WinterGreen Research announces that it has published a new study Biometrics: Market Shares, Strategy, and Forecasts, Worldwide, 2013 to 2019. The 2013 study has 563 pages, 249 tables and figures. Worldwide markets are poised to achieve significant growth. As people use electronics in their personal life more, protection of individual information becomes a more compelling problem. Biometrics devices protect individual information. Research Beam Model: Research Beam Product ID: 176652 3800 USD New
Biometrics: Market Shares, Strategies, and Forecasts, Worldwide, 2013 to 2019
 
 

Biometrics: Market Shares, Strategies, and Forecasts, Worldwide, 2013 to 2019

  • Category : ICT & Media
  • Published On : November   2013
  • Pages : 563
  • Publisher : Winter Green Research
 
 
 

WinterGreen Research announces that it has published a new study Biometrics: Market Shares, Strategy, and Forecasts, Worldwide, 2013 to 2019. The 2013 study has 563 pages, 249 tables and figures. Worldwide markets are poised to achieve significant growth. As people use electronics in their personal life more, protection of individual information becomes a more compelling problem. Biometrics devices protect individual information.



Biometric identity units provide security protection. Units are comprised of integrated biometric capture devices. Biometrics is used to identify anyone in an accurate, repeatable manner. Physiological characteristics used for biometrics commonly include the face, fingerprints, and DNA. Behavioral characteristics include the user’s digital signature, his or her voiceprint, and walk.



As law enforcement programs are redesigned to include information from social media and to initiate smarter cities initiatives, biometrics becomes a more compelling technology, both fingerprinting and facial recognition. Technologies. With the worldwide rise in the threat of terror, biometric systems become a more compelling tool in the hands of the authorities charged with keeping populations safe.



A rise in government projects has been seen as terrorists become an increasing threat. This has been accompanied by increasing data security concerns. There is a need for advanced security devices. Security systems implementations drive the market for biometric systems. Biometric data protection is being used to replace photographs, passwords and PIN codes.



Growth of biometric technologies has been in response to global security threats. Terrorist attacks, airport security initiatives, and attempts to lower crime rates have brought an increasing investment in biometric security systems. Government projects include ePassports, eDriving licenses, border management, and national IDs. These initiatives have been implemented in developed countries.



India, Mexico and Russia are driving the extraordinary growth of biometric systems. China has a biometric national ID program that commenced in 2013. Computer storage of important documents has created an increasing need for biometric security systems.



The global biometrics market is at $5.2 billion in 2012 anticipated to reach $16.7 billion by 2019. Market growth is a result of demand for protection of individual information and for the needs of organization to control access to documents and to areas.



According to Susan Eustis, lead author of the WinterGreen Research team that prepared the study, “Biometric devices represent a major factor impacting law enforcement and border patrol markets. Governments and law enforcement agencies are leveraging biometric devices to strengthen all aspects of citizen protection. Healthcare organizations are implementing biometric systems to provide patient privacy.


Biometrics and Biometric Fingerprint Equipment Executive Summary

Biometrics and Biometric Fingerprint Equipment Market Driving Forces

Biometric Fingerprint Equipment Market Driving Forces

Biometrics Market Shares

Biometric Market Forecasts

Biometric Device Market Trends

Biometrics and Biometric Fingerprint Equipment



1 Market Description and Market Dynamics

1.1 Biometric Sensor Devices

1.1.1 Biometrics for Security and Management

1.1.2 Biometrics for Convenience

1.1.3 Biometric Systems Characteristics

1.1.4 Biometric Systems Hidden Expenses

1.2 Biometrics Industry Segments

1.2.1 Biometrics Are In Law Enforcement

1.2.2 Biometrics Personal Identity Verification

1.2.3 Biometrics Increase Security

1.2.4 Financial Institutions Use Biometrics

1.2.5 Law Enforcement Uses Biometrics

1.2.6 Immigration Uses Biometrics

1.2.7 Social Services Use Biometrics

1.2.8 Airports Use Biometrics

1.2.9 Healthcare Use Biometrics

1.2.10 Consumer Use Biometrics

1.3 Applications for Biometrics

1.3.1 Casino Facial Recognition Capability

1.4 Store & Forward Systems

1.5 Mobile Identification Systems

1.5.1 Fingerprint Recognition

1.6 Human Mechanism To Distinguish Between Human Faces

1.6.1 Identifying People From Their Iris

1.6.2 Authenticating a User

1.7 Fingerprint Scanner

1.8 Gesture-Interfaces

1.8.1 Biometric Components of Signatures

1.9 Risks in Biometric-Based Authentication

1.10 Multi-Factor Authentication Solutions

1.11 Biometrics Automated Technique

1.12 Security of Input Mechanism

1.13 Digital Data Security

1.13.1 Security Issues

1.14 Global Economy

1.14.1 The IT Market

1.14.2 New World Order Built On The Globally Integrated Enterprise

1.15 Enterprise Information Accessed By Mobile Workers

1.15.1 Cloud Technology Brings Rapid Time to Value

1.16 Application Server Virtual Systems, Clustering, Fail-Over, and Load Balancing

1.16.1 Cloud System Continuous Deployment Models



2. Wireless Car Chargers Market Shares and Market Forecasts

2.1 Biometrics and Biometric Fingerprint Equipment Market Driving Forces

2.1.1 Biometric Fingerprint Equipment Market Driving Forces

2.2 Biometrics Market Shares

2.2.1 NEC

2.2.2 NEC

2.2.3 Sagem Morpho

2.2.4 3M/Cogent Systems

2.2.5 3M Cogent Systems CAFIS™

2.2.6 3M / Cogent

2.2.7 Motorola

2.2.8 Francisco Partners / Cross Match SEEK® Avenger

2.2.9 Francisco Partners / CrossMatch

2.2.10 Avalon Biometrics

2.2.11 DigitalPersona

2.2.12 Apple / AuthenTec / UPEK

2.2.13 BIO-key

2.2.14 Suprema

2.2.15 Suprema

2.2.16 eKey

2.2.17 Vision-Box

2.2.18 EgisTec

2.2.19 CIC Electronic Signature Competition

2.3 Biometric Market Forecasts

2.3.1 Biometric Device Market Trends

2.3.2 Fingerprint Biometrics

2.3.3 Non-Automated Fingerprint Identification Systems

2.3.4 Automated Fingerprint Identification Systems (AFIS)

2.3.5 National ID Control Biometrics

2.3.6 Facial Recognition Biometric Technologies Market Shares and Forecast

5.1.1 Cross Match Technologies Incorporates NEC’s Facial Recognition in SEEK

2.3.7 Voice Recognition Biometric Technologies Market Forecast

2.3.8 Workplace Access Fingerprint Biometrics

2.3.9 Healthcare Biometrics

2.3.10 Mobile Phone Biometrics Market Forecasts

2.3.11 Electronic Signature, Digital Signature, Signature Verification

2.3.12 Biometric Readers Market

2.3.13 Financial:

2.3.14 Consumer

2.3.15 Commercial Biometric Fingerprint Markets

2.4 Large Biometric Market Segments

2.4.1 Airport Screening / Facial Recognition

2.5 Mid Range Biometric Reader Markets

2.5.1 Commercial Biometric Fingerprint Markets

2.6 Biometric Sensors

2.6.1 Fingerprint Cards

2.6.2 Apple / Authentec

2.6.3 SAIC

2.7 Biometrics Device and Sensor Market Forecasts

2.7.1 Biometric Sensors for Law Enforcement

2.7.2 Government:

2.8 Biometric, Smart Card and PKI Technologies

2.9 Biometric Equipment Prices

2.9.1 Biometric Fingerprint Equipment Prices

2.9.2 Biometric Facial Recognition Equipment

2.9.3 Biometric Sensors

2.10 Biometric Fingerprint Equipment Regional Market Analysis



3. Biometrics Product Description

3.1 NEC Hybrid Finger Identification

3.1.1 NEC Fingerprint Identification

3.1.2 NEC Fingerprint Biometrics Accuracy

3.1.3 NEC Finger Print Matching Smart Analytics

3.1.4 NEC Fingerprint Recognition Minutiae and Related Method

3.1.5 NEC Fingerprint Matching Processor (FMP)

3.1.6 NEC Multi-Biometrics

3.1.7 NEC Portable DNA Analyzer

3.2 Safran Morpho Identity Management

3.2.1 Safran Morpho Supports Compliance with standards

3.2.2 Safron Morpho MorphoCivis™

3.2.3 Safran Morpho System™

3.2.4 Safron Morpho MorphoPerso

3.2.5 Safran Morpho ID Documents Uniqueness Protections

3.2.6 Safron Morpho MorphoCheck™

3.2.7 Safron Morpho MorphoRapID™

3.2.8 Safron Morpho MorphoTouch™ 1200 Series

3.2.9 Safron Morpho MorphoBIS

3.2.10 Safron Morpho MetaMorpho

3.2.11 Safran Morpho Secure Biometric Multibiometric Reader

3.2.12 Safran Morpho Outdoor MorphoAccess® 500 Series

3.2.13 Safran Morpho Border Control

3.2.14 Safran Morpho Border Automated Control

3.2.15 Safran Morpho Border Semi-Automatic Control Booths

3.2.16 Safran Morpho Border Mobile Control Terminal

3.2.17 Safran Morpho Secure Biometric Access

3.2.18 Safran Morpho / Bioscrypt

3.3 Cross Match

3.3.1 Cross Match Technologies Incorporates NEC’s Facial Recognition in SEEK

3.3.2 Cross Match SEEK® II

3.3.3 Cross Match SEEK® Avenger

3.3.4 Cross Match Guardian®

3.3.5 Cross Match Patrol ID / Patrol

3.3.6 Cross Match L SCAN® 1000T

3.3.7 Cross Match Verifier® 300 LC 2.0

3.4 3M/Cogent Systems

3.4.1 3M Cogent Systems CAFIS™

3.4.2 3M Cogent Systems CAPFIS™

3.4.3 3M Cogent Systems Multi-Biometric Enrollment Station (CBES)

3.4.4 3M Cogent Systems Biometric Registration Software (BRS)

3.5 Motorola Solutions

3.5.1 Motorola Identity Management

3.5.2 Motorola Multi-Biometric Enrollment

3.5.3 Motorola Multi-Biometric Verification

3.5.4 Motorola Multi-Biometric Capture and Verification Peripherals

3.5.5 Motorola Biometircs Use in Document Central Registry

3.5.6 Motorola Biometircs Use in Data Preparation and Key Management

3.5.7 Motorola Biometircs Use in Personalization Servers

3.5.8 Biometric Identification Solution (BIS)

3.5.9 Motorola Mobile Biometric Identification

3.6 Intel Healthcare

3.7 BIO-key Healthcare

3.7.1 BIO-key Large Scale ID

3.7.2 BIO-key for End Users

3.7.3 BIO-key BSP ( Biometric Service Provider)

3.7.4 BIO-key International's BSP Advantages

3.7.5 BIO-key Finger-based Biometric Identification and Personal Identity Verification

3.8 Precise Biometrics Tactivo

3.8.1 Precise Tactivo for iPhone

3.8.2 Precise Tactivo for iPad

3.8.3 Precise Tactivo Mini for Android

3.8.4 Precise Biometrics Easy App Integration

3.8.5 Precise Biometrics Smart Card Government Compliance

3.8.6 Precise Match-on-Card for National ID

3.8.7 Precise U.S. Government Solutions

3.8.8 Precise Enterprise Solutions for Secure Sign-On

3.8.9 Precise Biometrics Reduces Risk and Cost

3.8.10 Precise Secure Mobile Authentication for Enterprise

3.8.11 Precise Match-on-Card for Enterprise Solutions

3.8.12 Precise Biometrics Flexible Solution

3.8.13 Precise Biometrics Customization

3.8.14 Precise Partner Solutions

3.9 DigitalPersona

3.9.1 DigitalPersona Biometrics, Multi-Factor Authentication and Access Management

3.9.2 DigitalPersona Pro Enterprise

3.9.3 DigitalPersona Fingerprint Biometrics

3.9.4 DigitalPersona 5160 Fingerprint Reader

3.9.5 DigitalPersona, Inc. UPEK TouchChip TCRU1C

3.9.6 DigitalPersona, ikonTouch 700

3.9.7 DigitalPersona, Inc. ikonTouch 700

3.10 Fujitsu

3.10.1 Fujitsu PalmSecure™

3.10.2 Fujitsu PalmEntry™ Access Control System

3.10.3 Fujitsu PalmSecure Vein Recognition Technology

3.10.4 Fujitsu Med-Serv 50

3.11 Labcal India

3.11.1 Labcal Be.U Mobile Series

3.11.2 Labcal Applications for the Be.U Mobile

3.12 SecuGen

3.12.1 SecuGen Hamster Plus

3.12.2 SecuGen Hamster IV

3.12.3 Benefits of Using SecuGen Peripherals

3.12.4 SecuGen OptiMouse Plus

3.13 NitGen & Company

3.13.1 NitGen NAC-5000

3.13.2 NitGen FINGKEY ACCESS Plus

3.13.3 NitGen NAC-2500 Plus

3.13.4 NitGen Access Manager Pro

3.13.5 NitGen FIM Module

3.14 Atmel

3.15 CSC

3.15.1 CSC Identity Management Trusted Enterprise Suite

3.16 Accu-Time Systems

3.16.1 Accu-Time Systems Optimus2

3.16.2 Accu-Time Systems AccuTouch

3.16.3 Accu-Time Systems Maximus

3.16.4 Accu-Time Systems Prodigy

3.17 Avalon Biometrics

3.17.1 Avalon MVT - Mobile Application Suite - Enrolment / Verification / Identification terminal

3.18 eKey

3.18.1 ekey home – Stand-alone Solution

3.18.2 ekey Home Finger Scanner Wall-Mounted

3.18.3 ekey Home Finger Scanner FSB

3.18.4 ekey Multi – Extended Stand-Alone Solution

3.18.5 ekey Multi Finger Scanner Outlet-Mounted

3.18.6 ekey Net – Networkable Solution

3.18.7 ekey Logon Server

3.19 Green Bit

3.19.1 Green Bit Law Enforcement & P.A.

3.19.2 Green Bit Commercial Applications

3.19.3 Green Bit DactyMatch SDK

3.20 Fingerprints Card AB

3.20.1 Fingerprints FPC1011F3 Area

3.20.2 Fingerprints FPC1080A Swipe

3.20.3 Fingerprints FPC2020

3.21 Merkatum: Biometrics Security & ID

3.21.1 Merkatum emfiva F/FRS

3.21.2 Merkatum ELA Logical Authentication

3.22 Suprema

3.22.1 Suprema RealScan G10

3.22.2 Suprema RealScan D

3.23 UnionCommunity / Virdi

3.23.1 VIRDI AC F100

3.23.2 ViRDI AC 5000

3.24 Aware

3.25 Zvetco Biometrics Products

3.26 Apple / AuthenTec

3.27 Tyco Integrated Security Biometrics

3.27.1 Tyco Facial Recognition Profile

3.28 EgisTec

3.28.1 EgisTec Image Quality

3.28.2 EgisTec Cloud

3.29 STMicroelectronics Biometric Solutions for Healthcare

3.29.1 STMicroelectronics Body Gateway

3.29.2 STMicroelectronics Lab-on-Chip

3.29.3 STMicroelectronics Pulse Generator for Ultrasound Imaging

3.29.4 STMicroelectronics’ Cooperation with French Start-ups and SMEs

2.10.1 ST Microelectronics (Finger-Scan)

3.30 SAIC

3.30.1 SAIC Voice Identity Biometrics Exploitation Services (VIBES)

3.30.2 SAIC Voice Biometrics Applications

3.31 Gemalto Avalon Biometrics Border Management

3.31.1 Gemalto Avalon Biometrics Document Verification of Travel & ID Documents



4. Biometrics Technology

4.1 Enabling Biometric Fingerprint Technologies

4.1.1 Fingerprint Recognition

4.1.2 Fingerprint Technology

4.1.3 Fingerprint SDKs

4.1.4 Fingerprint Enabling Technology

4.1.5 Surface Texture Analysis

4.2 Facial Recognition:

4.2.1 Facial Recognition SDKs

4.2.2 Facial Recognition Uses

4.2.3 Face Recognition Biometric System Deployment Considerations

4.2.4 Face Recognition Technology

4.3 Iris Reading Algorithms

4.3.1 Iris Reading Accuracy

4.4 Biometrics Impact On Network Operations

4.5 Enrollment and Identification

4.6 Neural Networks

4.7 Security of Biometric ID Systems

4.8 Perceptual Computing and Apps Detect Heart Rate



5. Biometrics Company Description

5.1 Selected Biometric Industry Mergers and Acquisitions

5.1.1 Safran Acquisition of L-1 Identity Solutions Formed From A Merger of Visage Technology, Inc. and Identix

5.1.2 3M Acquisition of Cogent

5.1.3 Amano USA Holdings, Inc. (AUH) acquired ATS

5.1.4 Apple Acquired AuthenTec

5.1.5 AuthenTec Acquisitions of SafeNet’s Embedded Security Solution Division, UPEK, Inc., PeerSec Networks and Proxure, Inc.

5.1.6 Smart Sensor Solutions

5.1.7 BIO-Key International / S.I.C.

5.1.8 Cross Match has acquired the biometric authentication business of Labcal Technologies

5.1.9 Francisco Partners Acquires Cross Match Technologies

5.1.10 Gemalto /Avalon Biometrics

5.2 3M/Cogent Systems

5.2.1 3M Cogent Advanced Technology

5.2.2 3M at a Glance (Year-end 2012)

5.2.3 3M Business Groups

5.2.4 3M Business.

5.2.5 3M Revenue

5.3 Amano Japan / Accu-Time Systems

5.4 Apple / AuthenTec

5.4.1 Authentec Revenue Recognition – Smart Sensors

5.4.2 Apple

5.4.3 Apple Business Strategy

5.4.4 Apple Products

5.4.5 Apple iPhone

5.4.6 Apple Mac Hardware Products

5.4.7 Apple iPod

5.4.8 Apple iTunes®

5.4.9 Apple Mac App Store

5.4.10 Apple iCloud

5.4.11 Apple Software Products and Computer Technologies

5.4.12 Apple Operating System Software iOS

5.4.13 Apple Mac OS X

5.4.14 Apple TV

5.4.15 Apple Third-Largest Mobile Phone Maker

5.4.16 Apple Regional Segment Operating Performance

5.4.17 Apple Americas

5.4.18 Apple Europe

5.4.19 Apple Japan

5.4.20 Apple Asia-Pacific

5.4.21 Apple Retail

5.4.22 Apple Revenue

5.4.23 Apple Net Sales

5.4.24 Apple iPhone Shipments

5.4.1 Apple iPad Shipments

5.5 Aware

5.5.1 Aware Company Overview

5.5.2 Aware DSL

5.5.3 Aware DSL Revenue

5.5.4 Aware’s Strategy

5.5.5 Aware Mobile Biometric Solution

5.5.6 Aware Revenue

5.5.7 Aware Biometrics and Imaging Revenue

5.6 BIO-key

5.6.1 BIO-key Security Solutions

5.6.2 BIO-key Smart Phone Markets

5.6.3 BIO-key Business Model

5.6.4 BIO-key Identity Management, User Authentication, Privilege Entitlement and Access Control

5.6.5 BIO-key Revenue

5.7 Cognitec Systems

5.8 Communication Intelligence Corporation

5.8.1 CIC Customers

5.8.2 CIC Business

5.8.3 CIC Revenue

5.8.4 CIC Core Technologies

5.8.5 CIC Products

5.8.6 CIC Revenue

5.9 Cross Match / Francisco Partners

5.9.1 Cross Match SEEK Avenger Handheld

5.9.2 Cross Match SEEK Avenger Customers

5.9.3 Cross Match Technologies Labcal

5.9.4 Labcal India

5.9.5 Cross Match Products

5.9.6 Cross Match Technologies Labcal

5.10 CSC

5.10.1 CSC Strategy

5.11 DigitalPersona

5.11.1 DigitalPersona Target Markets and Customers

5.12 eKey

5.13 EgisTec

5.14 Fingerprint Cards AB

5.14.1 Fingerprint Cards Sensor Technology Positioning

5.14.2 Fingerprint Cards Revenue

5.15 Fujitsu

5.15.1 Fujitsu Revenue

5.15.2 Fujitsu Technology Solutions Services

5.15.3 Fujitsu Personal Computers

5.15.4 Fujitsu Development and Production Facilities

5.15.5 Fujitsu Corporate Strategy

5.15.6 Fujitsu Revenue

5.15.7 Fujitsu Interstage

5.15.8 Fujitsu Acquires RunMyProcess Cloud Service Provider

5.16 Gemalto

5.16.1 Gemalto /Avalon Biometrics

5.16.2 Avalon Biometrics Solutions

5.16.3 Gemalto Avalon Biometrics Border Management

5.16.4 Gemalto Avalon Biometrics Document Verification of Travel & ID Documents

5.16.5 Gemalto Avalon Biometrics Live & Form-based Enrollment

5.16.6 Gemalto Avalon Biometrics Live Enrollment Solutions Mobile Applications

5.16.7 Avalon Biometrics

5.16.8 Avalon Biometrics SL Ghana Visa & Border Management System

5.17 Google

5.17.1 Google 2012 Corporate Highlights

5.17.2 Google Search

5.17.3 Google Revenue

5.17.4 Google Second Quarter 2013 Results

5.17.5 Google / Motorola

5.18 Green Bit

5.19 IBM Facial Recognition

5.19.1 IBM

5.19.2 IBM Strategy

5.19.3 IBM PureData System for Transactions

5.19.4 IBM Business Partners

5.19.5 IBM Messaging Extension for Web Application Pattern

5.19.6 IBM PureSystems Partners

5.19.7 IBM MobileFirst

5.19.8 IBM Business Analytics and Optimization Strategy

5.19.9 IBM Growth Market Initiatives

5.19.10 IBM Business Analytics and Optimization

5.19.11 IBM Strategy

5.19.12 IBM Smarter Planet

5.19.13 IBM Cloud Computing

5.19.14 IBM Business Model

5.19.15 IBM Business Revenue Segments and Capabilities

5.20 IdentiPHI

5.21 Interlink Electronics

5.22 Iris ID Systems

5.23 IriTech

5.24 RDSK / Litronic

5.24.1 Litronic Customers

5.24.2 Litronic Patents

5.25 Mereal Biometrics

5.26 Merkatum Biometrics Security & ID

5.26.1 Merkatum Target Customers

5.27 Motorola Solutions

5.27.1 Motorola Solutions Strategy

5.27.2 Motorola Solutions Biometric Attachment Mobile Identification Solution

5.27.3 Motorola Solutions Revenue

5.27.4 Motorola Mobile Biometric Identification Solution

5.27.5 Motorola Solutions Mobile Biometric Identification

5.28 NitGen & Company

5.28.1 Nitgen & Company, Investment of US $38 Million

5.28.2 Nitgen Marine Oil Bunkering business

5.28.3 Supply of Fingerprint Scanner with the Korean Government's National Electral System

5.29 Precise Biometrics

5.29.1 Precise Biometrics Customers

5.29.2 Precise Biometrics’ Tactivo™ Security Enhancements for Mobile Apps

5.30 NEC

5.30.1 NEC Business Outline

5.30.2 NEC Revenue

5.31 Nuance

5.31.1 Nuance Voice Biometrics

5.32 Safran Morpho

5.32.1 Safron Morpho Identification Division

5.32.2 Safron Morpho e-Documents Division

5.32.3 Safron Morpho e-Documents Payments

5.32.4 Safron Morpho e-Documents Identity & Access Management

5.32.5 Safron Morpho Global Presence

5.32.6 Safron Morpho Detection Division

5.32.7 Safron Morpho Revenue

5.33 Science Applications International Corporation (SAIC)

5.34 SecuGen

5.34.1 SecuGen Fingerprint Technology for Android

5.34.2 SecuGen Hamster IV Fingerprint Reader STQC Certification for India's UID Project

5.35 Siemens AG

5.36 SmartMetric

5.37 Smiths Detection

5.38 Steria

5.38.1 Steria Revenue

5.39 STMicroelectronics

5.40 Suprema

5.40.1 Suprema FVC Results

5.40.2 Suprema Revenue

5.41 Symantec

5.41.1 Symantec Security in Information-Driven World

5.41.2 Symantec Core Business Positioned for Growth

5.41.3 Symantec Acquires VeriSign Security Business

5.41.4 VeriSign Check Mark Signifying Trust Online

5.41.5 Symantec Creating Trusted Interactions Online

5.41.6 Symantec Revenue

5.42 Tyco Integrated Security

5.42.1 Tyco

5.42.2 Tyco Regional Revenue

5.42.3 Tyco Revenue

5.43 UnionCommunity  /  Virdi

5.44 Vision-Box

5.44.1 Vision-Box Border Control Biometrics

5.44.2 Vision-Box Facial Recognition Technology

5.45 Witswell Consulting and Services / Cyber-SIGN

5.45.1 Cyber-SIGN Biometric Technology

5.46 Zvetco Biometrics

5.46.1 Zvetco Biometrics Products

5.47 List of Companies Participating in the Biometrics Industry



List of Tables and Figures



Table ES-1 Types of Biometric Devices

Table ES-2 Biometric Device Target Markets

Table ES-3 Biometrics Devices Market Driving Forces

Table ES-4 Biometrics Devices Market Dynamics

Table ES-5 Biometrics Devices Market Restraints

Figure ES-6 Biometric Devices Market Shares, Dollars, Worldwide, 2012

Figure ES-7 Biometric Devices Market Forecasts Dollars, Worldwide,2013-2019

Table ES-8 Biometric Market Trends

Table ES-9 Biometric Technology Market Growth Factors

Table 1-1 Index of Biometrics Types

Table 1-2 Biometrics Industry Segments

Table 1-4 Biometric Store & Forward Systems Functions

Table 1-12 Cloud System Continuous Deployment Models

Table 2-1 Types of Biometric Devices

Table 2-2 Biometric Device Target Markets

Table 2-3 Biometrics Devices Market Driving Forces

Table 2-4 Biometrics Devices Market Dynamics

Table 2-5 Biometrics Devices Market Restraints

Figure 2-5 Biometric Devices Market Shares, Dollars, Worldwide, 2012

Table 2-6 Biometrics Market Shares, Dollars, Worldwide, 2012

Table 2-7 Biometrics Market Shares Participants with Measurable Share, Dollars, Worldwide, 2012

Table 2-8 NEC Analysis of Biometric Device Market Principal Competitive Factors

Table 2-9 NEC Analysis of Biometric Device Market Competitive Advantage Factors

Figure 2-1 Safran Mo rpho Identity Management

Table 2-11 Motorola Biometrics Products

Figure 2-12 Cross Match SEEK® Avenger

Figure 2-13 Biometric Devices Market Forecasts Dollars, Worldwide, 2013-2019

Table 2-14 Biometric Device Market Forecasts, Dollars, Shipments, Worldwide, 2013-2019

Table 2-15 Biometric Market Trends

Table 2-16 Biometric Technology Market Growth Factors

Figure 2-17 Biometric Device Market Segments, Dollars,  2012

Figure 2-18 Biometric Device Market Segments, Dollars,  2019

Table 2-19 Biometric Devices, Fingerprint, Facial Recognition, Voice and Other, Dollars,Shipments, Worldwide, 2013-2019

Table 2-20 Biometric Devices, Fingerprint, Facial Recognition, Voice and Other, Percent, Shipments, Worldwide, 2013-2019

Table 2-21 Biometrics Market Segments, Law Enforcement, Government / Documents and Passports, Healthcare, Electronic Device Protection, Airports / Commercial Access Control, Dollars, Worldwide, 2013-2019

Table 2-22 Biometrics Market Segments, Law Enforcement, Government / Documents and Passports, Healthcare, Electronic Device Protection, Airports / Commercial Access Control, Percent, Worldwide, 2013-2019

Table 2-23 Biometrics Devices: Dollars and Units, High End, Mid-Range, and Low End, Shipments, Worldwide, 2013-2019

Table 2-24 Biometrics Facial Recognition and Voice Recognition Devices: Dollars and Units, Shipments, Worldwide, 2013-2019

Table 2-25 Biometric Devices, Units, Shipments, Worldwide, 2013-2019

Table 2-26 Biometric Sensors, Units and Dollars, Shipments, Worldwide, 2013-2019

Figure 2-27 Non-Automated Fingerprint Biometric Market Shares, Dollars, Worldwide, 2012

Table 2-28 Non-Automated FingerPrint Biometric Identification Systems Market Shares, Dollars,

Worldwide  2012

Table 2-29 Non-Automated FingerPrint Biometric Device Market Forecasts, Dollars,  2013-2019

Table 2-30 Automated FingerPrint Information Systems (AFIS) Biometric Market Segments, Dollars, 2012

Table 2-31 Biometrics Automated Fingerprint Information Systems (AFIS): Dollars, Shipments,Worldwide, 2013-2019

Table 2-32 Biometrics Automated / Non Automated Fingerprint Devices: Dollars and Units,High End, Mid Range, and Low End, Shipments, Worldwide, 2013-2019

Figure 2-33 Biometric Facial Recognition Market Shares Dollars, Worldwide, 2012

Table 2-34 Biometric Facial Recognition Market Shares Dollars, Worldwide, 2012

Table 2-35 Biometrics Facial Recognition and Voice Recognition Devices: Dollars and Units,Shipments,Worldwide, 2013-2019

Table 2-36 Biometrics Market Segments Worldwide, 2013-2019

Table 2-37 Biometric Devices, Units, Shipments, Worldwide, 2013-2019

Table 2-38 Biometrics Devices: Dollars and Units, High End, Mid Range, and Low End, Shipments,Worldwide, 2013-2019

Table 2-39 Major Airports in the World

Table 2-40 Biometrics Devices: Dollars and Units, High End, Mid Range, and Low End, Shipments,Worldwide, 2013-2019

Figure 2-41 Biometric Sensor Market Shares, Dollars, Worldwide, 2012

Table 2-42 Biometric Sensor Market Shares Dollars, Worldwide, 2012

Figure 2-43 Biometric Sensor Market Shipments Forecasts Dollars, Worldwide, 2013-2019

Figure 2-44 Biometric Sensor Market Shipments Forecasts Dollars, Worldwide, 2013-2019

Table 2-45 Fingerprint Embedded Security Market Shares Dollars, Worldwide, 2012

Table 2-46 Biometrics Device and Sensor Market Forecasts

Figure 2-47 Biometric Equipment Regional Market Segments, 2012

Table 2-48 Biometric Equipment Regional Market Segments, 2012

Table 2-49 Biometrics Market Shares, Dollars, Worldwide, 2012

Figure 3-1 NEC Hybrid Finger Identification

Figure 3-2 NEC Fingerprint Identification

Table 3-3 NEC Fingerprint Identification Features

Figure 3-4 NEC Fingerprint Identification

Figure 3-5 NEC Minutiae and Related Method Illustrated

Figure 3-6 NECFingerprint Matching Processor (FMP)

Figure 3-7 NEC Multi-Biometrics

Table 3-8 NEC Portable DNA Analyzer Features

Table 3-9 NEC Portable DNA Analyzer Step by Step Procedures

Table 3-10 NEC Portable DNA Analyzer Technical Highlights

Figure 3-11 NEC Portable DNA Analyzer

Figure 3-12 NEC Portable DNA Analyzer STR by Electrophoresis Analysis / Analysis Program

Figure 3-13 Safran Morpho Identity Management

Table 3-14 Safran Morpho Public and Private Sector Security Systems Solutions

Figure 3-15 Safran Morpho Identity Management

Figure 3-16 Safron Morpho MorphoCivis™

Table 3-17 Safran Morpho System Aspects

Figure 3-18 Safron Morpho MorphoPerso

Table 3-19 MorphoPerso ID Documents Lifecycle Management Flexible Solution

Figure 3-20 Safron Morpho MorphoCheck™

Figure 3-21 Safron Morpho MorphoRapID™

Figure 3-22 Safron Morpho MorphoTouch™ 1200 Series

Figure 3-23 Safron Morpho Morphotouch™ 1200 Series Features

Figure 3-24 Safron Morpho MorphoBIS

Table 3-25 MorphoBIS, Morpho’s Next Generation AFIS Functions

Table 3-26 MorphoBIS, Morpho’s next generation AFIS Features

Figure 3-27 Safron Morpho MetaMorpho

Table 28 MetaMorpho™ ABIS Store and Management of Fingerprints and Palm Prints In A Single Database Feratures

Figure 3-29 Safran Morpho Outdoor MorphoAccess® 500 Series

Table 3-30 MetaMorpho™ MorphoAccess® (OMA) 500 Series High-Performance Fingerprint dentification Terminals Features

Figure 3-31 Safran Morpho Secure Biometric Access

Table 3-32 Cross Match Technologies Biometrics Offerings:

Figure 3-33 Cross Match SEEK® II

Table 3-34 Cross Match SEEK® II Advantages

Figure 3-35 Cross Match SEEK® Avenger

Figure 3-36 Cross Match SEEK® Avenger Advantages

Figure 3-37 Cross Match Guardian®

Table 3-38 Cross Match Guardian® Advantages

Figure 3-39 Cross Match Patrol ID / Patrol

Table 3-40 Cross Match Patrol ID / Patrol Advantages

Figure 3-41 Cross Match L SCAN® 1000T

Table 3-42 Cross Match L SCAN® 1000T Advantages

Figure 3-43 Cross Match Verifier® 300 LC 2.0

Table 3-44 Cross Match Verifier® 300 LC 2.0 Advantages

Table 3-45 3M Cogent Systems CAFIS Features

Table 3-46 3M CAFIS Agency Solutions:

Table 3-47 3M CAFIS Features

Table 3-48 3M Cogent Systems Prime Full Function AFIS for Local Law Enforcement Agencies Features:

Table 3-49 3M Cogent Systems CAFIS Functional Capabilities

Table 3-50 3M Cogent Systems Multi-Biometric Scale Document Issuance Program Target Markets:

Table 3-51 3M Cogent Systems Multi-Biometric Enrollment Station (CBES) Key Features:

Table 3-52 3M Cogent Systems Biometric Enrollment Software Key Features:

Table 3-53 Motorola Identity Management Features

Table 3-54 Motorola Multi-Biometric Capture and Verification Peripherals

Table 3-55 Biometric Identification Solution (BIS) Features

Figure 3-56 Motorola Mobile Biometric Identification

Table 3-57 Motorola Mobile Identification Solution Features

Table 3-58 Motorola Mobile Identification Solution Target Markets

Table 3-59 Google / Motorola Mobile Identification Solution Applications

Table 3-60 BIO-key International Biometric Technology Solutions

Table 3-61 BIO-key Large Scale ID Features

Table 3-62 BIO-key Large Scale ID Functions

Table 3-63 BIO-key for End User Systems

Table 3-64 BioAPI Consortium Standard API

Table 3-65 BIO-key's SDK Software Development Kit Features

Table 5-66 BIO-key Authentication Technology Benefits

Figure 5-67 BIO-key Biometric Tools Offered

Table 3-68 Precise Biometrics Tactivo Functions

Table 3-69 Precise Biometrics Tactivo Uses

Table 3-70 Precise Biometrics Smart Card Product Features

Table 3-71 Precise Match-on-Card for National ID Features

Table 3-72 Precise Biometrics U.S. Government Solutions

Figure 3-73 Precise Enterprise Solutions for Secure Sign-On

Figure 3-74 Precise Secure Mobile Authentication for Enterprise

Table 3-75 Precise Biometrics Tactivo Features:

Figure 3-76 Precise Match-on-Card for Enterprise Solutions

Table 3-77 Precise Biometrics Security Functions

Figure 3-78 DigitalPersona Biometrics, Multi-Factor Authentication and Access Management

Table 3-79  DigitalPersona Biometrics, Multi-Factor Authentication and Access Management Functions

Figure 3-80 DigitalPersona Pro Enterprise

Table 3-81 DigitalPersona Biometrics, Multi-Factor Authentication Pro Enterprise Features igitalPersona, Inc. ikonTouch 700Features

Figure 3-82 Fujitsu PalmSecure™

Table 3-83 PalmSecure™ Features

Figure 3-84 Fujitsu PalmEntry™ Access Control System

Table 3-85 Fujitsu PalmEntry Target Markets

Table 3-86 Fujitsu PalmEntry Market Positioning

Table 3-87 PalmEntry™ Access Control System

Figure 3-88 Fujitsu Med-Serv 50

Figure 3-89 Fujitsu Med-Serv 50 Kiosk Features

Table 3-90 Fujitsu Med-Serv 50 Features

Table 3-91 Labcal Be.U Mobile Series Biometric Features

Figure 3-92 SecuGen Hamster Plus

Figure 3-93 SecuGen Hamster IV

Figure 3-94 SecuGen OptiMouse Plus

Figure 3-95 NitGen NAC-5000

Figure 3-96 NitGen FINGKEY ACCESS Plus

Figure 3-97 NitGen NAC-2500 Plus

Figure 3-98 NitGen Access Manager Pro

Figure 3-99 NitGen FIM Module

Table 3-100 NitGen & Company Performance

Table 3-101 CSC’s Trusted Identity Enterprise Suite Full-Spectrum, Fully Integrated Solution Portfolio Modules

Figure 3-102 Accu-Time Systems Optimus2

Table 3-103 Accu-Time Systems Optimus2 Features

Figure 3-104 Accu-Time Systems AccuTouch

Table 3-105 Accu-Time Systems AccuTouch

Figure 3-106 Accu-Time Systems Maximus

Figure 3-107 Accu-Time Systems Maximus

Figure 3-108 Accu-Time Systems Prodigy

Table 3-109 Accu-Time Systems Prodigy Feature

Table 3-110 Avalon MVT - Mobile Application Suite Components

Table 3-111 Avalon MVT - Mobile Application Suite Key Features

Table 3-112 ekey Home Finger Scanner Feature Highlights

Figure 3-113 ekey Home Finger Scanner Wall-Mounted 2.0

Figure 3-114 ekey Home Finger Scanner FSB

Table 3-115 ekey multi – Extended Stand-Alone Solution Features

Figure 3-116 ekey Multi Finger Scanner Outlet-Mounted

Table 3-117 ekey Net – Networkable Solution Features

Table 3-118 ekey Logon Server Functionality

Table 3-119 ekey Logon Server Benefits

Table 3-120 Characteristics of Green Bit Scanners

Table 3-121 Green Bit DactyMatch SDK

Figure 3-122 Fingerprints FPC1011F3 Area

Table 3-123 Fingerprints FPC1011F3 Area

Figure 3-124 Fingerprints FPC1080A Swipe

Table 3-125 Fingerprints FPC1080A Swipe

Figure 3-126 Fingerprints FPC2020

Table 3-127 Fingerprints Card FPC2020

Figure 3-128 Merkatum emfiva F/FRS

Table 3-129 Merkatum ELA Logical Authentication Benefits:

Figure 3-130 Suprema RealScan G10

Figure 3-131 Suprema RealScan D

Figure 3-132 VIRDI AC F100

Figure 3-133 ViRDI AC 5000

Table 3-134 Aware Primary Biometrics Systems Target Markets

Table 3-135 Tyco Facial Recognition Specifications

Table 3-136 Tyco Facial Recognition Special

Table 3-137 Tyco Facial Recognition Parameters

Table 3-138 Tyco Full Range Of Access Control Solutions

Figure 3-139 EgisTec’s Unique E-Field (Capacitance) Imaging Technology

Table 3-140 EgisTec Image Quality Advantages

Table 3-141 EgisTec Key Features of CloudHub

Table 3-142 ST Supports France’s Innovation Clusters

Table 3-143 SAIC Voice Biometrics Open Architecture Functions

Table 3-144 SAIC Voice Biometrics Open Architecture Features

Table 3-145 SAIC Voice Biometrics Open Architecture Benefits

Figure 4-1 Biometric Fingerprint Pattern Measurements

Figure 4-2 Iris Reading Algorithms

Table 5-1 3M Cogent solutions Benefits

Table 5-2 3M Cogent Solutions Target Markets

Table 5-3 ATS Positioning

Table 5-4 Key Elements of Aware Strategy:

Table 5-5 BIO-key Authentication Technology Benefits

Figure 5-6 BIO-key Biometric Tools Offered

Table 5-7 BIO-key Key Areas For Market Growth

Figure 5-8 Cross Match SEEK Avenger Handheld

Table 5-9 CSC Operating Model for Efficiency

Table 5-10 DigitalPersona Customers

Table 5-11 DigitalPersona Technology Positioning

Table 5-12 DigitalPersona Fingerprint Biometrics for Commercial and Civil ID Applications

Table 5-13 Fingerprint Cards AB Profile

Figure 5-14 Fujitsu Main Products

Figure 5-15 Fujitsu Global Business

Figure 5-16 Fujitsu Geographical Market Participation

Figure 5-17 Fujitsu Global Alliances

Figure 5-18 Fujitsu Mixed IT Environments Forecasts

Table 5-19 Fujitsu Facts

Table 5-20  Gemalto Avalon Biometrics Live Enrollment Solutions

Table 5-21 Avalon Biometrics Target Markets

Table 5-22 Green Bit Market Sectors: Law Enforcement, Public Authority and Commercial Applications

Table 5-23 IBM PureSystems Target Industries

Figure 5-24 IriTech Regional Presence

Figure 5-25 IriTech Partners

Table 5-26 Litronic Patents

Table 5-27 Motorola Mobile Biometric Identification Solution

Table 5-28 Safran Morpho Profile

Table 5-29 Safron Morpho Technology Position In The Security Chain

Table 5-30 Safron Morpho Identification Division

Table 5-31 Safron Morpho e-Documents Divisions

Table 5-32 Safron Morpho Detection and Divisions

Figure 5-33 Steria IT Enabled Business Services

Figure 5-34 Suprema Biometrics Products

Table 5-35 Symantec Creating Trusted Interactions Online

Figure 5-36 Tyco Security Business

Figure 5-37 Tyco Mission Critical Solutions

Figure 5-38 Tyco Customers

Figure 5-39  Witswell Consulting and Services Cyber-SIGN Biometric Technology



PURCHASE OPTIONS
 
 
 

How can we help you?

Contact us at the Consulting WP office nearest to you or submit a business inquiry online.


  Contact
 

Subscribe to Our Newsletter

 
 
REQUEST SAMPLE    ASK FOR DISCOUNT