Identity dominance solutions<br />PaZz<br />Q<br />
Fast, accurate, secure<br />and non-intrusive<br />multi-biometric identification<br />
Q<br />SeeK<br />The only portable non-intrusive<br />Multi-biometric enrollment<br />And recognition system<br />
Portable<br />For remote operations<br />
Wireless<br />For global connectivity<br />
3D<br />Touchless<br />For stress free identification<br />
Real 3D<br />For quality and speed<br />
Multi-modal<br />For greater accuracy<br />
High-capacity<br />For onboard portfolios<br />For hundreds of thousands<br />of subject portfolios<br />
Ease of use<br />For very fast identification<br />
Secure<br />Secure:<br /><ul><li>Operating system
Encrypted data storage
Encrypted messages
Encrypted communication
Trusted platform
Self-destruct</li></ul>For protection<br />
How it works<br />
Upcoming SlideShare
Loading in …5
×

Qpazz introduction

870 views

Published on

This presentation describes the functionality of the QSeeK, a secure touchless 3D biometric scanner

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
870
On SlideShare
0
From Embeds
0
Number of Embeds
37
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Qpazz introduction

  1. 1.
  2. 2. Identity dominance solutions<br />PaZz<br />Q<br />
  3. 3. Fast, accurate, secure<br />and non-intrusive<br />multi-biometric identification<br />
  4. 4. Q<br />SeeK<br />The only portable non-intrusive<br />Multi-biometric enrollment<br />And recognition system<br />
  5. 5. Portable<br />For remote operations<br />
  6. 6. Wireless<br />For global connectivity<br />
  7. 7. 3D<br />Touchless<br />For stress free identification<br />
  8. 8. Real 3D<br />For quality and speed<br />
  9. 9. Multi-modal<br />For greater accuracy<br />
  10. 10. High-capacity<br />For onboard portfolios<br />For hundreds of thousands<br />of subject portfolios<br />
  11. 11. Ease of use<br />For very fast identification<br />
  12. 12. Secure<br />Secure:<br /><ul><li>Operating system
  13. 13. Encrypted data storage
  14. 14. Encrypted messages
  15. 15. Encrypted communication
  16. 16. Trusted platform
  17. 17. Self-destruct</li></ul>For protection<br />
  18. 18. How it works<br />
  19. 19.
  20. 20. ePassport<br />Collect:<br />Iris<br />Face<br />Hands<br />
  21. 21. Internal databases<br />Search watch list<br />external databases<br />
  22. 22. Match found<br />Mission accomplished<br />
  23. 23. Identity dominance solutions<br />PaZz<br />Q<br />

×