BALETRON has included biometric systems in its Access Control configurations two years ago. This provides solutions and makes it possible for the system to be integrated according to the scenarios provided by the customer. The systems are therefore installed based on the risk analysis carried out by our company to provide turnkey solutions with an optimum equipment configuration.
Biometric devices, used as stand-alone or integrated systems are designed by making use of the measurable unique physical human characteristics for identity verifications.
Biometric solutions that utilize measurable unique human body parts are as follows: Finger Print Identification System, Face Recognition System, Iris Identification System, Retina Identification System, Hand Geometry Identification System and Palm vein Identification System.
Biometric solutions transform the biometric characteristics of an individual into a unique code for that particular individual, which is recorded electronically for comparison with the data of other real people in question for an active identification. Biometric systems are intended to check the passage/access of people and to distinguish authorized people from non-authorized.
Unlike its widely used counterparts that use cards or codes, biometric systems are almost impossible to imitate. Imitating the unique human body parts means reproducing it. Moreover, biometric systems do not allow the authorized person to use his biometric identity to allow another person access. This is because the system identifies authorized individual’s unique characteristics and behavior. This also eliminates the risk of lost cards or forgotten codes. The system therefore ensures maximum security without any risk of lost, stolen cards or forgotten codes as in the case of conventional access control systems.
Fingerprint identification: The fingerprint, uniquely created in accordance with human nature, and therefore as the most reliable encryption method is used.
Finger-tip-like structure is actually located in the recesses and protrusions of the map is a kind of income. The distance between the cores and cavities fingerprint reading devices, curves, angles, and a certain distance from each other by detecting a particular encryption algorithm creates points. This algorithm is based on the previously recorded fingerprint within the device matching a fingerprint to the device occurs again.
Finger does not contact the user directly to the sensor. The sensor reads the fingerprint field has a protective dark glass, so that the device is very sensitive probe of oil, dirt is not affected by external agents, such as. In this way, which is highly accurate fingerprint sensor reading is an extremely long life. Fingerprint recognition system with the existing system, (card / coded or Attendance) software can be integrated very easily.
Face Recognition: Thanks to the advanced optical technology and facial pattern extraction algorithm, face images are obtained in many different ways. Images obtained by combining real-time three-dimensional images by means of special procedures are hanil. Merge and matching processes occur simultaneously. The system can operate day and night, to move with a variable environment, a lot of light. It is compatible with existing access control systems.
First, high-resolution optical cameras scanned the human face. As a result of this scan from the human face each other in certain areas and these points are determined and they are removed by reference to a map of the human face biometric.
Iris Identification: Layer of the iris in the footsteps of the finger as well as every person is different. A copy of the iris is absolutely not the same as any other human being. Completes the development of the structure of the iris in a few months from birth, and then do not change the very structure of the iris.
High-resolution structure of the eye via sensors in order to detect the iris scan is done on the differences and the structure of the eye will be saved. Then, when the user's eye is scanned, the device's memory mapped and compliance records if granted, the user can be logged.
Hand and Palm Vein Identification Systems. Vein recognition biometric system, biometric hand on the vein pattern recognition is the structure and blood flow. All people are different vascular pattern. Blood vessels in the skin of six-vessel view on the recognition process to be manually started with the process, the main artery through the lines of the image feature extraction algorithm is parsed and each person applying for the ID code defining records to the database is formed. In addition, the temperature of blood vessels by analyzing the user's hand to read the system notice and any copying or inanimate, is invalid counts
Hand Geometry: Hand Geometry System, such as the physical characteristics of the users hands and fingers can be measured based on the principle of three-dimensional environment. This system used a fingerprint or palm. All people are different hand geometry. Hand recognition process, the geometric structure on the handheld with the measurement method is initiated with the lengths of the point, and subtracted from the measurement algorithm over the records to the database by creating custom code for each person shall be decisive. Then when the user puts his hand scanner images of the scanned image is compared to a pre-defined hand. Hand geometry recognition systems, card, password or pin number because they are much more reliable than using the other detection methods are preferred.
Sales engineers of our company look forward to your invitation to carry out a free cost assessment to find an optimum solution specific to your premises according to your budget in the field of biometric systems of fingerprint and hand recognition.