SlideShare a Scribd company logo
1 of 5
Download to read offline
NEC’s Digital Platform
For Federal Agencies
NEC National Security Systems (NSS)
provides digital identification solutions enhanced by artificial intelligence (AI)
and machine learning (ML) technologies to, Homeland Security, Intelligence, Federal
Judicial and Law Enforcement and Military agencies. We develop and deploy digital
identification ecosystems for access control, identity verification, border control,
and transportation security, among other applications. NEC NSS is here to support
agencies that face tight budgets, waning personnel resources, obsolete
technologies, and increasing performance demands.
NSS tailors your
solution, accelerates
time to operational
capability
Now, more than ever, agencies look to technology as a
cost-effective force-multiplier. As agency operations and
responsibilities change and evolve, our solution architects, system
engineers, and laboratory scientists constantly work to develop solutions
for federal agencies’ now, next, and after-next operational requirements.
At the onset of COVID-19, we rapidly responded to government agencies
and public needs with contactless technologies that support hygienic
interactions while maintaining safety and security.
NEC NSS remains the government’s visionary technology partner: Today we
provide a platform that aggregates, expands, and enhances systems capabilities
into a multifunctional digital ecosystem designed to support current and future
federal operations.
2
THE NEC DIGITAL PLATFORM (NDP)
is a foundational solution designed to support federal agencies
as they navigate digital identification and information ecosystems.
NDP positions agencies to rapidly expand or enhance their existing
systems, and the capability to integrate future technologies
without undertaking a massive and costly system overhaul.
NEC is known for our industry-leading identity
verification capabilities: our face, iris, fingerprint, and
latent print algorithms have ranked No. 1 in major tests
conducted by the National Institute of Standards and
Technology (NIST) for more than a decade.1
The NDP
streamlines the use of our secure biometrics and
identity and document verification capabilities, and
speeds the assembly of complex or challenging
processes or services.
Designed as an extensible framework, the NDP is
open to integration of a wide array of technologies
on demand. This framework provides customers an
accelerated time-to-market for their desired services
Access
Management
Advanced
Analytics
Identity
Management
Immigration &
Border Security
Scene
Processing
Transportation
Security
Business Process & Workflow AI / Deep Learning API Gateway
Device/IoT Data Analytics Container Management
Role-based Access Control Media Analytics Availability
System Management Sensor Fusion Provisioning
Monitoring Services Biometric SLA Management
Audit/Reports Behavioral Analysis Matching Services
APPLICATIONS/SOLUTIONS
NEC DIGITAL PLATFORM
INFRASTRUCTURE
SERVICE
TECHNOLOGY COMMON
SERVICES
PUBLIC CLOUD PRIVATE CLOUD ON PREMISES
due to the flexibility of NEC’s orchestration, core
technology, and infrastructure services. The NDP offers
customers the most suitable—but not over-engineered—
end solution or product.
The NDP is based on microservices architecture and
enables containerization of biometric and non-biometric
system workloads. The platform inserts a microservice
variant into a service-oriented architecture approach and
uses well-defined interfaces to manage collections of
loosely coupled, fine-grained applications and services
that use lightweight protocols. This framework supports
flexible deployment in a variety of environments, including
on premise, and private and public clouds.
3
Improve Your Customer Service
United States Government agencies have the ongoing challenge of meeting their missions connected to secure
public-facing informational and interactive websites, on-line teaming platforms, mission-related social media websites,
and a myriad of other networks and applications. Operating within changing health guidelines to protect both their
workforce and the people they serve, federal agencies must reevaluate their operations, procedures, and workforce
applications to establish both short- and long-term strategies for meeting their missions. Federal agencies must
continue to rely on technology to support and elevate the performance of their workforce, in order to provide
improved internal and public-facing customer service.
Technological advances in artificial intelligence (AI), such as computer vision and deep machine learning (dML), facilitate
enhancements in other technologies. These include but are not limited to contactless detection—face and iris biometrics
for recognition and elevated body temperature (EBT) sensing, video analytics, and optical fiber sensing. An overview of
NEC NSS NDP solutions and serivces, tailored to a variety of federal mission categories, follow.
Digital Identification and Intelligent Analytics
The NDP’s Identity Management Services (IDMS) provide a single API to perform identity valida-
tion using multimodal biometric, biographic, and contextual information for 1:1, 1:N, or 1:n search-
es. IDMS aggregates events and identity information while enabling decision-making capabilities
for users across a spectrum of federal operations and mission sets.
For example, one use case in development for several military entities is the ability to capture a
face image, verify an identity, and provide actionable intelligence within seconds, in the field.
The NDP’s access management services provide multi-factor identity authentication services by
fusing biometric and other data, that can include geo-fencing, mobile sensing, historical events,
and transaction risk. Fusing data results in a highly accurate, trusted identity authentication
solution tailored to address specific use cases reduces identity fraud and lowers overall risk of
loss—or loss of life.
NDP access management services integrate with popular access solution providers’ centralized
controllers without introducing a new access control platform in order to manage users and
access policies.
4
Scene Processing and Video Analytics
Using biometric matching, combined with AI, and edge sensors,
the NDP supports scene processing, face recognition, and other
digital identification/computer vision technologies to:
Seamless Access Management
NEC’s Touchpoint SDK, powered by NDP, has revolutionized air traveler identification and security processes.
This technology underpins access solutions that provide fast, contactless identity verification in 2 seconds or less,
end-to-end, and automates passage or admission in the following scenarios.
•	 Traveler security checkpoint processes are streamlined and provide 99.1% identity verification2
—superior to human
recognition capabilities
•	 Travelers board flights or ships without repeated use of their boarding pass or ID card, reducing check-in and
boarding times
•	 Government and military installation personnel enjoy through-the-windshield identity validation when driving
past security gates, reducing or eliminating congestion
•	 Government employees and visitors gain seamless office building access with contactless validation and optional
automated elevated body temperature (EBT) screening
NEC’s Touchpoint SDK-based solutions use face images for identification and EBT—at a stand-off distance—to
help individuals get to their destinations more quickly, while supporting safety and security and requiring fewer
security personnel.
•	 Detect faces, crowds1
, humans and other animals
•	 Analyze anomalous behaviors and objects—such as
left-behind baggage, packages, and vehicles
•	 Support post-event analysis and processing
•	 Enable operators to identify threats from massive
amounts of video in seconds
With the NDP, our scalable, extensible, and cloud-ready video
analytics solutions can accept inputs from video cameras and
other sensors, pass these streams through various algorithms,
then produce alerts and reports that operators can view and/or
export to incident and identity management systems.
NDP is a flexible platform
for agencies that manage:
Border Security
Criminal Justice and Law Enforcement
Homeland Security
Immigration
Intelligence Operations
Infrastructure SecurityIntelligence
Operations
Law Enforcement
Military Operations
National Security
Tribal Law Enforcement
5
Flexible Infrastructure Services
In addition to providing support for traditional on-premises solutions, the NDP can be deployed in private or public
clouds hosted by NEC or deployed on public/government clouds, such as Amazon Web Services or Microsoft® Azure.
We offer a combination of infrastructure options, providing flexibility for deployments of all sizes and scopes.
Conclusion
With the NDP, we extend beyond our industry-leading multimodal biometrics capabilities to
the provision of a digital ecosystem that provides the safe, secure exchange of authorized
and verifiable information. NEC NSS serves federal agencies, agency employees, and the public
with technologies that result in hygienic environments, improved mission-critical support, and
increased efficiencies with lower overall costs. NEC’s primary matching algorithms—face, iris,
fingerprint, and latent—have been ranked No. 1 in various tests by the National Institute of
Standards and Technology (NIST) for more than a decade. In particular, NEC’s face recognition
algorithms have ranked No. 1 for 12 years—five times in a row.1
NEC continuously refines
and improves our technologies, and for every project, we assign a team of accomplished
subject-matter and technology experts who are committed to our customers’ success.
Our people, our ongoing innovation, and our corporate stability—NEC’s 120+ years of
continuous operation—affirm that federal agencies can trust NEC NSS to deliver a proven
platform, superior solutions, and unwavering service tailored to their use cases and needs.
1
NIST Validation (necam.com)
2
https://news.delta.com/delta-expands-optional-facial-recognition-boarding-new-airports-more-customers
NEC NSS an NEC Company. © 2022 NEC Corporation of America. All rights reserved. Other product or service marks mentioned are the trademarks of their respective owners.

More Related Content

What's hot

Digital twin ppt
Digital twin pptDigital twin ppt
Digital twin pptMeet patel
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfAlan McSweeney
 
How to pass ArchiMate 3.1 Practitioner exam
How to pass ArchiMate 3.1 Practitioner examHow to pass ArchiMate 3.1 Practitioner exam
How to pass ArchiMate 3.1 Practitioner examAshraf Fouad
 
IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1Mohamed Zakarya Abdelgawad
 
Digital Twin at-a-glance, Yong @SEMIforte
Digital Twin at-a-glance, Yong @SEMIforteDigital Twin at-a-glance, Yong @SEMIforte
Digital Twin at-a-glance, Yong @SEMIforteYong Wang
 
IT Enterprise architecture ppt
IT Enterprise architecture pptIT Enterprise architecture ppt
IT Enterprise architecture pptMonsif sakienah
 
Introduction to Data Management Maturity Models
Introduction to Data Management Maturity ModelsIntroduction to Data Management Maturity Models
Introduction to Data Management Maturity ModelsKingland
 
Enterprise Data Management
Enterprise Data ManagementEnterprise Data Management
Enterprise Data ManagementBhavendra Chavan
 
Solution Security Architecture
Solution Security ArchitectureSolution Security Architecture
Solution Security ArchitectureAlan McSweeney
 
TOGAF® & Major IT Frameworks - Architecting the Family
TOGAF® & Major IT Frameworks - Architecting the FamilyTOGAF® & Major IT Frameworks - Architecting the Family
TOGAF® & Major IT Frameworks - Architecting the FamilyDanny Greefhorst
 
Do-It-Yourself (DIY) Data Governance Framework
Do-It-Yourself (DIY) Data Governance FrameworkDo-It-Yourself (DIY) Data Governance Framework
Do-It-Yourself (DIY) Data Governance FrameworkDATAVERSITY
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFMichael Sukachev
 
Workshop Tel Aviv - Graph Data Science
Workshop Tel Aviv - Graph Data ScienceWorkshop Tel Aviv - Graph Data Science
Workshop Tel Aviv - Graph Data ScienceNeo4j
 
Solution architecture
Solution architectureSolution architecture
Solution architectureiasaglobal
 
We Need To Talk About IT Architecture
We Need To Talk About IT ArchitectureWe Need To Talk About IT Architecture
We Need To Talk About IT ArchitectureAlan McSweeney
 
Driving the Telecom Digital Transformation through Open Digital Architecture
Driving the Telecom Digital Transformation through Open Digital ArchitectureDriving the Telecom Digital Transformation through Open Digital Architecture
Driving the Telecom Digital Transformation through Open Digital ArchitectureSanjeewaRavi
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Alan McSweeney
 

What's hot (20)

Digital twin ppt
Digital twin pptDigital twin ppt
Digital twin ppt
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdf
 
How to pass ArchiMate 3.1 Practitioner exam
How to pass ArchiMate 3.1 Practitioner examHow to pass ArchiMate 3.1 Practitioner exam
How to pass ArchiMate 3.1 Practitioner exam
 
IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1IT4IT - The Full Story for Digital Transformation - Part 1
IT4IT - The Full Story for Digital Transformation - Part 1
 
Digital Twin at-a-glance, Yong @SEMIforte
Digital Twin at-a-glance, Yong @SEMIforteDigital Twin at-a-glance, Yong @SEMIforte
Digital Twin at-a-glance, Yong @SEMIforte
 
IT Enterprise architecture ppt
IT Enterprise architecture pptIT Enterprise architecture ppt
IT Enterprise architecture ppt
 
Introduction to Data Management Maturity Models
Introduction to Data Management Maturity ModelsIntroduction to Data Management Maturity Models
Introduction to Data Management Maturity Models
 
Enterprise Data Management
Enterprise Data ManagementEnterprise Data Management
Enterprise Data Management
 
Solution Security Architecture
Solution Security ArchitectureSolution Security Architecture
Solution Security Architecture
 
Ict startegy and architecture
Ict startegy and architecture Ict startegy and architecture
Ict startegy and architecture
 
TOGAF® & Major IT Frameworks - Architecting the Family
TOGAF® & Major IT Frameworks - Architecting the FamilyTOGAF® & Major IT Frameworks - Architecting the Family
TOGAF® & Major IT Frameworks - Architecting the Family
 
Do-It-Yourself (DIY) Data Governance Framework
Do-It-Yourself (DIY) Data Governance FrameworkDo-It-Yourself (DIY) Data Governance Framework
Do-It-Yourself (DIY) Data Governance Framework
 
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAFPractical Enterprise Architecture in Medium-size Corporation using TOGAF
Practical Enterprise Architecture in Medium-size Corporation using TOGAF
 
Workshop Tel Aviv - Graph Data Science
Workshop Tel Aviv - Graph Data ScienceWorkshop Tel Aviv - Graph Data Science
Workshop Tel Aviv - Graph Data Science
 
Solution architecture
Solution architectureSolution architecture
Solution architecture
 
We Need To Talk About IT Architecture
We Need To Talk About IT ArchitectureWe Need To Talk About IT Architecture
We Need To Talk About IT Architecture
 
Driving the Telecom Digital Transformation through Open Digital Architecture
Driving the Telecom Digital Transformation through Open Digital ArchitectureDriving the Telecom Digital Transformation through Open Digital Architecture
Driving the Telecom Digital Transformation through Open Digital Architecture
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
 
TOGAF 9.2 - the update
TOGAF 9.2 - the updateTOGAF 9.2 - the update
TOGAF 9.2 - the update
 

Similar to NEC's Digital Identity Platform for Federal Agencies

NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)InteractiveNEC
 
NEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesNEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesInteractiveNEC
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : IntroductionSemlex Europe
 
Dell AI Telecom Webinar
Dell AI Telecom WebinarDell AI Telecom Webinar
Dell AI Telecom WebinarBill Wong
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies Shamima Akther
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek chan
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructureShreyas Satpute
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security InfrastructureGAURAV. H .TANDON
 
(Preview) NEC Digital Platform for State and Local Governments
(Preview) NEC Digital Platform for State and Local Governments(Preview) NEC Digital Platform for State and Local Governments
(Preview) NEC Digital Platform for State and Local GovernmentsInteractiveNEC
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptxSeceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptxCompanySeceon
 
Intel APJ Enterprise Day - Keynote by RK Hiremane
Intel APJ Enterprise Day - Keynote by RK HiremaneIntel APJ Enterprise Day - Keynote by RK Hiremane
Intel APJ Enterprise Day - Keynote by RK HiremaneIntelAPAC
 
Smart city IT operations- manage solutions complexity
Smart city IT operations- manage solutions complexitySmart city IT operations- manage solutions complexity
Smart city IT operations- manage solutions complexityMohit Mehrotra
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
Cio conference gary bullock
Cio conference   gary bullockCio conference   gary bullock
Cio conference gary bullockGillian Friend
 

Similar to NEC's Digital Identity Platform for Federal Agencies (20)

NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)
 
NEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesNEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal Agencies
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : Introduction
 
Dell AI Telecom Webinar
Dell AI Telecom WebinarDell AI Telecom Webinar
Dell AI Telecom Webinar
 
EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...
EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...
EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...
 
Modern computer network technologies
Modern computer network technologies Modern computer network technologies
Modern computer network technologies
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
(Preview) NEC Digital Platform for State and Local Governments
(Preview) NEC Digital Platform for State and Local Governments(Preview) NEC Digital Platform for State and Local Governments
(Preview) NEC Digital Platform for State and Local Governments
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECTBRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
 
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptxSeceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
 
Intel APJ Enterprise Day - Keynote by RK Hiremane
Intel APJ Enterprise Day - Keynote by RK HiremaneIntel APJ Enterprise Day - Keynote by RK Hiremane
Intel APJ Enterprise Day - Keynote by RK Hiremane
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Smart city IT operations- manage solutions complexity
Smart city IT operations- manage solutions complexitySmart city IT operations- manage solutions complexity
Smart city IT operations- manage solutions complexity
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Cio conference gary bullock
Cio conference   gary bullockCio conference   gary bullock
Cio conference gary bullock
 

More from InteractiveNEC

Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)InteractiveNEC
 
Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023InteractiveNEC
 
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...InteractiveNEC
 
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:DelightClear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:DelightInteractiveNEC
 
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...InteractiveNEC
 
Analyze to Optimize - Connect airport data to refine intertwined operations.
Analyze to Optimize - Connect airport data to refine intertwined operations.Analyze to Optimize - Connect airport data to refine intertwined operations.
Analyze to Optimize - Connect airport data to refine intertwined operations.InteractiveNEC
 
NEC's Top 10 Strategic Smart Enterprise Drivers 2022
NEC's Top 10 Strategic Smart Enterprise Drivers 2022NEC's Top 10 Strategic Smart Enterprise Drivers 2022
NEC's Top 10 Strategic Smart Enterprise Drivers 2022InteractiveNEC
 
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!InteractiveNEC
 
Creating a Communications System Built for Hybrid Work
Creating a Communications System Built for Hybrid WorkCreating a Communications System Built for Hybrid Work
Creating a Communications System Built for Hybrid WorkInteractiveNEC
 
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product BriefEvaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product BriefInteractiveNEC
 
UNIVERE BLUE CONNECT - How to define your hybrid work model
UNIVERE BLUE CONNECT - How to define your hybrid work modelUNIVERE BLUE CONNECT - How to define your hybrid work model
UNIVERE BLUE CONNECT - How to define your hybrid work modelInteractiveNEC
 
9 Ways Your Aging Phone System Is Putting Business Success On Hold
9 Ways Your Aging Phone System Is Putting Business Success On Hold9 Ways Your Aging Phone System Is Putting Business Success On Hold
9 Ways Your Aging Phone System Is Putting Business Success On HoldInteractiveNEC
 
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERNEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERInteractiveNEC
 
Smart Check-In - Transforming the Guest Experience
Smart Check-In - Transforming the Guest ExperienceSmart Check-In - Transforming the Guest Experience
Smart Check-In - Transforming the Guest ExperienceInteractiveNEC
 
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...InteractiveNEC
 
Preview: Taking Travel to New Heights
Preview: Taking Travel to New HeightsPreview: Taking Travel to New Heights
Preview: Taking Travel to New HeightsInteractiveNEC
 
UNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD BrochureUNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD BrochureInteractiveNEC
 
UNIVERGE BLUE SV9500 PRIVATE CLOUD for Hospitality Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD for Hospitality BrochureUNIVERGE BLUE SV9500 PRIVATE CLOUD for Hospitality Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD for Hospitality BrochureInteractiveNEC
 
5 Must-Have Productivity Tools to Support Your Modern Workforce
5 Must-Have Productivity Tools to Support Your Modern Workforce 5 Must-Have Productivity Tools to Support Your Modern Workforce
5 Must-Have Productivity Tools to Support Your Modern Workforce InteractiveNEC
 
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...InteractiveNEC
 

More from InteractiveNEC (20)

Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)
 
Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023
 
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
 
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:DelightClear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
 
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
 
Analyze to Optimize - Connect airport data to refine intertwined operations.
Analyze to Optimize - Connect airport data to refine intertwined operations.Analyze to Optimize - Connect airport data to refine intertwined operations.
Analyze to Optimize - Connect airport data to refine intertwined operations.
 
NEC's Top 10 Strategic Smart Enterprise Drivers 2022
NEC's Top 10 Strategic Smart Enterprise Drivers 2022NEC's Top 10 Strategic Smart Enterprise Drivers 2022
NEC's Top 10 Strategic Smart Enterprise Drivers 2022
 
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
 
Creating a Communications System Built for Hybrid Work
Creating a Communications System Built for Hybrid WorkCreating a Communications System Built for Hybrid Work
Creating a Communications System Built for Hybrid Work
 
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product BriefEvaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
 
UNIVERE BLUE CONNECT - How to define your hybrid work model
UNIVERE BLUE CONNECT - How to define your hybrid work modelUNIVERE BLUE CONNECT - How to define your hybrid work model
UNIVERE BLUE CONNECT - How to define your hybrid work model
 
9 Ways Your Aging Phone System Is Putting Business Success On Hold
9 Ways Your Aging Phone System Is Putting Business Success On Hold9 Ways Your Aging Phone System Is Putting Business Success On Hold
9 Ways Your Aging Phone System Is Putting Business Success On Hold
 
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERNEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
 
Smart Check-In - Transforming the Guest Experience
Smart Check-In - Transforming the Guest ExperienceSmart Check-In - Transforming the Guest Experience
Smart Check-In - Transforming the Guest Experience
 
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
 
Preview: Taking Travel to New Heights
Preview: Taking Travel to New HeightsPreview: Taking Travel to New Heights
Preview: Taking Travel to New Heights
 
UNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD BrochureUNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
 
UNIVERGE BLUE SV9500 PRIVATE CLOUD for Hospitality Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD for Hospitality BrochureUNIVERGE BLUE SV9500 PRIVATE CLOUD for Hospitality Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD for Hospitality Brochure
 
5 Must-Have Productivity Tools to Support Your Modern Workforce
5 Must-Have Productivity Tools to Support Your Modern Workforce 5 Must-Have Productivity Tools to Support Your Modern Workforce
5 Must-Have Productivity Tools to Support Your Modern Workforce
 
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
Move Up to the Cloud or Stay Where You Are? 6 things to consider when reviewi...
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

NEC's Digital Identity Platform for Federal Agencies

  • 1. NEC’s Digital Platform For Federal Agencies NEC National Security Systems (NSS) provides digital identification solutions enhanced by artificial intelligence (AI) and machine learning (ML) technologies to, Homeland Security, Intelligence, Federal Judicial and Law Enforcement and Military agencies. We develop and deploy digital identification ecosystems for access control, identity verification, border control, and transportation security, among other applications. NEC NSS is here to support agencies that face tight budgets, waning personnel resources, obsolete technologies, and increasing performance demands. NSS tailors your solution, accelerates time to operational capability Now, more than ever, agencies look to technology as a cost-effective force-multiplier. As agency operations and responsibilities change and evolve, our solution architects, system engineers, and laboratory scientists constantly work to develop solutions for federal agencies’ now, next, and after-next operational requirements. At the onset of COVID-19, we rapidly responded to government agencies and public needs with contactless technologies that support hygienic interactions while maintaining safety and security. NEC NSS remains the government’s visionary technology partner: Today we provide a platform that aggregates, expands, and enhances systems capabilities into a multifunctional digital ecosystem designed to support current and future federal operations.
  • 2. 2 THE NEC DIGITAL PLATFORM (NDP) is a foundational solution designed to support federal agencies as they navigate digital identification and information ecosystems. NDP positions agencies to rapidly expand or enhance their existing systems, and the capability to integrate future technologies without undertaking a massive and costly system overhaul. NEC is known for our industry-leading identity verification capabilities: our face, iris, fingerprint, and latent print algorithms have ranked No. 1 in major tests conducted by the National Institute of Standards and Technology (NIST) for more than a decade.1 The NDP streamlines the use of our secure biometrics and identity and document verification capabilities, and speeds the assembly of complex or challenging processes or services. Designed as an extensible framework, the NDP is open to integration of a wide array of technologies on demand. This framework provides customers an accelerated time-to-market for their desired services Access Management Advanced Analytics Identity Management Immigration & Border Security Scene Processing Transportation Security Business Process & Workflow AI / Deep Learning API Gateway Device/IoT Data Analytics Container Management Role-based Access Control Media Analytics Availability System Management Sensor Fusion Provisioning Monitoring Services Biometric SLA Management Audit/Reports Behavioral Analysis Matching Services APPLICATIONS/SOLUTIONS NEC DIGITAL PLATFORM INFRASTRUCTURE SERVICE TECHNOLOGY COMMON SERVICES PUBLIC CLOUD PRIVATE CLOUD ON PREMISES due to the flexibility of NEC’s orchestration, core technology, and infrastructure services. The NDP offers customers the most suitable—but not over-engineered— end solution or product. The NDP is based on microservices architecture and enables containerization of biometric and non-biometric system workloads. The platform inserts a microservice variant into a service-oriented architecture approach and uses well-defined interfaces to manage collections of loosely coupled, fine-grained applications and services that use lightweight protocols. This framework supports flexible deployment in a variety of environments, including on premise, and private and public clouds.
  • 3. 3 Improve Your Customer Service United States Government agencies have the ongoing challenge of meeting their missions connected to secure public-facing informational and interactive websites, on-line teaming platforms, mission-related social media websites, and a myriad of other networks and applications. Operating within changing health guidelines to protect both their workforce and the people they serve, federal agencies must reevaluate their operations, procedures, and workforce applications to establish both short- and long-term strategies for meeting their missions. Federal agencies must continue to rely on technology to support and elevate the performance of their workforce, in order to provide improved internal and public-facing customer service. Technological advances in artificial intelligence (AI), such as computer vision and deep machine learning (dML), facilitate enhancements in other technologies. These include but are not limited to contactless detection—face and iris biometrics for recognition and elevated body temperature (EBT) sensing, video analytics, and optical fiber sensing. An overview of NEC NSS NDP solutions and serivces, tailored to a variety of federal mission categories, follow. Digital Identification and Intelligent Analytics The NDP’s Identity Management Services (IDMS) provide a single API to perform identity valida- tion using multimodal biometric, biographic, and contextual information for 1:1, 1:N, or 1:n search- es. IDMS aggregates events and identity information while enabling decision-making capabilities for users across a spectrum of federal operations and mission sets. For example, one use case in development for several military entities is the ability to capture a face image, verify an identity, and provide actionable intelligence within seconds, in the field. The NDP’s access management services provide multi-factor identity authentication services by fusing biometric and other data, that can include geo-fencing, mobile sensing, historical events, and transaction risk. Fusing data results in a highly accurate, trusted identity authentication solution tailored to address specific use cases reduces identity fraud and lowers overall risk of loss—or loss of life. NDP access management services integrate with popular access solution providers’ centralized controllers without introducing a new access control platform in order to manage users and access policies.
  • 4. 4 Scene Processing and Video Analytics Using biometric matching, combined with AI, and edge sensors, the NDP supports scene processing, face recognition, and other digital identification/computer vision technologies to: Seamless Access Management NEC’s Touchpoint SDK, powered by NDP, has revolutionized air traveler identification and security processes. This technology underpins access solutions that provide fast, contactless identity verification in 2 seconds or less, end-to-end, and automates passage or admission in the following scenarios. • Traveler security checkpoint processes are streamlined and provide 99.1% identity verification2 —superior to human recognition capabilities • Travelers board flights or ships without repeated use of their boarding pass or ID card, reducing check-in and boarding times • Government and military installation personnel enjoy through-the-windshield identity validation when driving past security gates, reducing or eliminating congestion • Government employees and visitors gain seamless office building access with contactless validation and optional automated elevated body temperature (EBT) screening NEC’s Touchpoint SDK-based solutions use face images for identification and EBT—at a stand-off distance—to help individuals get to their destinations more quickly, while supporting safety and security and requiring fewer security personnel. • Detect faces, crowds1 , humans and other animals • Analyze anomalous behaviors and objects—such as left-behind baggage, packages, and vehicles • Support post-event analysis and processing • Enable operators to identify threats from massive amounts of video in seconds With the NDP, our scalable, extensible, and cloud-ready video analytics solutions can accept inputs from video cameras and other sensors, pass these streams through various algorithms, then produce alerts and reports that operators can view and/or export to incident and identity management systems. NDP is a flexible platform for agencies that manage: Border Security Criminal Justice and Law Enforcement Homeland Security Immigration Intelligence Operations Infrastructure SecurityIntelligence Operations Law Enforcement Military Operations National Security Tribal Law Enforcement
  • 5. 5 Flexible Infrastructure Services In addition to providing support for traditional on-premises solutions, the NDP can be deployed in private or public clouds hosted by NEC or deployed on public/government clouds, such as Amazon Web Services or Microsoft® Azure. We offer a combination of infrastructure options, providing flexibility for deployments of all sizes and scopes. Conclusion With the NDP, we extend beyond our industry-leading multimodal biometrics capabilities to the provision of a digital ecosystem that provides the safe, secure exchange of authorized and verifiable information. NEC NSS serves federal agencies, agency employees, and the public with technologies that result in hygienic environments, improved mission-critical support, and increased efficiencies with lower overall costs. NEC’s primary matching algorithms—face, iris, fingerprint, and latent—have been ranked No. 1 in various tests by the National Institute of Standards and Technology (NIST) for more than a decade. In particular, NEC’s face recognition algorithms have ranked No. 1 for 12 years—five times in a row.1 NEC continuously refines and improves our technologies, and for every project, we assign a team of accomplished subject-matter and technology experts who are committed to our customers’ success. Our people, our ongoing innovation, and our corporate stability—NEC’s 120+ years of continuous operation—affirm that federal agencies can trust NEC NSS to deliver a proven platform, superior solutions, and unwavering service tailored to their use cases and needs. 1 NIST Validation (necam.com) 2 https://news.delta.com/delta-expands-optional-facial-recognition-boarding-new-airports-more-customers NEC NSS an NEC Company. © 2022 NEC Corporation of America. All rights reserved. Other product or service marks mentioned are the trademarks of their respective owners.