Please note that JavaScript and style sheet are used in this website,
Due to unadaptability of the style sheet with the browser used in your computer, pages may not look as original.
Even in such a case, however, the contents can be used safely.

Fingerprint Identification

Fingerprints have been commonly used by investigators and prosecutors for personal identification since the 19th century. Today, fingerprint identification is used in various fields and recognized around the world as a reliable method of personal identification. With over 40 years of related research and development experience, NEC is the world’s leader in fingerprint identification technology.

Two major characteristics of fingerprints

Uniqueness
  • No hereditary transmission
  • Every fingerprint is unique: Even identical twins have different fingerprints
  • All fingers on an individual have different fingerprints
Permanence
  • Aging does not affect the shape of fingerprints
  • Even after skin damage, the same fingerprint emerges


Characteristics of SecureFinger

World-leading matching accuracy
NEC’s proprietary identification algorithm, which employs the “feature points and relation method”, delivers the world’s highest level of identification accuracy and was ranked No.1 by an agency of the US government in its matching accuracy evaluation.-  Click here for details.

Radiated Light Reading Method fingertip sensor
A Radiated Light Reading Method fingertip sensor combines with advanced image - processing technology to enable easy, accurate fingerprinting of virtually any finger - even the slender fingers of women and fingers that are wet or dry.

Consideration for privacy
Fingerprint information obtained through the “feature points and relation method” is numerically converted, encrypted and recorded. Since no images are saved, and images cannot be derived from the saved data, privacy protection is especially reliable.

Wide-ranging applications from mobile to large-scale systems
Fingerprint data can be managed centrally on servers or on individual local PCs. It can be utilized on stand-alone systems or on servers with hundreds of thousands of registered users.


Security Solutions


Share: