Phone: +23412950826 | Phone: +2349050096593 | Email:



Using identity to secure critical infrastructure.

Physical Access

One of the most important uses of ID cards is for securing entry points to critical infrastructure facilities such as airports, hospitals and ports. Employees working on these sites are issued with a secure card, often based on centrally mandated government standards, containing electronic data that grants access to the site and secure areas within the site itself. Access is granted through turnstiles and card readers. For the most secure areas, multi-factor authentication might be required. This would involve combining something you have (the smart card with pre-loaded secure electronic data), something you know (a password or PIN associated with the card) and something you are (a biometric such as a fingerprint or iris scan, read at the point of entry and associated with the card and password).

Visual ID

In most critical facilities all employees are required to wear a visual identifier at all times. It is imperative that this is secured from fraud to prevent imposters and potential security threats. A quick but secure check can be carried out with usual visual identification only if the card has additional security features alongside the personalised printing. This could be the use of a customised hologram, some UV printing or for the most secure applications, the use of a secure HoloKote watermark, which can be tied to a specific, single printer – preventing the fradulent printing of counterfeit cards. Government-issued IDs such as national ID cards and driver’s licenses are widely used for verification of individuals using public facilities – again it is critical these are secured.

Logical Access

Employees can be granted access to specialist equipment such as security scanners, IT terminals and traffic control equipment by the use of logical access control linked to a secure ID smart card. Electronic keys encoded on to the card’s chip, sometimes combined with a password or biometric can be used to unlock access to critical equipment for those that are permitted to use it. Access can be revoked or granted at the touch of a button.

Fingerprint Access Control and Identification

Even more security is a constant in our life, at work, at home, in leisure time and in those places where there is a large number of persons which share a common place.

Technological steps forward in fingerprint biometrics are opening new opportunities in different fields in which it is applied, adapting to every moment needs.

The common point for different security options is they must be easy to use and easy to install. Fingerprint biometrics shows several applications, overall for logical access and physical access in public places and work areas.

Physical Access Control and Logical Access Control

Fingerprint identification biometric systems offer several possibilities for physical and logical access control for an office and for PC environments.

Office Physical access control: fingerprint biometric technology allows controlling physical access easily and practically.
By registering their fingerprint employees are identified through a fingerprint access control terminal. This allows take control of employees. Furthermore, biometric fingerprint recognition technology allows to introduce time&attendance control by using a fingerprint biometric time&attendance control terminal.

PC environments Logical access control: Each user has a PC environment defined for his profile. By using fingerprint recognition for PC logical access users accede directly to its PC configuration. Other applications fingerprint recognition offers is server and management environments access, in which logical access is restricted to specific profiles.

Logical access control allows also other applications as in restaurants in which each waiter accede to its count and controls the tables and how much sells.

To install a fingerprint recognition terminal is easy and practice. Fingerprint biometrics is reliable and it is highly extend and accepted for the users. Its comfortable use is total, so it avoids using cards, keys or memorizes id numbers.