Capture Trust

MOBILE BIOMETRICS
OCR
IDENTITY DOCUMENT PROCESSING
Biometric Data Matching
BIOMETRIC IDENTITY MANAGEMENT
Digital Identity
DIGITAL IDENTITY

Who are you? and,
Are you really you?

Automated Biometric Identification System (ABIS) is used for creating a large-scale biometric database capable of performing both 1:1 (verification) and 1:N (identification) matching processes.

  • Biometric IDENTIFICATION answers the question “Who are you?”. An example of biometric identification is searching a biometric database using a newly taken mugshot during a police booking to see if that individual is already registered.
  • Biometric VERIFICATION answers the question, “Are you really you?” An example of biometric verification is using facial recognition to unlock a smartphone

ABIS

Touchless ID’s ABIS is a mission-critical multi-biometric platform for ID matching projects that allows real-time identification and verification of a person by face and fingerprints.

  • Data at rest and in transit is encrypted and APIs are protected by authentication and authorisation.
  • Application data stores are decoupled by design, allowing for implementation of centralized access to ensure privacy and security.

Benefits

  • COST EFFICIENCY: The use of commercial off-the-shelf infrastructure, small hardware footprint, and centralized system management all contribute to a low cost of ownership.
  • EASE OF INTEGRATION: The availability of a REST API as the key interface to ABIS ensures that any required integration is effortless and fast.
  • TOP TIER BIOMETRIC PERFORMANCE: The high accuracy of ABIS is fueled by Finger and Face core Touchless ID biometric recognition performance, as tested by NIST.

Easy and Secure

  • EASY UPGRADABLE BIOMETRIC SDK: is designed to allow easy upgrades of the underlying core biometric SDK with minimum changes.
  • DESIGNED FOR MANAGEABILITY: The application is instrumented and exposes metrics and management interfaces. These are required for performance measurement and tracking. The log format for each component is standardized for log aggregator such as logstash / sumologic that can do the analytics and performance measurements.
  • SECURE: The application is based on secure lifecycle standards and includes built-in security. Data at rest is encrypted.

Scalable and Resiliency

  • INFRASTRUCTURE INDEPENDENT & AGNOSTIC: ABIS incorporates technologies that are platform and OS independent.
  • ALWAYS AVAILABLE: Resiliency is designed into the application so that failures in the infrastructure are handled fluidly without interruption of service. Failure in components will be handled by redundant components and graceful reduction in capacity vs. interruption.
  • SCALABLE ARCHITECTURE: There are considerations for both vertical and horizontal scalability.Special consideration is given to components like matcher nodes that cannot simply follow standard design principles.