two or several technologies and approaches to the market. The study has 1003 pages and 419 tables and figures.

Biometric identity units provide security protection from a variety of perspectives. Units are comprised of integrated biometric capture devices. Biometrics is used to identify anyone in an accurate, repeatable manner. Physiological characteristics used for biometrics commonly include the face, fingerprints, voice, and DNA.

Modern biometrics hybrid fingerprint recognition use on board fingerprint readers. Mobile devices use capacitive technology to implement security systems Growth of biometrics security systems is being fueled by rising threats. Different portable device implementations have given rise to multiple technology breakthroughs in size, weights, and length of battery use.

Biometrics is used to identify people in an accurate, repeatable manner. Physiological characteristics used for biometrics include the face, fingerprints, and DNA. Developments relate to the ability to unobtrusively collect face and voice biometrics, supplementing fingerprinting that has been dominant. Biometrics technology measures personal physiological characteristics for the purpose of unique identification and security.

Apple advanced the OS X "Quick Look" feature for iOS devices using an intense touch gesture. Apple extended fingerprint technology as Touch ID. iDevice displays are taking on fingerprinting capabilities and sensitivities beyond the home button. Apple introduces the possible use of virtual knobs, controlling video games via the home button.

Apple is working on assigning different bank accounts to different fingerprints. Apple next-gen touch panel technology introduces the next wave of biometric capabilities. Apple next-gen touch panel technology using nano silver wire materials brings sensitivity to iPad displays. The technology finds its way into the Apple watch and the iPhone. This technology gives Apple significant market advantage in the payment verification market.

Types Of Biometric Devices

  • Automated fingerprint identification systems (AFIS)
  • Palm and vein reading systems that supplement AFIS
  • Non-automated fingerprint identification systems
  • Facial recognition
  • Iris scans
  • Integrated AFIS, face, and iris systems
  • DNA readers
  • Biometric signatures
  • Data encoders
  • Bar coder
  • Document scanner

Biometric identity units provide security protection. Units are comprised of integrated biometric capture devices and readers, systems to store and use the biometric identifiers. Biometrics units are comprised of fingerprint systems, facial recognition, iris scans, and biometric signatures. They include data encoders. Data encoders may be implemented as a bar coder or document scanner. Units are sometimes contained in ruggedized briefcases for military, public safety, and civil identification applications.

Advances in technology, miniaturization, and improved mobile device technology enable uses previously thought impossible, or never even imagined. Voter registration in low-literacy economies is now economical. Identifying persons of interest in a crowd can be done with biometrics.

Growth of biometric technologies has been in response to global security threats. Terrorist attacks, airport security initiatives, and attempts to lower crime rates have brought an increasing investment in biometric security systems. Government projects include ePassports, eDriving licenses, border management, and national IDs. These initiatives have been implemented in developed countries.

A rise in government projects has been seen as terrorists become an increasing threat. This has been accompanied by increasing data security concerns. There is a need for advanced security devices.

Biometrics use cases can be consumer- or citizen-facing. These use cases are typically high-volume, low price broadly implemented systems. Enterprise-facing use cases include government law enforcement, and defense applications where an organization is implementing smaller volumes of devices, or where the devices are more expensive. Use cases define the biometrics market. Biometrics is used to identify individuals with confidence. When used in law enforcement, cases are resolved quicker and with more convictions of guilty people.

Security systems implementations drive the market for biometric systems. Biometric data protection is being used to replace photographs, passwords and PIN codes.

India, Mexico and Russia are driving the extraordinary growth of biometric systems. China has a biometric national ID program that commenced in 2013. India is getting on board. Computer storage of important documents has created an increasing need for biometric security systems.

Key industries in the biometrics market are finance, consumer devices, and healthcare. Key use cases include smart phone payment systems, consumer device authentication, mobile banking, automated teller machines (cashpoints), government IT systems, point-of-sale transactions, pharmacy dispensing, and wearable device authentication. Call center use cases apply across nearly all industries.

Biometric modalities include hybrid fingerprint / palm print, facial recognition, iris image, and voice recognition. The global biometrics market is $7.0 billion in 2014, rising to $44.2 billion by 2021. Biometrics revenue and device shipment forecasts are segmented by modality and market segment. There are four market segments, law enforcement, border control which includes government ID systems, workplace access, and consumer ID.

Biometrics represent a multi-billion dollar industry because the devices provide personal identity protection. Biometrics is used by civil authorities to permit the organization of people into units of government that are a cohesive group of people, not intruded upon by outsiders. Biometrics provides a cornerstone of law enforcement agencies with fingerprint ID.

Companies Profiled

Market Leaders

  • NEC
  • 3M / Cogent
  • Tyco
  • Suprema
  • DigitalPersona
  • Apple / AuthenTec
  • Green Bit
  • Cognitec Systems
  • Bio-key
  • Safron MorphoTrak
  • Gelamto / Avalon Biometrics
  • M2SYS
  • Fujitsu
  • Cross Match Technologies
  • Aware
  • Iris ID Systems
  • Iritech

Market Participants

  • 3M
  • Agnitio
  • Amano USA Holdings, Inc / Accu-Time Systems
  • Apple / AuthenTec
  • Atos
  • Aware
  • Bethcom 716
  • 5.10 BIO-key
  • Cognitec Systems
  • Communication Intelligence Corporation
  • Cross Match / Francisco Partners
  • CSC
  • Daon
  • Dialog Semiconductor / Atmel
  • Diamond Fortress
  • EgisTec
  • FaceFirst
  • Fingerprint Cards AB
  • FotoNation
  • Fujitsu
  • Gemalto
  • Gemalto Group /Avalon Biometrics
  • Google
  • Goodix Technology
  • Green Bit
  • IBM Facial Recognition
  • IdentiPHI
  • Idex
  • IDtech360
  • Integrated Biometrics
  • Intel
  • Interlink Electronics
  • Iris ID Systems
  • IriTech
  • RDSK / Litronic
  • M2SYS
  • Mereal Biometrics
  • Merkatum Biometrics Security & ID
  • Mobbeel
  • Mobizent
  • NEC
  • Next Biommetrics
  • NitGen & Company
  • Nuance
  • Precise Biometrics
  • Qualcom
  • Reserve Group / Integrated Biometrics
  • Safran Morpho
  • Science Applications International Corporation (SAIC)
  • SecuGen
  • SIC Biometrics
  • SmartMetric
  • Smiths Detection
  • Steria
  • STMicroelectronics
  • Suprema
  • Symantec
  • Synaptics
  • Tyco Integrated Security
  • UnionCommunity / Virdi
  • United Technologies Corporation / UTC Building & Industrial Systems / Supra
  • Vision-Box
  • WCC Smart Search & Match
  • WHO
  • Witswell Consulting and Services / Cyber-SIGN 950
  • Zvetco Biometrics 952
  • Selected Biometric Industry Mergers and Acquisitions
  • Acquisition by Atos of Siemens IT Solutions and Services 2011
  • ST Microelectronics (Finger-Scan) Spins off UPEK
  • Motorola Selling Biometrics Business SAFRAN / Sagem SÄ
  • Safran Acquisition of L-1 Identity Solutions Formed From A Merger of Visage Technology, Inc. and Identix
  • 3M Acquisition of Cogent
  • Amano USA Holdings, Inc. (AUH) acquired ATS
  • Apple Acquired AuthenTec
  • AuthenTec Acquisitions of SafeNet’s Embedded Security Solution Division, UPEK, Inc., PeerSec Networks and Proxure, Inc.
  • Smart Sensor Solutions
  • BIO-Key International / S.I.C.
  • Cross Match Acquired The Biometric Business of DigitalPersona
  • Cross Match Acquired Biometric Authentication Business of Labcal Technologies
  • Francisco Partners Acquired Cross Match Technologies
  • Gemalto / Avalon Biometrics
  • Dialog Semiconductor / Atmel
  • IdentiPHI
  • Steria
  • Symantec Acquires VeriSign Security Business



TABLE OF CONTENTS

Biometrics Executive Summary 47
Biometrics Market Driving Forces 47
Biometric Security Market Driving Forces 52
Biometrics Market Shares 56
Biometric Market Forecasts 57

1. Biometrics Market Description and Market Dynamics 59
1.1 Multi-Modal Biometric Identification 59
1.1.1 Multi-Modal Hybrid Finger Identification 59
1.1.2 5.6 Million Fingerprints Were Stolen From Office of Personnel Management 60
1.2 Biometric Sensor Devices 60
1.2.1 Biometrics for Security and Management 62
1.2.2 Biometrics for Convenience 62
1.2.3 Biometric Systems Characteristics 63
1.2.4 Biometric Systems Hidden Expenses 65
1.3 Biometrics Industry Segments 65
1.3.1 Biometrics Are In Law Enforcement 67
1.3.2 Biometrics Personal Identity Verification 67
1.3.3 Biometrics Increase Security 68
1.3.4 Financial Institutions Use Biometrics 70
1.3.5 Law Enforcement Uses Biometrics 71
1.3.6 Immigration Uses Biometrics 71
1.3.7 Social Services Use Biometrics 71
1.3.8 Airports Use Biometrics 71
1.3.9 Healthcare Use Biometrics 72
1.3.10 Consumer Use Biometrics 72
1.4 Applications for Biometrics 74
1.4.1 US Customs Set To Launch Biometric Pilot Programs: Leaked Documents 75
1.4.2 Casino Facial Recognition Capability 76
1.5 Store & Forward Systems 77
1.6 Mobile Identification Systems 78
1.6.1 Fingerprint Recognition 80
1.7 Fingerprint Scanner 81
1.8 Gesture-Interfaces 82
1.8.1 Biometric Components of Signatures 82
1.9 Risks in Biometric-Based Authentication 83
1.10 Multi-Factor Authentication Solutions 86
1.11 Biometrics Automated Process 86
1.12 Security of Input Mechanism 87
1.13 Digital Data Security 88
1.13.1 Security Issues 89
1.13.2 New World Order Built On The Globally Integrated Enterprise 90
1.14 Enterprise Information Accessed By Mobile Workers 93
1.14.1 Cloud System Continuous Deployment Models 93

2. Biometrics Market Shares and Market Forecasts 96
2.1 Biometrics Market Driving Forces 96
2.1.1 Biometric Security Market Driving Forces 100
2.2 Biometrics Market Shares 104
2.2.1 NEC 107
2.2.2 M2SYS 109
2.2.3 Safran 110
2.2.4 Safran Sagem Morpho 110
2.2.5 Safran Supplies State-Of-The-Art Solutions To Police Forces 111
2.2.6 Safran Morpho Government ID Solutions Manage And Secure The Value Chain 112
2.2.7 Apple / AuthenTec 113
2.2.8 Fingerprint Cards 114
2.2.9 Synaptics 114
2.2.10 3M/Cogent Systems 114
2.2.11 3M Cogent Systems CAFIS™ 115
2.2.12 3M / Cogent 115
2.2.13 Precise Biometrics 115
2.2.14 Francisco Partners / Cross Match SEEK® Avenger 116
2.2.15 Francisco Partners / CrossMatch 117
2.2.16 Avalon Biometrics 118
2.2.17 DigitalPersona 118
2.2.18 Apple / AuthenTec / UPEK 119
2.2.19 BIO-key 119
2.2.20 BIO-key for Identity and Access Management 120
2.2.21 Suprema 121
2.2.22 Supra eKey Biometric Real Estate Applications 121
2.2.23 Vision-Box Automated Border Control And Electronic Identity Solutions Using ICAO-Compliant Standards 122
2.2.24 EgisTec 123
2.2.25 CIC Electronic Signature Competition 123
2.2.26 Atos Biometric Electronic ID and Border Control 124
2.2.27 WCC core technology for border security 124
2.2.26 Labcal India IrisAccess 7000 125
2.2.27 Nitgen Fingerprint Access Controller 125
2.2.28 Egis Technology 126
2.2.29 M2SYS 126
2.2.30 Agnitio BATVOX De Facto Standard Voice Biometrics 127
2.2.31 FotoNation Facepower™ 127
2.2.32 Vision-Box 128
2.2.33 Iris ID Systems 128
2.2.34 Communication Intelligence Corporation (CIC) Electronic Signature, Digital Signature, Signature Verification 128
2.2.35 Law Enforcement Biometrics 129
2.2.36 Biometrics Law Enforcement, Workplace Access, Border Patrol, Consumer ID By Vendor 130
2.2.36 Hybrid Fingerprint Low End, Mid Range, and High End Market Shares By Vendor 134
2.2.37 Identity Management Biometrics 135
2.2.38 Iris ID, DNA Analyzers, Explosive Detection, Biometrics 138
2.2.39 Other Selected Vendors 138
2.3 Biometric Market Forecasts 138
2.3.1 Biometric Device Market Trends 142
2.3.2 Law Enforcement Biometrics, Forecasts 148
2.3.3 Fingerprint Biometrics 150
2.3.4 Automated Fingerprint Identification Systems (AFIS) 151
2.3.1 Workplace Access Biometrics 151
2.3.2 Commercial ID Biometrics Forecasts 155
2.3.3 Border Patrol and Government Biometrics, Forecasts 158
2.3.4 National ID Control Biometrics 161
2.3.5 Facial Recognition Biometric Technologies 162
2.3.6 Iris, Eye Biomeric Market Segment 163
2.3.7 Airport Screening / Facial Recognition 163
2.4 Biometric Equipment Prices 165
2.4.1 Biometric Fingerprint Equipment Prices 165
2.4.2 Biometric Facial Recognition Equipment 174
2.4.3 Biometric Sensors 174
2.5 Biometric Fingerprint Regional Market Analysis 175
2.5.1 US: Safran MorphoTrust Enrolls Over One Million Americans in TSA Pre?® 178
2.5.2 US FBI Biometrics 179
2.5.3 US Driver License Solutions 179
2.5.4 Healthcare cards for France, Germany and India 179
2.5.5 Kenya, Egypt, and Chile Biometrics National ID Programs 180
2.5.6 Biometrics in India 181
2.5.7 Saudi Arabia Biometric Systems Market 182

3. Biometrics Product Description 184
3.1 NEC Multi-Modal Biometric Identification 184
3.1.1 NEC Multi-Modal Hybrid Finger Identification 184
3.1.2 NEC Multi-Biometrics 187
3.1.3 NEC Fingerprint Identification 189
3.1.4 NEC Hybrid Finger Identification 190
3.1.5 NEC NeoScan 45 Mobile Fingerprint Capture Device for Public Safety Applications In The Field 193
3.1.6 NEC NeoFace® Reveal Facial Recognition 196
3.1.7 NEC NeoFace® Watch 196
3.1.8 NEC NeoFace®Match 197
3.1.9 NEC Biometrics Face Recognition Diverse Application Areas 199
3.1.10 NEC NeoFace® Smart Mobile ID 199
3.1.11 NEC FastID 199
3.1.12 NEC Integra-ID Archive System 203
3.1.13 NEC National/State Civil Identification 203
3.1.14 NEC Consumer Identification 204
3.1.15 NEC Criminal Identification 206
3.1.16 Security Force Management 207
3.1.17 NEC Border Control Solutions 208
3.1.18 NEC Portable DNA Analyzer 211
3.2 Safran Morpho Government ID solutions 217
3.2.1 Safran Morpho Government ID Solutions Manage And Secure The Value Chain 217
3.2.2 Safran Morpho Population & Voter Registration 221
3.2.3 Saffron Morpho Healthcare Solutions 225
3.2.4 Safran Morpho Public Security 225
3.2.5 Safran Morpho Digital ID & Smart Transactions 226
3.2.6 Safran Morpho Identity Management 227
3.2.7 Safran Morpho Register Customers & Manage Employee Identities 230
3.2.8 Safran Morpho Trust Services 231
3.2.9 Safran Morpho Solutions for Telecom 233
3.2.10 Safran Morpho Gaming Solutions 235
3.2.11 Safran Morpho Aviation & Border Security 235
3.2.12 Safran Morpho Border Mobile Control Terminal 236
3.2.13 Safran Morpho Access Control Terminals 237
3.2.14 Safran MorphoAccess® and Bioscrypt Best Of Breed Fingerprint Identification Terminal 238
3.2.15 Safran Morpho MorphoAccess J Series 240
3.2.16 Safran Morpho Bioscrypt 4G V-Flex Lite 242
3.2.17 Safran Morpho Bioscrypt 4G V-Station WR 244
3.2.18 Safran Morpho Bioscrypt 4G V-Station WR 246
3.2.19 Safran Morpho Morpho 3D Face Reader 248
3.2.20 Safran Fingerprint Recognition 250
3.2.21 Safran Morpho System™ 252
3.2.22 Safran Morpho MorphoPerso 253
3.2.23 Safran Morpho ID Documents Uniqueness Protections 254
3.2.24 Safran Morpho MorphoCheck™ 256
3.2.25 Safran Morpho MorphoRapID™ 257
3.2.26 Safran Morpho MorphoTouch™ 1200 Series 258
3.2.27 Safran Morpho MorphoBIS 260
3.2.28 Safran Morpho MetaMorpho 263
3.2.29 Safran Morpho Secure Biometric Multibiometric Reader 265
3.2.30 Safran Morpho Outdoor MorphoAccess® 500 Series 266
3.2.31 Safran Morpho Secure Biometric Access 268
3.3 3M / Cogent Systems 269
3.3.1 3M Civil ID 269
3.3.2 3M Enrollment Systems 269
3.3.3 3M Biometric Enrollment Station 270
3.3.4 3M Cogent Systems Multi-Biometric Enrollment Station (CBES) 270
3.3.1 3M™ Cogent Biometric Enrollment Operating Software: Automated Validation Of Electronic Records 272
3.3.2 3M Facial Identification Management Solution 274
3.3.3 3M Identity Document Issuance System 275
3.3.4 3M Design & Credentials 276
3.3.5 3M Border Management System 276
3.3.6 3M Access Control Reader Solutions 277
3.3.7 3M™ MiY-Touch Biometric Access Control Reader 278
3.3.8 3M Hospitality & Gaming 278
3.3.9 3M Transportation Solutions 278
3.3.10 3M Cogent Systems CAFIS™ 278
3.3.11 3M Cogent Systems CAPFIS™ 281
3.3.12 3M Cogent Systems Biometric Registration Software (BRS) 284
3.4 Gelamto / Avalon Biometrics 285
5.1.1 Gemalto /Avalon Biometrics 287
3.5 Cross Match 287
3.5.1 Cross Match Solutions for Government 288
3.5.2 Cross Match Solutions for Law Enforcement 289
3.5.3 Cross Match Solutions for Finance 290
3.5.4 Cross Match Solutions for Retailers 291
3.5.5 Cross Match Eikon USB Biometric Readers 292
3.5.6 DigitalPersona Biometrics, Multi-Factor Authentication and Access Management 294
3.5.7 DigitalPersona Pro Enterprise 296
3.5.8 DigitalPersona Fingerprint Biometrics 297
3.5.9 DigitalPersona 5160 Fingerprint Reader 298
3.5.10 DigitalPersona, Inc. UPEK TouchChip TCRU1C 298
3.5.11 DigitalPersona, ikonTouch 700 300
3.5.12 DigitalPersona, Inc. ikonTouch 700 301
3.6 Apple / AuthenTec Smart Sensors Fingerprint Authentication Includes Touch Control Navigation And Personalization 303
3.6.1 Technology Embedded in Apple iPhone and 7.85-Inch iPad are 2D Fingerprint Scanners 304
3.6.2 Apple Computer Line-Up Uses AuthenTec Sensors 306
3.6.3 Apple Pay via Touch ID. 306
3.6.4 Apple Next-Gen Touch Panel Technology 308
3.6.5 Apple Nano Silver Wire Materials That Bring Sensitivity to iPad Displays 309
3.7 Fingerprints Card AB 310
3.7.1 Fingerprints Card AB FPC1155 311
3.7.2 Fingerprints Card AB FPC1145 312
3.7.3 Fingerprints Card AB FPC1150 314
3.7.4 Fingerprints FPC1011F3 Area 316
3.7.5 Fingerprints FPC1080A Swipe 318
3.7.6 Fingerprints FPC2020 320
3.8 Atos 322
3.8.1 Biometric Authentication In Hospitals 322
3.8.2 Atos Biometric Electronic ID and Border Control 322
3.8.3 ID Center from Atos 323
3.9 Synaptics 327
3.9.1 Synaptics Match-in-Sensor Fingerprint Authentication Technology 329
3.9.2 Synaptics Touch Biometric Solutions 330
3.9.3 Synaptics Natural ID™ Fingerprint Identification 331
3.10 Integrated Biometrics 333
3.10.1 Integrated Biometrics LES Fingerprint Sensors 333
3.10.2 Integrated Biometrics Sherlock 334
3.10.3 Integrated Biometrics Watson Mini 335
3.10.4 Integrated Biometrics Columbo 336
3.11 Intel True Key Facial Recognition Password Authentication 339
3.11.1 Intel Biometric Security Technology 340
3.11.2 Intel Healthcare 341
3.12 Qualcomm Biometric Security Technology 342
3.12.1 Qualcomm Snapdragon 343
3.13 BIO-key 345
3.13.1 BIO-Key Large Scale Biometrics 345
3.13.2 Bio-Key, Web-Key 346
3.13.3 Bio-Key Challenge: Protecting Gateways To Information 347
3.13.4 Bio-Key Extensible and Scalable Authentication Framework 348
3.13.5 BIO-key VST - Vector Segment Technology 352
3.13.6 Bio-Key Leader in Biometric Fingerprint Software 353
3.13.7 BIO-key for Healthcare 354
3.13.8 BIO-key for Identity and Access Management 355
3.13.9 BIO-key for Mobility 356
3.13.10 BIO-key Large Scale ID 359
3.13.11 BIO-key for End Users 360
3.13.12 BIO-key BSP ( Biometric Service Provider) 362
3.13.13 BIO-key International's BSP Advantages 362
3.13.14 BIO-key Finger-Based Biometric Identification / Personal Identity Verification 366
3.14 Precise Biometrics 368
3.14.1 Precise BioMatch™ Mobile 370
3.14.2 Precise Fingerprint Algorithm for Hardware Platforms 372
3.14.3 Precice Fingerprint Technology for Smart Cards 373
3.14.4 Precise Biometrics Tactivo 374
3.14.5 Precise Tactivo for iPhone 376
3.14.6 Precise Tactivo for iPad 377
3.14.7 Precise Tactivo Mini for Android 377
3.14.8 Precise Biometrics Easy App Integration 377
3.14.9 Precise Biometrics Smart Card Government Compliance 378
3.14.10 Precise Match-on-Card for National ID 378
3.14.11 Precise U.S. Government Solutions 380
3.14.12 Precise Enterprise Solutions for Secure Sign-On 382
3.14.13 Precise Biometrics Reduces Risk And Cost 383
3.14.14 Precise Secure Mobile Authentication for Enterprise 384
3.14.15 Precise Match-on-Card for Enterprise Solutions 386
3.14.16 Precise Biometrics Flexible Solution 387
3.14.17 Precise Biometrics Customization 387
3.14.18 Precise Partner Solutions 387
3.15 Fujitsu 389
3.15.1 Fujitsu PalmSecure® Mouse 389
3.15.2 Fujitsu PalmSecure Mouse 390
3.15.3 Fujitsu PalmEntryXS Access Control System 391
3.15.4 Fujitsu PalmSecure™ 393
3.15.5 Fujitsu PalmEntry™ Access Control System 395
3.15.6 Fujitsu PalmSecure Vein Recognition Technology 398
3.15.7 Fujitsu Med-Serv 50 400
3.15.8 Fujitsu Biometrics-as-a-Service Cloud Offering 403
3.16 Labcal India 403
3.16.1 Labcal India IrisAccess 7000 403
3.16.2 Labcal India IrisAccess 4000 405
3.16.3 Labcal India Iris Access Control 406
3.16.4 Labcal Be.U Mobile Series 407
3.16.5 Labcal Applications for the Be.U Mobile 408
3.17 SecuGen 411
3.17.1 SecuGen Hamster Pro20 411
3.17.2 SecuGen Hamster Pro Duo/CL 412
3.17.3 SecuGen Hamster Plus 414
3.17.4 SecuGen Hamster IV 416
3.17.5 SecuGen iD-USB SC 417
3.17.6 Benefits of Using SecuGen Peripherals 418
3.17.7 SecuGen OptiMouse Plus 419
3.18 NitGen & Company 421
3.18.1 NitGen eNBioAccess-T9 421
3.18.2 NitGen Fingkey Hamster DX 423
3.18.3 NitGen Fingkey Hamster DX 425
3.18.4 NitGen Fingkey Access Plus 427
3.18.5 NitGen NAC-5000 428
3.18.6 NitGen NAC-2500 Plus 429
3.18.7 NitGen Access Manager Pro 430
3.18.8 NitGen FIM Module 431
3.19 Atmel 433
3.20 Computer Science Corporation (CSC) 434
3.20.1 CSC Biometrics with CDISC & SDTM 434
3.20.2 CSC Identity Management Trusted Enterprise Suite 436
3.21 Accu-Time Systems 438
3.21.1 Accu-Time Systems Optimus2 438
3.21.2 Accu-Time Systems AccuTouch 441
3.21.3 Accu-Time Systems Maximus 443
3.21.4 Accu-Time Systems Prodigy 445
3.22 Avalon Biometrics 446
3.22.1 Avalon VeriDoc 446
3.22.2 Avalon VeriDocWeb 447
3.22.3 Avalon BioCap 447
3.22.4 Avalon Central Registration System 449
3.22.5 Avalon MVT - Mobile Application Suite - Enrolment / Verification / Identification terminal 450
3.23 Supra eKey 453
3.23.1 Supra eKey Basic 453
3.23.2 eKEY 453
3.23.3 eKEY Adapter for iPhone® and iPad® 455
3.23.4 eKey Professional 456
3.23.5 E Key ActiveKEY 456
3.23.6 eKey DisplayKEY 456
3.23.7 eKey Real Estate Agents Use SupraWEB 457
3.23.8 ekey home – Stand-alone Solution 457
3.23.9 ekey Home Finger Scanner Wall-Mounted 458
3.23.10 ekey Home Finger Scanner FSB 459
3.23.11 ekey Multi – Extended Stand-Alone Solution 460
3.23.12 ekey Multi Finger Scanner Outlet-Mounted 461
3.23.13 ekey Net – Networkable Solution 462
3.23.14 ekey Logon Server 463
3.24 Green Bit 466
3.24.1 Green Bit Livescans 466
3.24.2 Green Bit DactyScan26 467
3.24.3 Green Bit DactyScan26i 468
3.24.4 Green Bit Law Enforcement & P.A. 468
3.24.5 Green Bit Commercial Applications 469
3.24.6 Green Bit DactyMatch SDK 470
3.25 Merkatum: Biometrics Security & ID 471
3.25.1 Merkatum FaceFinder LE Targets Law Enforcement Agencies 472
3.25.2 Merkatum ELA Logical Authentication 473
3.25.3 Merkatum Bioscheduler Physical Access Control 474
3.25.4 Merkatum emfiva F/FRS 475
3.25.5 Merkatum ELA Logical Authentication 476
3.26 Suprema 477
3.26.1 Suprema BioStar 2 478
3.26.2 Suprema BioStar Automatic User Synchronization 478
3.26.3 Suprema BioStar 2 API 479
3.26.4 Suprema BioStar Mobile 480
3.26.5 Suprema BioStation 2 481
3.26.6 Suprema FaceStation 483
3.26.7 Suprema BioLite Net 490
3.26.8 Suprema BioLite Solo 491
3.26.9 Suprema BioEntry W 492
3.26.10 Suprema X-Station 493
3.26.11 Suprema Xpass 494
3.26.12 Suprema Xpass2 495
3.26.13 Suprema RealScan G10 496
3.26.14 Suprema RealScan D 498
3.27 UnionCommunity / Virdi 499
3.27.1 VIRDI AC F100 499
3.27.2 ViRDI AC 5000 500
3.28 Aware 500
3.28.1 Aware LiveScan API 500
3.28.2 Aware PreFace 502
3.28.3 Aware IrisCheck 504
3.28.4 Aware AccuScan 505
3.28.5 Aware AccuPrint 508
3.28.6 Aware Nexa 509
3.29 Vision-Box® 512
3.30 Zvetco Biometrics Products 514
3.31 Tyco Integrated Security Biometrics 514
3.31.1 Tyco Facial Recognition Profile 516
3.32 EgisTec 519
3.32.1 EgisTec Touch Sensor-ET300 Can Detect Fingerprint Conditions 520
3.32.2 EgisTec Image Quality 521
3.32.3 EgisTec Cloud 524
3.33 STMicroelectronics Biometric Solutions for Healthcare 526
3.33.1 STMicroelectronics Body Gateway 526
3.33.2 STMicroelectronics Lab-on-Chip 526
3.33.3 STMicroelectronics Pulse Generator for Ultrasound Imaging 527
3.33.4 STMicroelectronics’ Cooperation with French Start-ups and SMEs 528
3.34 SAIC 529
3.34.1 SAIC Voice Identity Biometrics Exploitation Services (VIBES) 529
3.34.2 SAIC Voice Biometrics Applications 530
3.35 Gemalto Avalon Biometrics Border Management 533
3.35.1 Gemalto Avalon Biometrics Document Verification of Travel & ID Documents 534
3.36 MotionQR 535
3.37 Next Biometrics 536
3.38 motionQR 538
3.38.1 M2SYS M2-EasyScan™ USB Fingerprint Reader 539
3.38.2 M2SYS M2-FuseID™ Advanced Fingerprint Reader 543
3.38.3 M2SYS M2-S™ Fingerprint Scanner 545
3.38.4 M2SYS M2-TenPrint™ – Fingerprint Live Scanner 548
3.38.5 M2SYS M2-TwoPrint™ Dual Fingerprint Scanner 550
3.38.6 M2SYS M2-PalmVein™ – Secure palm vein scanner 553
3.38.7 M2SYS M2-FingerVein™ – Non-invasive finger vein reader 556
3.38.8 M2SYS M2-AutoTilt™ Iris scanner – iris recognition camera 560
3.38.9 M2SYS Iris Reader – Cross Match I SCAN 2 Iris Camera 563
3.38.10 Jail & Prisoner Management System – PrisonSecure™ 566
3.38.11 M2SYS Workforce Management 569
3.38.12 M2SYS Biometric Patient Identification Solutions 570
3.38.13 M2SYS Automated Fingerprint Identification System (AFIS) 571
3.39 NEXT Biometrics 572
3.39.1 NEXT Biometrics Production Process 572
3.39.2 NEXT Biometrics Advantages of Polysilicon 573
3.39.3 NEXT Biometrics Module Level Competitiveness 573
3.39.4 NEXT Biometrics NB-2020-S 575
3.39.5 NEXT Biometrics NB-2010-S 577
3.39.6 NEXT Biometrics NB-0510 Chipset 577
3.39.7 NEXT Biometrics NB-1011-S 578
3.39.8 NEXT Biometrics NB-1010-S PCB Module 579
3.40 Agnitio Voice Biometrics Technology Commercial Products 580
3.40.1 Agnitio Kivox 360 580
3.40.2 Agnitio Kivox Passive Voice Detection 581
3.40.3 Agnitio Government Products 582
3.40.4 Agnitio BATVOX 583
3.40.5 Agnitio ASIS 584
3.40.6 Agnitio BS3 585
3.40.7 Agnitio SIFT 586
3.41 SIC Biometrics Smartphones Biometric Fingerprint Identification Solution586
3.41.1 SIC Biometrics Tablet Biometric Fingerprint Identification Solution 587
3.41.2 SIC Biometrics Touchprox – Biometric Proximity Security Card 588
3.41.3 SIC Biometrics Turnkey Mobile Biometric Security Solutions 590
3.42 Mobbeel MobbID 590
3.43 Cognitec Systems FaceVACS-VideoScan 591
3.43.1 Cognitec Systems FaceVACS-DBScan 592
3.43.2 Cognitec Systems Mobile Examiner 593
3.43.3 Cognitec Systems FaceVACS-Entry 593
3.43.4 Cognitec Systems FaceVACS-PortraitAcquisition 594
3.43.5 Cognitec Systems Facevacs Technology 594
3.44 Daon IdentityX 595
3.44.1 DaonEngine 597
3.44.2 Daon Mobile Authentication 599
3.44.3 Daon Border Management & Identification 599
3.44.4 Daon Identity Providers/NSTIC 602
3.45 Diamond Fortress PassPrint 603
3.46 FaceFirst Airports & Transportation 604
3.46.1 FaceFirst Commercial Security 605
3.46.2 FaceFirst Gaming 606
3.46.3 FaceFirst Law Enforcement 606
3.46.4 FaceFirst Retail 607
3.47 FotoNation FACEPOWER™ 608
3.47.1 FotoNation Fotosavvy™ 608
3.47.2 FotoNation Digitalaperture™ 609
3.47.3 FotoNation Lifefocus™ 609
3.48 IDtech360 Lumidigm Mercury M301 610
3.48.1 IDtech360 Lumidigm Mariner M311 611
3.48.2 IDtech360 Lumidigm v300 613
3.48.3 IDtech360 ViRDI AC5000 614
3.48.4 IDtech360 ViRDI AC6000 615
3.48.5 IDtech360 ViRDI AC7000 616
3.48.6 IDtech360 ViRDI AC-F100 617
3.49 Iris ID Iris Recognition Technology 617
3.49.1 Iris ID IrisAccess 7000 621
3.50 IriTech IriShield™ Series 622
3.50.1 IriTech IriMagic™ Series 624
3.50.2 IriTech IriHerald™ 626
3.51 WCC Smart Search & Match Border Control 628
3.51.1 WCC Justice & Public Safety 630
3.51.2 WCC Civil Identity 632
3.51.3 WCC ELISE Software Platform 633
3.52 Suprema Biometrics Products 634

4. Biometrics Technology 635
4.1 Enabling Biometric Fingerprint Technologies 635
4.1.1 Fingerprint Recognition 636
4.1.2 Fingerprint Technology 637
4.1.3 Fingerprint SDKs 638
4.1.4 Fingerprint Enabling Technology 639
4.1.5 Surface Texture Analysis 640
4.1.6 Capacitive Position Sensing Technology. 642
4.1.7 Capacitive Force Sensing Technology. 642
4.1.8 Transparent Capacitive Position Sensing Technology 643
4.1.9 Pattern Recognition Technology 643
4.1.10 Mixed-Signal Integrated Circuit Technology 643
4.1.11 Display Systems and Circuit Technology 645
4.1.12 Capacitive Active Pen Technology. 647
4.1.13 Microcontroller Technology 647
4.1.14 Fingerprint Sensing Technology 648
4.2 Facial Recognition: 648
4.2.1 Facial Recognition Provides Flexible Biometric Verification 648
4.2.2 NEC Biometrics Face Recognition Generalized Matching Face Detection Method (GMFD) 648
4.2.3 Adaptive Regional Blend Matching (ARBM) Method 649
4.2.4 Perturbation Space Method (PSM) 650
4.3 Enhancing Biometric Precision 652
4.4 Face Recognition Technology Flexible And Powerful 654
4.4.1 Facial Recognition SDKs 655
4.4.2 Facial Recognition Uses 655
4.4.3 Face Recognition Biometric System Deployment Considerations 656
4.4.4 Face Recognition Technology 656
4.5 Advanced Biometric Shape Recognition 657
4.5.1 Pattern Recognition 657
4.6 Technology Leaders: Confirmed by NIST 658
4.7 Rapid DNA Identification 658
4.8 Iris Reading Algorithms 659
4.8.1 Iris Reading Accuracy 661
4.9 Biometrics Impact On Network Operations 662
4.10 Enrollment And Identification 663
4.11 Neural Networks 664
4.12 Security of Biometric ID Systems 665
4.13 Perceptual Computing and Apps Detect Heart Rate 666
4.14 Biometric Standards 667
4.19.1 Safran Morpho Supports Compliance with Standards 667

5. Biometrics Company Description 669
5.2 Selected Biometric Industry Mergers and Acquisitions 669
5.2.1 Acquisition by Atos of Siemens IT Solutions and Services 2011 669
5.2.2 ST Microelectronics (Finger-Scan) Spins off UPEK 669
5.2.3 Motorola Selling Biometrics Business SAFRAN / Sagem SÄ 670
5.2.4 Safran Acquisition of L-1 Identity Solutions Formed From A Merger of Visage Technology, Inc. and Identix 670
5.2.5 3M Acquisition of Cogent 671
5.2.6 Amano USA Holdings, Inc. (AUH) acquired ATS 671
5.2.7 Apple Acquired AuthenTec 671
5.2.8 AuthenTec Acquisitions of SafeNet’s Embedded Security Solution Division, UPEK, Inc., PeerSec Networks and Proxure, Inc. 672
5.2.9 Smart Sensor Solutions 672
5.2.10 BIO-Key International / S.I.C. 672
5.2.11 Cross Match Acquired The Biometric Business of DigitalPersona 673
5.2.12 Cross Match Acquired Biometric Authentication Business of Labcal Technologies 673
5.2.13 Francisco Partners Acquired Cross Match Technologies 674
5.2.14 Gemalto / Avalon Biometrics 674
5.2.15 Dialog Semiconductor / Atmel 674
5.2.16 IdentiPHI 675
5.2.17 Steria 675
5.2.18 Symantec Acquires VeriSign Security Business 675
5.3 3M 675
5.3.1 3M at a Glance (Year-end 2014) 677
5.3.2 3M Revenue 677
5.3.3 3M Biometric Customers 680
5.3.4 3M Business Groups 681
5.3.5 3M/Cogent Systems 683
5.3.6 3M Cogent Advanced Technology 685
5.3.7 3M Business. 685
5.4 Agnitio 686
5.5 Amano USA Holdings, Inc / Accu-Time Systems 688
5.5.1 Accu-Time Systems 689
5.5.2 Amano Japan / Accu-Time Systems 691
5.6 Apple / AuthenTec 693
5.6.1 Authentec Revenue Recognition – Smart Sensors 694
5.6.2 Apple 696
5.6.3 Apple Business Strategy 697
5.6.4 Apple Products 697
5.6.5 Apple iPhone 698
5.6.6 Apple Mac Hardware Products 698
5.6.7 Apple iPod 699
5.6.8 Apple iTunes® 700
5.6.9 Apple Mac App Store 700
5.6.10 Apple iCloud 701
5.6.11 Apple Software Products and Computer Technologies 701
5.6.12 Apple Operating System Software iOS 701
5.6.13 Apple Mac OS X 702
5.6.14 Apple Third-Largest Mobile Phone Maker 702
5.6.15 Apple Revenue 702
5.6.16 Apple Regional Segment Operating Performance 704
5.6.17 Apple Net Sales 706
5.6.18 Apple iPhone Shipments 707
5.1.1 Apple iPad Shipments 708
5.7 Atos 709
5.8 Aware 709
5.8.1 Aware Company Overview 710
5.8.2 Aware DSL 711
5.8.3 Aware Revenue 712
5.8.4 Aware’s Strategy 714
5.8.5 Aware Mobile Biometric Solution 714
5.9 Bethcom 716
5.10 BIO-key 716
5.10.1 BIO-key Security Solutions 718
5.10.2 BIO-key Smart Phone Markets 720
5.10.3 BIO-key Business Model 721
5.10.4 BIO-key Identity Management, User Authentication, Privilege Entitlement and Access Control 722
5.11 Cognitec Systems 724
5.12 Communication Intelligence Corporation 725
5.12.1 CIC Revenue 725
5.12.2 CIC Customers 726
5.12.3 CIC Business 727
5.12.4 CIC Core Technologies 728
5.12.5 CIC Products 728
5.13 Cross Match / Francisco Partners 729
5.13.1 DigitalPersona 730
5.13.2 DigitalPersona Target Markets and Customers 731
5.13.3 Francisco Partners Sponsors Cross Match Technologies 736
5.13.4 Cross Match SEEK Avenger Handheld 737
5.13.5 Cross Match SEEK Avenger Customers 740
5.13.6 Cross Match Technologies Labcal 740
5.13.7 Cross Match Products 741
5.13.8 Cross Match Technologies Labcal 742
5.13.9 Labcal India 742
5.14 CSC 743
5.14.1 CSC Strategy 745
5.15 Daon 747
5.16 Dialog Semiconductor / Atmel 748
5.17 Diamond Fortress 749
5.18 EgisTec 751
5.19 FaceFirst 752
5.20 Fingerprint Cards AB 754
5.20.1 Fingerprint Cards Revenue 754
5.20.2 Fingerprint Cards’ Technology Competitive Advantages 756
5.20.3 Fingerprint Cards Sensor Technology Embraced by Microsoft 758
5.21 FotoNation 760
5.22 Fujitsu 761
5.22.1 Fujitsu Revenue 762
5.22.2 Fujitsu Technology Solutions Services 762
5.22.3 Fujitsu Biometrics-as-a-Service 762
5.22.4 Fujitsu Personal Computers 764
5.22.5 Fujitsu Development and Production Facilities 764
5.22.6 Fujitsu Corporate Strategy 770
5.22.7 Fujitsu Interstage 771
5.22.8 Fujitsu Acquires RunMyProcess Cloud Service Provider 771
5.23 Gemalto 773
5.23.1 Gemalto Group /Avalon Biometrics 776
5.23.2 Gemalto /Avalon Biometrics 777
5.23.3 Avalon Biometrics Solutions 778
5.23.4 Gemalto Avalon Biometrics Border Management 778
5.23.5 Gemalto Avalon Biometrics Document Verification of Travel & ID Documents 778
5.23.6 Gemalto Avalon Biometrics Live & Form-based Enrollment 779
5.23.7 Gemalto Avalon Biometrics Live Enrollment Solutions Mobile Applications 780
5.23.8 Avalon Biometrics 782
5.23.9 Avalon Biometrics SL Ghana Visa & Border Management System 785
5.24 Google 786
5.24.1 Google 2012 Corporate Highlights 786
5.24.2 Google Search 788
5.24.3 Google Revenue 789
5.24.4 Google Second Quarter 2013 Results 789
5.24.5 Google / Motorola 790
5.25 Goodix Technology 791
5.26 Green Bit 791
5.27 IBM Facial Recognition 794
5.27.1 IBM 794
5.27.2 IBM Strategy 794
5.27.3 IBM PureData System for Transactions 796
5.27.4 IBM Business Partners 797
5.27.5 IBM Messaging Extension for Web Application Pattern 798
5.27.6 IBM PureSystems Partners 798
5.27.7 IBM MobileFirst 798
5.27.8 IBM Business Analytics and Optimization Strategy 799
5.27.9 IBM Growth Market Initiatives 799
5.27.10 IBM Business Analytics and Optimization 800
5.27.11 IBM Strategy 801
5.27.12 IBM Smarter Planet 802
5.27.13 IBM Cloud Computing 803
5.27.14 IBM Business Model 804
5.27.15 IBM Business Revenue Segments And Capabilities 805
5.28 IdentiPHI 816
5.29 Idex 816
5.30 IDtech360 821
5.31 Integrated Biometrics 822
5.32 Intel 824
5.31.1 Intel Business 826
5.31.2 Intel Company Strategy 827
5.31.3 Intel In The Internet Of Things Market Segment 829
5.31.4 Intel Competitive Advantages 829
5.32 Interlink Electronics 831
5.33 Iris ID Systems 832
5.34 IriTech 833
5.35 RDSK / Litronic 835
5.35.2 Litronic Customers 835
5.35.3 Litronic Patents 836
5.36 M2SYS 837
5.37 Mereal Biometrics 842
5.38 Merkatum Biometrics Security & ID 842
5.38.2 Merkatum Target Customers 843
5.39 Mobbeel 843
5.40 Mobizent 844
5.41 NEC 845
5.41.2 NEC Revenue 846
5.41.3 NEC Leading Company In Small Cell Solutions 847
5.41.4 NEC Business Outline 849
5.42 Next Biommetrics 850
5.43 NitGen & Company 850
5.43.2 Nitgen & Company, Investment of US $38 Million 851
5.43.3 Nitgen Marine Oil Bunkering Business 851
5.43.4 Supply of Fingerprint Scanner with the Korean Government's National Electral System 852
5.44 Nuance 853
5.44.2 Nuance Voice Biometrics 854
5.45 Precise Biometrics 854
5.45.2 Precise Biometrics Customers 856
5.45.3 Precise Biometrics’ Tactivo™ Security Enhancements for Mobile Apps 856
5.46 Qualcom 858
5.46.1 Qualcomm 858
5.46.2 Qualcomm Business 858
5.46.3 QMC Offers Comprehensive Chipset Solutions 859
5.46.4 Qualcomm Government Technologies 860
5.46.5 Qualcomm Internet Services 861
5.46.6 Qualcomm Ventures 862
5.46.7 Qualcomm Revenue 864
5.46.8 Qualcomm / WiPower 865
5.47 Reserve Group / Integrated Biometrics 867
5.32.1 Integrated Biometrics Nanotechnology, Accurate, High Resolution, Analog Image Of The Fingerprint 868
5.32.2 Integrated Biometrics 869
5.33 Safran Morpho 871
5.33.1 Safran Morpho Identification Division 874
5.33.2 Safran Morpho e-Documents Division 880
5.33.3 Safran Morpho e-Documents Payments 880
5.33.4 Safran Morpho e-Documents Identity & Access Management 880
5.33.5 Safran Morpho Global Presence 881
5.33.6 Safran Morpho Detection Division 881
5.33.7 Safran Morpho Revenue 2015 885
5.33.8 Key figures for the first quarter of 2015 886
5.33.9 Safran Morpho Business Highlights 887
5.33.10 Safran Security Revenue 889
5.33.11 Morpho 890
5.33.12 Safran Morpho / Bioscrypt 892
5.33.13 Safran Morpho Civil Identification 894
5.33.14 Safran Aadhaar: Biometric Technology Driving An Economic And Social Revolution 894
5.34 Science Applications International Corporation (SAIC) 895
5.35 SecuGen 896
5.35.1 SecuGen Fingerprint Technology for Android 898
5.35.2 SecuGen Hamster IV Fingerprint Reader STQC Certification for India's UID Project 898
5.36 SIC Biometrics 899
5.37 SmartMetric 900
5.38 Smiths Detection 901
5.39 Steria 902
5.39.1 Steria Revenue 904
5.40 STMicroelectronics 911
5.40.1 ST Microelectronics (Finger-Scan) Creaes UPEK 914
5.41 Suprema 914
5.41.1 Suprema FVC Results 915
5.41.2 Suprema Revenue 917
5.42 Symantec 918
5.42.1 Symantec Security in Information-Driven World 918
5.42.2 Symantec Core Business Positioned for Growth 919
5.42.3 Symantec Acquires VeriSign Security Business 920
5.42.4 VeriSign Check Mark Signifying Trust Online 921
5.42.5 Symantec Creating Trusted Interactions Online 921
5.42.6 Symantec Revenue 923
5.43 Synaptics 925
5.43.1 Synaptics Customers 929
5.44 Tyco Integrated Security 930
5.44.1 Tyco 930
5.44.2 Tyco Regional Revenue 934
5.44.3 Tyco Revenue 936
5.45 UnionCommunity / Virdi 938
5.46 United Technologies Corporation / UTC Building & Industrial Systems / Supra 939
5.46.1 UTC / Interlogix 941
5.46.2 Supra 941
5.46.3 Supra / eKey 942
5.46.4 eKEY Basic 943
5.46.5 eKEY Professional 943
5.46.6 eKEY Hardware 943
5.47 Vision-Box 943
5.47.1 Vision-Box Border Control Biometrics 944
5.47.2 Vision-Box Facial Recognition Technology 944
5.48 WCC Smart Search & Match 946
5.47.1 WCC Market Focus 947
5.49 WHO 949
5.50 Witswell Consulting and Services / Cyber-SIGN 950
5.50.1 Cyber-SIGN Biometric Technology 950
5.51 Zvetco Biometrics 952
5.51.1 S Zvetco Biometrics Products 953
5.52 List of Companies Participating in the Biometrics Industry 954
5.52.1 Fingerprint Recognition solutions .. 955

List of Tables and Figures

Table ES-1 Types of Biometric Devices 50
Table ES-2 Biometric Device Target Markets 51
Table ES-3 Biometrics Devices Market Driving Forces 53
Table ES-4 Biometrics Devices Market Dynamics 55
Table ES-5 Biometrics Devices Market Restraints 55
Figure ES-6 Biometric Devices Market Shares, Dollars, Worldwide, 2014 56
Figure ES-7 Biometric Devices Market Forecasts Dollars, Worldwide, 2015-2021 58
Table 1-1 Index of Biometrics Types 64
Table 1-2 Biometrics Industry Segments 69
Table 1-4 Biometric Store & Forward Systems Functions 78
Table 1-12 Cloud System Continuous Deployment Models 95
Table 2-1 Types of Biometric Devices 98
Table 2-2 Biometric Device Target Markets 99
Table 2-3 Biometrics Devices Market Driving Forces 101
Table 2-4 Biometrics Devices Market Dynamics 103
Table 2-5 Biometrics Devices Market Restraints 103
Figure 2-6 Biometric Devices Market Shares, Dollars, Worldwide, 2014 104
Table 2-7 Biometrics Market Shares, Dollars, Worldwide, 2014 105
Table 2-8 NEC Analysis of Biometric Device Market Principal Competitive Factors 107
Table 2-9 NEC Analysis of Biometric Device Market Competitive Advantage Factors 109
Figure 2-10 Safran Morpho Identity Management 111
Figure 2-11 Cross Match SEEK® Avenger 116
Table 2-12 2-14 132 Biometrics Hybrid Fingerprint, Face Recognition, and Iris / Voice DNA By Vendor Market Shares, Dollars, Worldwide, 2014 132
Table 2-15 Biometrics Hybrid Fingerprint, Face Recognition, and Iris / Voice / DNA By Vendor, Market Shares, Percent, Worldwide, 2014 133
Table 2-16 Hybrid Fingerprint, Low End, Mid Range, and High End By Vendor Market Shares, Percent of Dollars, Millions of Dollars by Segment, Worldwide, 2014 134
Table 2-17 Hybrid Fingerprint Biometrics, Low End, Mid Range, and High End By Vendor Market Shares, Dollars, Number of Units, Worldwide, 2014 135
Table 2-18 Civil Identification Market Segments, National / State ID, Voting, Driver Licenses, Identity Management Biometrics Segments, Dollars and Units, Worldwide, 2015-2021 136
Figure 2-19 Biometric Devices Market Forecasts Dollars, Worldwide, 2015-2021 139
Table 2-20 Biometric Device Market Forecasts, Dollars, Shipments, Worldwide, 2015-2021 140
Table 2-21 Biometric Device Market Forecasts, Percent, Shipments, Worldwide, 2015-2021 141
Table 2-22 Biometric Market Trends 143
Table 2-23 Biometric Technology Market Growth Factors 144
Figure 2-24 Biometrics Market Segments, Fingerprint, Facial Recognition, Voice, Iris, Dollars, Worldwide, 2014 145
Table 2-25 Biometrics Segments, Fingerprint, Facial Recognition, Voice Recognition and Iris Scanning, Market Shares, Dollars, Worldwide, 2014 146
Table 2-26 NEC Multi-Modal Hybrid Finger Identification Characteriestics Measured 147
Figure 2-27 Law Enforcement Biometrics, Forecasts, Dollars, Worldwide, 148 2015-2021 148
Figure 2-28 Workplace Biometrics, Forecasts, Dollars, Worldwide, 2015-2021 152
Figure 2-29 Commercial ID Biometrics, Forecasts, Dollars, Worldwide, 2015-2021 155 Figute 2-30 158 Border Patrol and Government Biometrics, Forecasts, Dollars, Worldwide, 2015-2021 158
Table 2-31 Major Airports in the World 164
Figure 2-32 Biometric Regional Market Segments, 2014 176
Table 2-33 Biometrics Regional Market Segments, 2014 177
Figure 3-1 NEC Hybrid Finger Identification 185
Table 3-2 NEC Multi-Modal Hybrid Finger Identification Characteriestics Measured 186
Figure 3-3 NEC Multi-Biometrics 187
Table 3-4 NEC Multi-Biometric Authentication Technology Aspects 188
Table 3-5 NEC Multi-Biometric Authentication Technology Identification Solution Benefits 189
Figure 3-6 NEC Fingerprint Identification 189
Table 3-7 NEC Hybrid Finger Identification Characteristics 191
Figure 3-8 NEC Hybrid Finger Identification Product Configurations 192
Figure 3-9 NEC NeoScan 45 Mobile Fingerprint Capture Device 193
Table 3-10 NEC NeoScan 45 Mobile Fingerprint Capture Device Features 194
Table 3-11 NEC Face Recognition Features 198
Table 3-12 NEC FastID Features 200
Table 3-13 NEC FastID Applications 201
Table 3-14 NEC Integra-ID Benefits 202
Table 3-15 NEC Fingerprint Identification Features 210
Figure 3-16 NEC Fingerprint Identification 210
Table 3-17 NEC Portable DNA Analyzer Features 211
Table 3-18 NEC Portable DNA Analyzer Step by Step Procedures 212
Table 3-19 NEC Portable DNA Analyzer Technical Highlights 213
Figure 3-20 NEC Portable DNA Analyzer 214
Figure 3-21 NEC Portable DNA Analyzer STR by Electrophoresis Analysis / Analysis Program 217
Table 3-22 Safran Morpho Government ID Solutions 219
Figure 3-23 Safran Morpho MorphoCivis™ 220
Table 3-24 Safran Morpho Population & Voter Registration Modules 221
Table 3-25 Morpho's Population Registration Solutions Technology 222
Table 3-26 Safran Morpho National ID Graphically And / Or Electronically Personalized 223
Table 3-27 Safran Morpho Civil Identity Management Travel Document Biometrics Advantages 224
Figure 3-28 Safran Morpho Identity Management 228
Table 3-29 Safran Morpho Public And Private Sector Security Systems Solutions 229
Table 3-30 Safran Morpho Solutions for Financial Institutions 232
Table 3-31 Safran Morpho Solution Elements for Telecom 234
Table 3-32 Safran Morpho Access Control Terminal Types 237
Figure 3-33 Safran Morpho MorphoAccess® SIGMA Series 238
Table 3-34 Safran Morpho Morphoaccess® and Bioscrypt Sigma Series Features 239
Figure 3-35 Safran Morpho MorphoAccess® J Series 240
Figure 3-36 Safran Morpho MorphoAccess® J Series Models and Main Features 241
Figure 3-37 Safran Morpho Bioscrypt 4G V-Flex Lite 242
Table 3-38
Figure 3-39 Safran Morpho Bioscrypt 4G V-Station Extreme 244
Table 3-40
Figure 3-41 Safran Morpho Bioscrypt 4G V-Station Extreme 246
Table 3-42
Figure 3-43 Safran Morpho Morpho 3D Face Reader Features 248
Table 3-44 Morpho 3D Face Reader Main features 249
Figure 3-45 Safran Fingerprint Recognition 250
Table 3-46 Safran Morpho System Aspects 252
Figure 3-47 Safran Morpho MorphoPerso 253
Table 3-48 MorphoPerso ID Documents Lifecycle Management Flexible Solution 255
Figure 3-49 Safran Morpho MorphoCheck™ 256
Figure 3-50 Safran Morpho MorphoRapID™ 257
Figure 3-51 Safran Morpho MorphoTouch™ 1200 Series 258
Figure 3-52 Safran Morpho MorphoTouch™ 1200 Series Features 259
Figure 3-53 Safran Morpho MorphoBIS 260
Table 3-54 MorphoBIS, Morpho’s Next Generation AFIS Functions 261
Table 3-55 MorphoBIS, Morpho’s next generation AFIS Features 262
Figure 3-56 Safran Morpho MetaMorpho 263
Table 57 MetaMorpho™ ABIS Store And Management of Fingerprints And Palm Prints In A Single Database Feratures 264
Figure 3-58 Safran Morpho Outdoor MorphoAccess® 500 Series 266
Table 3-59 MetaMorpho™ MorphoAccess® (OMA) 500 Series High-Performance Fingerprint Identification Terminals Features 267
Figure 3-60 Safran Morpho Secure Biometric Access 268
Figure 3-61 3M Biometric Enrollment Station 270
Table 3-62 3M Cogent Systems Multi-Biometric Scale Document Issuance Program Target Markets: 271
Table 3-63 3M Cogent Systems Multi-Biometric Enrollment Station (CBES) Key Features: 272
Table 3-64 3M Biometric Enrollment Station Features 273
Table 3-65 3M Facial Identification Management Solution Features 274
Figure 3-66 3M Identity Document Issuance System 275
Table 3-67 3M Facial Identity Document Issuance System 276
Table 3-68 3M Border Management System Features 277
Table 3-69 3M Cogent Systems CAFIS Features 279
Table 3-70 3M CAFIS Agency Solutions: 280
Table 3-71 3M CAFIS Features 281
Table 3-72 3M Cogent Systems Prime Full Function AFIS for Local Law Enforcement Agencies Features: 282
Table 3-73 3M Cogent Systems CAFIS Functional Capabilities 283
Table 3-74 3M Cogent Systems Biometric Enrollment Software Key Features: 285
Table 3-75 Cross Match Technologies Biometrics Offerings: 288
Table 3-76 Cross Match Multi-factor Government Solutions Features 289
Table 3-77 Cross Match Solutions for Law Enforcement Features 290
Table 3-78 Cross Match Government Solutions Features 291
Table 3-79 Cross Match Retail Solutions Features 292
Figure 3-80 Cross Match Eikon USB Biometric Readers 292
Table 3-81 Cross Match Eikon USB Biometric Reader Features 293
Figure 3-82 DigitalPersona Biometrics, Multi-Factor Authentication and Access Management 294
Table 3-83 DigitalPersona Biometrics, Multi-Factor Authentication and Access Management Functions 295
Figure 3-84 DigitalPersona Pro Enterprise 296
Table 3-85 DigitalPersona Biometrics, Multi-Factor Authentication Pro Enterprise Features 297 DigitalPersona, Inc. ikonTouch 700Features 301
Figure 3-86 Apple Passbook Application 304
Figure 3-87 Apple Touch Gesture Biometrics 309
Figure 3-88 Fingerprints Card AB FPC1155 311
Table 3-89 Fingerprint Cards AB FPC 1155 Features 312
Figure 3-90 Fingerprints Card AB FPC1145 312
Table 3-91 Fingerprint Cards AB FPC1145 Features 313
Figure 3-92 Fingerprints Card AB FPC1150 314
Table 3-93 Fingerprint Cards AB FPC1150 Features 315
Figure 3-94 Fingerprints FPC1011F3 Area 316
Table 3-95 Fingerprints FPC1011F3 Area 317
Figure 3-96 Fingerprints FPC1080A Swipe 318
Table 3-97 Fingerprints FPC1080A Swipe 319
Figure 3-98 Fingerprints FPC2020 320
Table 3-99 Fingerprints Card FPC2020 321
Table 3-100 Atos ID Center XS Features 323
Table 3-101 Synaptics Biometrics Solutions Benefits 328
Table 3-102 Synaptics Natural ID Features 331
Figure 3-103 Integrated Biometrics Sherlock 334
Figure 3-104 Integrated Biometrics Watson Mini 335
Figure 3-105 Integrated Biometrics Columbo 336
Figure 3-106 Intel True Key 339
Figure 3-107 Qualcomm Snapdragon 343
Table 3-108 Qualcomm Snapdragon Features 344
Table 3-109 Bio-Key Large Scale Biometrics Features 346
Figure 3-110 Bio-Key WEB-key Flexible Services, Administrative Tools And Connecting APIs Workflow 349
Table 3-111 Bio-Key WEB-key Flexible Services, Administrative Tools And Connecting APIs Workflow 350
Table 3-112
Table 3-113
Table 3-114 BIO-key VST Benefits 353
Table 3-115 BIO-Key International Biometric Technology Solutions 358
Table 3-116 BIO-key Large Scale ID Features 359
Table 3-117 BIO-key Large Scale ID Functions 360
Table 3-118 BIO-key for End User Systems 361
Table 3-119 BioAPI Consortium Standard API 362
Table 3-120 BIO-key's SDK Software Development Kit Features 363
Table 3-121 BIO-key Authentication Technology Benefits 364
Figure 3-122 BIO-key Biometric Tools Offered 365
Figure 3-123 Precise BioMatch™ Mobile 370
Figure 3-124 Precise Fingerprint Algorithm for Hardware Platforms 372
Figure 3-125 Precise Fingerprint Technology for Smart Cards 373
Table 3-126 Precise Biometrics Tactivo Functions 375
Table 3-127 Precise Biometrics Tactivo Uses 376
Table 3-128 Precise Biometrics Smart Card Product Features 378
Table 3-129 Precise Match-on-Card for National ID Features 379
Table 3-130 Precise Biometrics U.S. Government Solutions 380
Figure 3-131 Precise Enterprise Solutions for Secure Sign-On 382
Figure 3-132 Precise Secure Mobile Authentication for Enterprise 384
Table 3-133 Precise Biometrics Tactivo Features: 385
Figure 3-134 Precise Match-on-Card for Enterprise Solutions 386
Table 3-135 Precise Biometrics Security Functions 388
Figure 3-136 Fujitsu PalmSecure® Mouse 389
Figure 3-137 Fujitsu PalmEntryXS Access Control System 391
Table 3-138 PalmEntryXS Features 392
Table 3-139 PalmEntryXS Benefits 392
Figure 3-140 Fujitsu PalmSecure™ 393
Table 3-141 PalmSecure™ Features 394
Figure 3-142 Fujitsu PalmEntry™ Access Control System 395
Table 3-143 Fujitsu PalmEntry Target Markets 396
Table 3-144 Fujitsu PalmEntry Market Positioning 397
Table 3-145 PalmEntry™ Access Control System 399
Figure 3-146 Fujitsu Med-Serv 50 400
Figure 3-147 Fujitsu Med-Serv 50 Kiosk Features 401
Table 3-148 Fujitsu Med-Serv 50 Features 402
Figure 3-149 Labcal India Iris Access Control 406
Table 3-150 Labcal Be.U Mobile Series Biometric Features 408
Figure 3-151 SecuGen Hamster Pro20 411
Figure 3-152 SecuGen Hamster Pro Duo/CL 412
Figure 3-153 SecuGen Hamster Plus 414
Figure 3-154 SecuGen Hamster IV 416
Figure 3-155 SecuGen iD-USB SC 417
Figure 3-156 SecuGen OptiMouse Plus 419
Figure 3-157 NitGen eNBioAccess-T9 421
Table 3-158 NitGen eNBioAccess-T9 Feature 422
Figure 3-159 NitGen Fingkey Hamster DX 423
Table 3-160 NitGen Fingkey Hamster DX Features 424
Figure 3-161 NitGen eNBioSecure 425
Table 3-162 NitGen eNBioSecure Features 426
Figure 3-163 NitGen Fingkey Access Plus 427
Figure 3-164 NitGen NAC-5000 428
Figure 3-165 NitGen NAC-2500 Plus 429
Figure 3-170 NitGen Access Manager Pro 430
Figure 3-171 NitGen FIM Module 431
Table 3-172 NitGen & Company FIM Module Biometrics Functions 432
Table 3-173 CSC Biometrics with CDISC & SDTM 435
Table 3-174 CSC’s Trusted Identity Enterprise Suite Full-Spectrum, Fully Integrated Solution Portfolio Modules 437
Figure 3-175 Accu-Time Systems Optimus2 438
Table 3-176 Accu-Time Systems Optimus2 Features 440
Figure 3-177 Accu-Time Systems AccuTouch 441
Table 3-178 Accu-Time Systems Maximus 444
Figure 3-181 Accu-Time Systems Prodigy 445
Table 3-182 Accu-Time Systems Prodigy Feature 446
Figure 3-183 Avalon Central Registration System 449
Table 3-184 Avalon MVT - Mobile Application Suite Components 451
Table 3-185 Avalon MVT - Mobile Application Suite Key Features 452
Figure 3-186 Supra eKey Basic 453
Table 3-187 dsaeKey smartphone or
Tablet as lockbox key 454
Table 3-188 ekey multi – Extended Stand-Alone Solution Features 455
Table 3-189 ekey Home Finger Scanner Feature Highlights 458
Figure 3-190 ekey Home Finger Scanner Wall-Mounted 2.0 458
Figure 3-191 ekey Home Finger Scanner FSB 459
Table 3-192 ekey multi – Extended Stand-Alone Solution Features 460
Figure 3-193 ekey Multi Finger Scanner Outlet-Mounted 461
Table 3-194 ekey Net – Networkable Solution Features 463
Table 3-195 ekey Logon Server Functionality 465
Table 3-196 ekey Logon Server Benefits 465
Figure 3-197 Green Bit DactyScan26 467
Figure 3-198 Green Bit DactyScan26i 468
Table 3-199 Characteristics of Green Bit Scanners 469
Table 3-200 Green Bit DactyMatch SDK 471
Table 3-201 Merkatum FaceFinder LE Benefits 473
Table 3-202 Merkatum ELA Logical Authentication Benefits 474
Table 3-203 Merkatum Bioscheduler Benefits 475
Figure 3-204 Merkatum emfiva F/FRS 475
Table 3-205 Merkatum ELA Logical Authentication Benefits: 477
Figure 3-206 Suprema BioStation 2 481
Figure 3-207 Suprema FaceStation 483
Figure 3-208 Suprema BioLite Net 490
Figure 3-209 Suprema BioLite Solo 491
Figure 3-210 Suprema BioEntry W 492
Figure 3-211 Suprema X-Station 493
Figure 3-212 Suprema Xpass 494
Figure 3-213 Suprema Xpass2 495
Figure 3-214 Suprema RealScan G10 496
Figure 3-215 Suprema RealScan D 498
Figure 3-216 VIRDI AC F100 499
Figure 3-217 ViRDI AC 5000 500
Figure 3-218 Aware PreFace 503
Figure 3-219 Aware IrisCheck 505
Figure 3-220 Aware AccuCheck 507
Figure 3-221 Aware AccuPrint 508
Figure 3-222 Aware Nexa 509
Table 3-223 Aware Primary Biometrics Systems Target Markets 511
Table 3-224 Tyco Facial Recognition Specifications 515
Table 3-225 Tyco Facial Recognition Special 516
Table 3-226 Tyco Facial Recognition Parameters 517
Table 3-227 Tyco Full Range Of Access Control Solutions 519
Table 3-228 EgisTec Touch Sensor Detection of Fingerprint Sensor Module And Conditions520
Figure 3-229 EgisTec’s Unique E-Field (Capacitance) Imaging Technology 522
Table 3-230 EgisTec Image Quality Advantages 523
Table 3-231 EgisTec Key Features of CloudHub 525
Table 3-232 ST Innovation Clusters 528
Table 3-233 SAIC Voice Biometrics Open Architecture Functions 531
Table 3-234 SAIC Voice Biometrics Open Architecture Features 532
Table 3-235 SAIC Voice Biometrics Open Architecture Benefits 533
Table 3-236 NEXT Biometrics Product Formats 537
Figure 3-237 M2SYS M2-EasyScan 539
Table 3-238 M2SYS M2-EasyScan Features 541
Table 3-239 M2SYS M2-EasyScan Benefit 542
Figure 3-240 M2SYS M2-FuseID 543
Table 3-241 M2SYS M2-Fuse ID Feature 544
Figure 3-242 M2SYS M2-S™ Fingerprint Scanner 545
Table 3-243 M2SYS M2-s Fingerprint Scanner Feature 546
Table 3-244 M2SYS M2-s Fingerprint Scanner Feature 547
Figure 3-245 M2SYS M2-TenPrint 548
Table 3-246 M2SYS M2-TenPrint Feature 549
Figure 3-247 M2SYS M2-TwoPrint 550
Table 3-248 M2SYS M2-TwoPrint Feature 551
Table 3-249 M2SYS M2-TwoPrint Feature 552
Figure 3-250 M2SYS M2-PalmVein 553
Table 3-251 M2SYS M2-PalmVein Feature 554
Table 3-252 M2SYS M2-PalmVein Feature 555
Figure 3-253 M2SYS M2-FingerVein 556
Table 3-254 M2SYS M2-TwoPrint Feature 558
Table 3-255 M2SYS M2-TwoPrint Feature 559
Figure 3-256 M2SYS M2Auto-Tilt 560
Table 3-257 M2SYS M2-AutoTilt Feature 561
Table 3-258 M2SYS M2-AutoTilt Feature 562
Figure 3-259 M2SYS IrisReader 563
Table 3-260 M2SYS IrisReader Feature 564
Table 3-261 M2SYS IrisReader Feature 565
Figure 3-262 M2SYS PrisonSecure 566
Table 3-263 M2SYS PrisonSecureFeature 568
Table 3-264 Element Testing Performed In Next Engineering Labs 574
Figure 3-265 NEXT Biometrics NB-2020-S 575
Figure 3-266 NEXT Biometrics NB-3010-U 576
Figure 3-267 NEXT Biometrics NB-1011-S 578
Figure 3-268 NEXT Biometrics NB-1010-S PCB Module 579
Figure 3-269 Biometrics TOUCHPROX – Biometric Proximity Security Card 588
Table 3-270 SIC Biometrics Touchprox - Biometric Proximity Security Card Features 589
Table 3-271 SIC Biometrics Touchprox - Biometric Proximity Security Card Benefits 589
Figure 3-272 Cognitec Systems FaceVACS-VideoScan 591
Figure 3-273 Daon IdentityX Biometric Platform Components 595
Table 3-274 IdentityX Platform Functions 596
Figure 3-275 Daon Border Management & Identification 601
Table 3-276 Daon’s Solutions For Federated Identity Management Features 603
Table 3-277 FaceFirst® Identification Facial Recognition Functions 605
Figure 3-278 IDtech360 Lumidigm Mercury M301 610
Figure 3-279 IDtech360 Lumidigm Mariner M311 611
Figure 3-280 IDtech360 Lumidigm v300 613
Figure 3-281 IDtech360 ViRDI AC5000 614
Figure 3-282 IDtech360 ViRDI AC6000 615
Figure 3-283 IDtech360 ViRDI AC7000 616
Figure 3-284 IDtech360 ViRDI AC-F100 617
Figure 3-285 IriTech IriHerald™ 626
Table 3-286 WCC Smart Search & Match Border Control Systems Features 629
Table 3-287 ELISE Software Platform Features 634
Figure 3-288 Suprema Biometrics Products 634
Figure 4-1 Biometric Fingerprint Pattern Measurements 637
Table 4-2 Human Interface Semiconductor Product Solutions Key Technologies 641
Table 4-3 Mixed-Signal Integrated Circuit Modules 644
Table 4-4 Display Systems and Circuit Technology Functional Block Modules 646
Figure 4-5 NEC Facial Recognition Multiple Matching Face Detector 649
Figure 4-6 Adaptive Regional Blend Matching (ARBM) Facial Recognition Method 650
Figure 4-7 NEC Perturbation Space Method (PSM) Facial Recognition Technology 651
Table 4-8 681 3M Values 681
Table 5-2 3M Business Groups 681
Table 5-3 3M Cogent Solutions Benefits 684
Table 5-4 3M Cogent Solutions Target Markets 684
Table 5-5 ATS Positioning 692
Table 5-6 Key Elements of Aware Strategy: 715
Table 5-7 BIO-key Authentication Technology Benefits 719
Figure 5-8 BIO-key Biometric Tools Offered 720
Table 5-9 BIO-key Key Areas For Market Growth 721
Table 5-10 DigitalPersona Customers 732
Table 5-11 DigitalPersona Technology Positioning 733
Table 5-12 DigitalPersona Fingerprint Biometrics for Commercial and Civil ID Applications735
Figure 5-13 Cross Match SEEK Avenger Handheld 738
Table 5-14 CSC Operating Model for Efficiency 745
Figure 5-15 Diamond Fortress Cell Phone Image Fingerprint 750
Table 5-16 Fingerprint Cards AB Profile 757
Table 5-17 Fingerprint Cards FPC’s Technology Competitive Advantages 758
Table 5-18 Fingerprint Cards Sensor Technology Target Markets 759
Table 5-19 Fujitsu and ImageWare Deliver Market Leading Cloud-Based Biometric Identity Management Solutions Benefits: 763
Figure 5-20 Fujitsu Main Products 765
Figure 5-21 Fujitsu Global Business 766
Figure 5-22 Fujitsu Geographical Market Participation 767
Figure 5-23 Fujitsu Global Alliances 768
Figure 5-24 Fujitsu Mixed IT Environments Forecasts 769
Table 5-25 Fujitsu Facts 770
Table 5-26 Gemalto Avalon Biometrics Live Enrollment Solutions 781
Table 5-27 Avalon Biometrics Target Markets 783
Table 5-28 Green Bit Market Sectors: Law Enforcement, Public Authority and Commercial Applications 793
Table 5-29 IBM PureSystems Target Industries 796
Figure 5-30 Idex Customers 817
Figure 5-31 Idex Strong Validation of Fingerprint Sensor Mass Adoption 819
Figure 5-32 Idex Main Mass Market Applications 820
Table 5-33 Integrated Biometrics Partners 823
Table 5-34 Interlink Electronics Force-Sensing Resistor (FSR®) Technology Applications 831
Table 5-35 Interlink Electronics Force-Sensing Resistor (FSR®) Technology Market Segments 832
Figure 5-36 IriTech Regional Presence 833
Figure 5-37 IriTech Partners 834
Table 5-38 Litronic Patents 836
Table 5-39 M2SYS Biometric Platform Positioning 838
Table 5-40 M2SYS Biometric Platform Projects 839
Table 5-41 M2SYS Biometric Platform Functions 840
Table 5-42 M2SYS Suite Of Biometric Identity Management Solutions 841
Figure 5-43 Mobbeel Customers 844
Table 5-44 Integrated Biometrics Target Markets 869
Table 5-45 Safran Morpho Profile 873
Table 5-46 Safran Morpho Technology Position In The Security Chain 873
Table 5-47 Safran Morpho Identification Division Positioning and Target Markets 874
Table 5-48 Safran Types of Threat Detection 875
Table 5-49 Safran Threat Detection Technologies 876
Figure 5-50 Safran Systems Deployed In The Field 877
Table 5-51 Safran Morpho Identification Division 879
Table 5-52 Safran Morpho e-Documents Divisions 882
Table 5-53 Safran Morpho Detection and Divisions 883
Figure 5-54 Morpho Booking Stations 891
Figure 5-55 Morpho Fingerprint Identification System 892 Source: Morpho. 892
Table 5-56 S.I.C. Biometrics Mobile / Portable Biometric Security solutions 900
Figure 5-57 Steria IT Enabled Business Services 903
Figure 5-58 Suprema Biometrics Products 916
Table 5-59 Symantec Creating Trusted Interactions Online 922
Table 5-60 Synaptics Biometrics Solutions Benefits 927
Table 5-61 Synaptics Biometrics Solutions Features 928
Table 5-62 Synaptics OEM Customers In Fiscal 2015 929
Figure 5-63 Tyco Security Business 931
Figure 5-64 Tyco Mission Critical Solutions 932
Figure 5-65 Tyco Customers 933
Figure 5-66 Witswell Consulting and Services Cyber-SIGN Biometric Technology 951

Date of Publication:
Oct 16, 2015
File Format:
PDF via E-mail
Number of Pages:
1003 Pages
Type the characters you see in the picture above.