Tuesday, 21 April 2015
Italian - ItalyEnglish (United Kingdom)

Tempestini Sys consiglia

Click to watch the Sniper management system video Training - Corsi


Website URL: E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it

Wednesday, 14 October 2009 15:02

TMP-Entry - Biometrical Facial Recognition


tmp-entry01.jpgTMP-entry is an innovative and advanced biometric solution that uses individual's face as a key to grant access of use to premises which needs to be secured against unauthorized individuals.

The ability to permit or deny the use of a particular resource by a particular entity is based exclusively on positive authentication of the individual.

Biometrics overcomes the trouble caused by an access card/key changing hands, getting lost, broken etc. Within the biometric offerings, face recognition is perceived to be the most precise, non intrusive, fast and customer friendly.

To enable access, the persons face picture must be taken and stored into TMP-Entry's database (i.e. enroll process). Thereafter, when the person approaches the access door TMP-Entry takes his picture again and verifies it with the person's faces in its database. If a match is found the system unlocks the door and logs the transaction.

If TMP-Entry doesn't find the person during the verification process the door will be kept locked. An Unauthorized persons photo is captured and stored in the database and the transaction is registered in the activity log for further investigations. The image acquisition part of TMP-Entry meets the geometric requirements and best practice geometric recommendations of ISO/IEC 19794-5:2005 standard.

Face recognition based biometrics is 40+ years old. Numberless attempts have been made throughout the years to deliver a reliable, friendly and accurate solution, with limited success. The rapid development of computer power versus cost, concomitantly with innovative and advanced image processing concepts have brought face recognition to the forefront of biometrics in recent years. Face recognition has been recognized by governments and various authorities throughout the world as the preferred method of choice for biometric verification and identification due to its non intrusive and friendly nature. Even so, the number of face recognition solutions providers is relatively small due to the high degree of complexity involved and thorough organizational long term commitment needed to face the challenges involved.

Tempestini Systems has been up to this challenge by addressing the complexities involved with Face Recognition from a different angle, the human angle. No more a straight measuring machine for Face profiling and recognition, but an interactive process between man and machine which ultimately proved extremely beneficiary in face recognition due process yield superb performance even in harsh conditions.

TMP-Entry was tested its solution in extreme lighting conditions as well as an exceptional wide range of skin texture with zero false acceptances.

Currently, Tempestini Systems offers the friendliest yet most accurate solution on the market for Face Recognition and verification.

  • Stand alone or networked authentication and enrollment terminals Non Intrusive, user friendly interface Easy to use
  • Interactive verification features Fast installation Enrollment quality indication
  • Embedded anti-counterfeiting mechanism; can't enroll or match from pictures, only people
  • Insensitive to beard, scull hair or prescription glasses
  • Fast single frame Enroll under-random lighting conditions in less than 1 sec
  • Ability to enroll using RFID (including Mifare), numeric keypad, barcode and debit/credit cards
  • Fastest match process under an extremely large dynamic light conditions including asymmetric including asymmetric
  • Up to 0.01% False Acceptance Rate, covering skin texture from milky white to deep black
  • Up to 2% False Rejection Rate for the same skin texture dynamic range
  • Operational in harsh operation conditions, indoor/outdoor, without performance degradation
  • Learning system with aging compensation mechanism Comprehensive reporting system with image sort and track mechanisms Person verification speed in less than 0.5 sec /person Covers applicant height 1.40m - 2.15m
  • Verification attained by implementing a sophisticated fusion of image mathematical tools using 3D to 2D matching transformations algorithms
  • Interfaces: Ethernet, Weigand
  • I/O: Dry-Contact
  • Web based administration with Encrypted database of transactions logging and access
  • The system provides full management of enrolled persons using a comprehensive reporting system with image sort and track mechanisms
  • Database server for reporting / data export
  • Master / chain to synchronize multiple ID stations
  • Easy integration with access control/time attendance systems
  • Easy integration with access control controllers using standard protocols
  • Capacity: scalable to any number of users, up to 100 users group profiles
  • Operation temperature: -5°C to 50°C
  • Operation humidity: 10% to 90%
  • TMP-Entry facilitates easy fusion with other biometric solutions via BIOAPI-2 (ISO/IEC 19784- 1:2005)

  • Microphonic Audio Verification System as Standard
  • Dual Channel Processing which contributes to Low Nuisance Alarms
  • Patented Alpha Sensor Technology
  • Unique ‘Performance Pledge’ Guarantee

Perimeter security is an effective deterrent to intruders with metal fences being the most common form of physical barrier. The most determined intruder can, however, defeat most types of physical barrier, usually by cutting through or climbing over the barrier.

Many electronic security systems focus on detecting intruders after they have entered the property. Often, this results in police or security personnel being alerted too late to prevent the intruder achieving their objectives. Intruders have learnt to make the most of the time delay between entering a property and the arrival of security personnel or police.

A well designed perimeter intrusion detection system, in which the detection technology is well matched to the physical barrier surrounding the site will not only provide reliable detection of intrusion attempts, but will offer the earliest possible warning of an attempt to enter the site illicitly.

The latest version of TMP-Protector, provides the capability to effectively combine the advantages of it's proven Alpha sensor cable technology with the physical delay factor and vibration transmission characteristics of the perimeter fence structure.

Perimeter detection systems employing TMP-Protector will provide earliest warning of intrusion attempts while simultaneously ensuring that false alarm activations are virtually eliminated. During the course of an intrusion attempt, security staff can monitor and verify intruder activity using the high quality audio produced by the Alpha senor cable.

TMP-Protector can communicate alarm information to many types of ancillary control room equipment such as CCTV matrices, alarm management systems and mimic panels ensuring that the control room staff are kept fully informed with regard to the security of the site.

TMP-Protector, in conjunction with the physical barrier provided by the perimeter fence, forms the first line, or primary defence, against attempted intrusions.

Alpha Sensor Cable Technology
The function of any sensor used in a perimeter security application is to maximise the signals generated in response to an intrusion attempt while ensuring that all other signals are effectively suppressed.

The upgraded TMP-Protector compliments and further enhances the performance of the Alpha sensor cable technology.
This technology, is independently verified by leading authorities as being technically superior to most other microphonic cable products.

The Alpha sensor cable, patented in most developed countries, is a precision built device specifically intended to convert mechanical vibrations generated as a result of intrusion activity into clear, low noise, electrical signals. It is the high quality of the resulting electrical signals that provides the performance advantage enjoyed by Alpha sensor technology compared to older technologies such as coaxial, fibre optic and piezoelectric sensors.

Because the Alpha sensor cable relies on two simple copper conductors to generate the intrusion related electrical signals, termination, jointing and repair of the sensor is infinitely easier and quicker than optical fibre sensors and requires no special tooling or training.
The Alpha sensor cable incorporates design features intended to maximise the frequency and response of the sensor so that as much intrusion related information as possible is presented to the TMP-Protector digital signal and processing platform.

Powerful adaptive filtering algorithms embodied within TMP-Protector then extract the most useful elements contained within the broad spectrum of the sensor cable response, allowing reliable and accurate detection of intruder related activities.

New Generation Analyser Digital Signal Processor
The digital signal processes embodied within the new TMP-Protector analyser are the result of many years of experience spent investigating the range if responses of various types of perimeter fence structures to a wide variety of intrusion related stimuli.

This experience has demonstrated the shortcomings of more conventional signal processing techniques such as Fast Fourier Transforms (FFT) and other simple frequency selective processes. Techniques such as these fail when overlap occurs in the frequency spectra of intruder related activities and, for example, environmental phenomena such as wind, rain, hail etc. These processes alone provide insufficient discrimination of such overlapping events.

TMP-Protector embodies multiple channels of simultaneous signal processing where not only the frequency content of each channel is examined, but other significant features of the sensor signals including envelope duration, rate of change of signal and power spectral density are taken into account.
This ensures the best overall performance of the TMP-Protector analyser/Alpha sensor combination.

While the processes employed within the new TMP-Protector analysers are complex and powerful, care has been taken to ensure that the system remains simple to set up and commission. This is accomplished by employing adaptive techniques that automatically optimise the signal processing algorithms to suit the type of fence structure to which the sensor cable is attached.


System Functionality

Maximum Security
  • Simultaneous multi-channel digital signal processing enables “no compromise” detection of varied attack scenarios while maintaining a very low false alarm rate.
  • Alpha sensor technology enables reliable detection of micro-impacts generated as a result of sophisticated attack styles.
  • Digital detection processes simplify user setup and commissioning while maintaining extremely high system performance.
  • System performance, defined in terms of high probability of detection while maintaining a very low false alarm rate is backed by the TMPProtector Performance Pledge.
  • Simple interfacing to external equipment via volt free relay contacts, open collector outputs, and RS485 communications loop. Audio output provided as standard.
  • Self test capability and comprehensive LED visual indication of system status.





Alarm Management and Control Equipment

TMP-Protector is designed for applications on manned or unmanned sites, whether as a standalone single zone system or as part of a comprehensive multiple zone installation.

Simple low level interfacing via volt free relay contact ensure that TMP-Protector is easily intergrated with virtually all security management systems.

TMP-Protector easily integrates with Gthernet system in situations where it is necessary to transmit alarm information across an existing Ethernet network or where own dedicated security Gthernet solution is preferred.

Audio Verification

Audio verification is easily implemented utilising the standard high quality audio output included as part of every TMP-Protector analyser.

TMP-Protector Performance Pledge
There are many claims made by the manufacturers of electronic perimeter intruder detection systems regarding the performance of their systems. Some purport to offer superior performance by utilizing sophisticated electronic detection techniques, others may simply make claim to the fact that their’s is best. Tempestini Group believes that the ultimated endorsement is in the product’s actual performance, side by side against any other manufacturer.

Such is our confidence in the superior performance of the TMP-Protector system against any other manufacturer’s fence-mounted cable sensor system, that if TMP-Protector is outperformed on an agreed ‘like for like’ trial, Tempestini Group will purchase the other manufacturer’s trial system on behalf of the end user.

System Accessories

Since the latest version of TMP-Protector utilises the standard Alpha sensor cable, a wide range of accessories including junction boxes, gate loop kits, gate bypass switches and termination kits are available as standard items provided for earlier versions of analysers.

Key Advantages of TMP-Protector
  • Multi-channel signal processing ensures high detection performance coupled with low false alarm rates
  • Simple low level interfacing with 3rd party security management systems
  • High quality audio monitoring capability
  • Simple to install and commission
  • Independently verified performance levels

TMP-Protector protects a new airport

Il Sensore Microfonico con performance certificate
  • Costo competitivo per qualunque dimensione perimetrale
  • Funzionamento in condizioni estreme da -40°C a +80°C
  • Veloce da installare con un minimo addestramento
  • Sistema di supervisione estremamente semplice
  • Sensore microfonico esente da manutenzione
  • Senza alimentazioni ed elettroniche di campo per 5000m
  • Veloce e semplice da riparare in caso di guasto
  • Unico cavo per recinzioni alte fino a 3m

Leader nel campo di soluzioni di protezione aeroportuale.

Wednesday, 03 June 2009 08:09

TMP-T4000 for airports security

TMP-T4000 passive stand-off screening system

Screen for a wide range of concealed objects
Metals, plastics, gels, explosives, composites, narcotics, currency, liquids.
Screen from a safe stand-off distance
Gain precious time to react at the earliest opportunity.
Screen without introducing security ‘bottlenecks’
Screen people at various distances, as they move, – no need for static person screening at a single point.
Safe and non-invasive
Totally passive screening technology. No privacy violation, anatomical details are not revealed.

See what’s hidden
The TMP-T4000 system is effective in many applications whether alone, or as part of a comprehensive, multi-layered security solution protecting your site and people. Monitor your entrances and exits, or even remotely image unattended locations. Use where protection of life, or need for loss prevention demands that you know who is concealing items and where they are concealing them. Screen for concealed plastics, composites, ceramics, metals and materials that can be crafted to create a suicide bomb or other threat (including liquid explosives). Image concealed contraband such as narcotics packages and locate concealed objects that are not picked up by metal detectors.


Screen stationary and walking subjects over various distances
• Typically 3m to 15m (10ft to 50ft) – depending on concealed object size.
Simple installation in diverse locations
• Ceiling, wall or floor mounting options for overt or covert use, with or without pan-tilt equipment.
• Uses Ethernet cable and mains power supply.
Remote operation
• PC may be any distance from the camera unit – even in another country!
• PC links to TMP-T4000 camera using IP communication over Ethernet.
‘Plug and play’
• T4000 camera self calibrates to suit the local environment. No complex modification of local environment is required.
‘Future proof’ upgrades
• Remote software for integration into “smart” alert based CCTV security systems.

How the TMP-T4000 works

  1. Naturally occurring terahertz waves emitted by people and objects are detected by the TMP-T4000 camera along with a CCTV image.
  2. Terahertz and CCTV image data is transferred to security operator’s remote PC/notebook using IP Ethernet link.
  3. T4000 software displays real time images of subject and concealed objects.


Typical installations

Customs and border control
Discreet screening of arriving or departing
passengers for concealed contraband.
Example installation
Ceiling mounted TMP-T4000 with pan-tilt.

Sporting/cultural event screening
Visitor entrance screening for concealed threats.

Monday, 25 May 2009 14:28

TMP‐FP2000 - Finger print reader

  • Easy LED and LCD Instruction
  • 16 digit keypad with 40 customizable function keys
  • Able to work with or replace existing RFID Reader using Wiegand Protocol
  • Alloy Zinc Casing for durability
  • Flexible communications options including Wiegand I/O, TCP/IP, RS232 and RS422
  • 4 Input, 2 Output points
  • Firmware upgradeable
  • Flash memory back up for event memory buffer
  • Anti-tamper facility
  • Cover lid offers extra protection for scanner
  • Can use as standalone or in a network


  • User Registeration : 1,000 or 4,000 Users
  • Transaction Memory Buffer : 24,000Transactions
  • Up to 64 connections using RS422 converter / Unlimited using TCP/IP
  • 16*2 Line Character LCD (Blue backlight)
  • 16 digit keypad with 40 customizable function keys
  • Audio Visual Indicator - Red LED : Access denied / Green Led : Access granted (with Audible Beep)
  • FAR (False Acceptance Rate) = 0.0001%
  • FRR (False Rehection Rate) = 0.01%
  • Adjustable Fingerprint Recognition Level : 0~9 (10 Levels)
  • Recognition Adjustment S/W (FDA) provided (Factory Set)
  • KF-2000 : 1 door controller
  • Compatible Cards : All HID RF Cards, EM Cards, Mifare Cards
  • Networking Software - PLA-64, PLAT-4000, PLAT-Plus, PLA-Pro

Operation Mode

  • TMP-FP2000[FPC] supports 11 Operation Modes:
  • Card and Fingerprint
  • PIN or Fingerprint or Card
  • PIN and Fingerprint or Card
  • PIN and Fingerprint or Card and FingerPrint
  • PIN and Fingerprint
  • Fingerprint Only
  • Pin and Fingerprint or PIN and Card
  • Always Open
  • Card and Fingerprint and PIN
  • Card or Fingerprint
  • Always Close
  • Warranty : 1 year parts and labor


CPU ㆍ32bit ARM9 / 8bit CPU
Power ㆍ12V DC 1A
Dimensions ㆍH170 × W100 × D75mm
Operating Temperature ㆍ-10

Operating Humidity ㆍ10%~90%
Verifcation Time
ㆍ1:1 - 0.5~1Sec
ㆍ1:N - 1~2Sec(1,000users) / 2~4Sec(4,000users)
RF Card Reading Range ㆍ5~10cm
Communication ㆍRS-232(15m) / 422(1.2Km) and TCP/IP
In/Out point ㆍ4 In / 2 Out
Material ㆍAlloy zinc
Recommended Cable
ㆍALPHA 6212C, 2 - Twisted Pair, and Shield Cable With Drain Wire
ㆍBelden No.9329 - 22AWG for 1000ft(305m) maximum distance
ㆍBelden No. 9369 - 18AWG for 4000ft(1220m) maximum distance
Cerifications ㆍCE Mark, FCC, USA GSA
ㆍColor : Persian Blue / Silver
ㆍUser Registration : 1,000Users / 4,000Users
ㆍExpendable Event Memory





Monday, 25 May 2009 13:37

TMP-Bio Fingerprint Readers

Simplicity and Security of Fingerprint Readers


TMP’s fingerprint readers provide unrivalled facility security and positive identity verification without compromising user convenience.
Ideal for retrofits, the TMP-Flex adds a biometric layer of security to an existing external Wiegand reader or keypad.
The selfcontained fingerprint reader provides optimum security enhancement without reissuing cards or replacing existing readers.
This dualfactor solution combines a self-contained fingerprint module and a proximity reader in one modern package.
It eliminates concerns about stolen, loaned or compromised proximity cards.
This easy onetouch fingerprint identification reader recognises up to 500 users.
Recognition is based on finger only no more PINs, keys or cards.
The BioSmart is a fingerprint reader associated with an external smart card reader (MIFARE). Fingerprint templates are securely stored on the cardholder’s smart card.

The selfcontained TMP-Flex and TMP-Prox readers store approximately 4,000 fingerprints
The TMP-Pass stores 500 fingerprints.
With the TMP-Smart, the template is stored directly on the smart card allowing an unlimited number of users and complying with regulations about the protection of users’ private information.
Amadeus 5 Access Control Software offers a simple approach to template management (enrolment & distribution) and reader configuration.
The installation is userfriendly, with preprepared cable and with singlegang or mullion mount compatibility.
Onetouch enrolment makes the bioreaders extremely simple to use.
The intuitive user interface is reinforced by red, amber and green LED, as well as tone signals.
The readers are using the industry’s most accurate fingerprint algorithm (#1 at FVC 2002).
Duress finger feature is optional.

Key features
Amadeus 5 enrolment screens
All the biometric data necessary for enrolment and distribution are supervised from the Amadeus 5 software.

 TMP‐Flex, TMP‐Prox and TMP‐Smart
• Algorithm type: Verification (1:1)
• Enrolment time: < 3 seconds
• Verification time: < 1 second
• (EER) Equal Error Rate (FAR=FRR): 0.1%
• Adjustable FAR and FRR
• Number of templates:
TMP-Flex and TMP-Prox: ~ 4,000 per unit
TMP-Smart: unlimited
• Template size: ~ 350 bytes

• Algorithm type: Identification (1:n)
• Enrolment time: < 3 seconds
• Identification time: < 2 seconds
• False Acceptance Rate: (FAR) = 0.2%
• Number of templates: 500 per unit, optimized for 100
• Template size: ~ 2,400 bytes

Technical specifications

o TMP-Flex, TMP-Prox, TMP-Pass: 130 x 50 x 65.5 mm
o BIOSmart: 130 x 118 x 65.5 mm
Voltage: 916 V DC
Current draw
o Idle: 0.15 amps @ 12 V DC
o Max: 0.40 amps @ 12 V DC
Certifications: FCC, CE, UL294, cUL (for TMP-Smart)

o RJ11 auxiliary port for RS232 connection, or RS485
through the back cable
o Baud rate: 38.400 bauds
Operating temperature: 0°C 60° C
Outdoor enclosure available
o Wiegand IN/OUT
o ISO2 IN/OUT (Option)

SGK - Security Gate Keeper

  • Airport check-in, boarding gates
  • Customs checkpoints, border controls
  • Prison contraband detection efforts
  • Government building access and exits
  • Public transportation facilities

The Layered Voice Analysis (LVA) technology provides the means to examine not only what subjects are carrying, but to highlight and determine their actual intentions in advance.

Recent terror attacks have proven that the rules of the game have changed, and that the willingness of terrorists to lose their own lives has made deterrence and prevention significantly more complicated. The search for concealed weapons, explosives and sharp objects is no longer sufficient. We are now compelled to examine not only what subjects are carrying, but to discover their motivations in advance.
The Layered Voice Analysis (LVA) technology now allows us to do that. By having your subjects answer three to five yes-no questions, it is now possible to reveal their true intentions.

SGK is a security access control system, providing an easy-to-use voice analysis solution to determine whether or not the purpose of an individual’s access to a secured area is legitimate.
SGK provides instant security verification and threat assessment before allowing access to high-risk facilities and secured and sterile zones.

Designed for rapid intention verification using input from only 3 to 5 questions, SGK will identify the overall emotional state of the subject during interrogation, allowing its operators to single out potential harmful intentions.
SGK is a state-of-the-art, reliable security measure, which significantly reduces embarrassing and unnecessary inconveniences to the largely legitimate public. In border control scenarios, one encounters diverse emotional structures that are not associated with criminal intent, e.g. exhausted travelers, excited vacationers, etc. The uniqueness of the SGK system is its ability to cluster and categorize these different emotional structures by learning to identify those that signal true intention to commit crimes or acts of terror.
Different locations require different means and methods for security checks, and SGK is primed to meet a variety of challenges. The diversity and flexibility ranges from a single language manually operated system to multilingual automated posts. The system can operate from a noisy and public high traffic area to a closed intimate checkpoint. SGK is specifically designed to meet your needs for any level of security.

SGK Operation
A series of 3 to 5 specific questions are presented to the subject. The response to each question is recorded and analyzed automatically by the system. Once the questionnaire has been completed (up to 60 seconds for a full 5 question questionnaire), SGK will produce a result: either "Green" or "Red", indicating to what degree the subject fits the expected emotional profile for non-criminal intent.

SGK is intended for use in: airport check-in areas; airplane boarding gates; customs checkpoints; border controls; security stations; drug smuggling and interdiction efforts; prison contraband detection efforts and any entrance / exit environment that requires heightened security.

Layered Voice Analysis (LVA) Technology
The Layered Voice Analysis technology enables a quick and effective decision making process based on any available audio data. LVA has the ability to identify various types of stress, cognitive processes and emotional reactions which combine to build the complete "emotional structure" of an individual at the time of voice capture.
LVA uses a series of patented signal processing algorithms to detect different emotional levels within a given voice sample, and subsequently identify deceptive motivation, criminal intention, and general credibility. These tools will simplify any investigative procedure.

LioNet Technology
LioNet is a powerful learning engine designed to increase the accuracy in the identification of specific emotional signatures. The technology begins with an empty knowledge base and is trained to recognize various emotional signatures that are of interest to a particular site. Recognition accuracy and reliability increase as the knowledge base becomes more robust. LioNet technology is designed to work in tandem with these kind of security-related products.

Providing all Safeguards
As a psychological evaluator, SGK can go far beyond any physical security equipment that is currently available. Combining SGK with traditional metal detectors and “sniffers” further tightens security.
SGK is constructed to ensure the highest reliability in the detection of threats. Three independent algorithms are used to ensure that each result is verified:

  • A polygraph-like analysis, comparing emotional reactions to known questions
  • An emotional profile-match test using a sophisticated learning system
  • "Extreme Behavior" indicator – to flag any unknown or rare emotional profile that may indicate criminal intent with catastrophic consequences

While “Green-Lighted” individuals are processed swiftly, “Red-Lighted” subjects receive further attention and are forwarded to a secondary LVA / SGK station for further examination.
At that stage, subjects are either fully cleared or detained for a more in-depth inspection.


  • No gender, orientation, ethnicity, or age bias
  • Determines criminal / wrongful intent in a non-intrusive manner, in less than 60 seconds
  • Functions in tandem with additional security measures to deliver an efficient, nonintrusive and easy-to-use investigation technique for threat identification
  • Reduces unnecessary inconvenience to the legitimate public
  • Learns emotional patterns using a heuristic system to constantly improve measurement accuracy.


The LVA 6.50 provides the ultimate investigation focus tool for homeland security, intelligence, military and law enforcement use.
LVA 6.50 is a security-level advanced voice analysis solution providing instant truth verification, threat assessment, and emotion identification. LVA 6.50 analyzes voice samples in real-time to provide timely and reliable results for quick and effective decision-making. LVA technology was designed specifically for security, law-enforcement and multi-purpose intelligence use, and is available in three different usage modes:

  • Online Mode - Enables users to tailor their investigation questions in real-time, allowing them to pursue leads discovered during the test itself.
  • Offline Mode - Provides in-depth analysis of pre-recorded conversations.
  • Investigation Mode - Uses a polygraph-like questionnaire and methodology to quickly get to the facts.

LVA works with any spoken language - analyzing not "what" is being said, but "how."

LVA 6.50
The security arena is routinely challenged by new types of threats, more sophisticated criminal activity and more advanced sources of investigation data. The need to identify harmful intentions and crime suspects coupled with the need to differentiate between relevant and insignificant information is crucial for success. With the ability to detect and measure a wide spectrum of emotions and cognitive processes in real-time and/or offline, LVA 6.50 provides a critical edge.

The advanced LVA 6.50 investigation focus tool is an innovative voice analysis system that allows users to measure emotional activity, verify veracity, and identify deception. During investigations, interviews and casual conversations, the tool points out any "notable" areas in the subject's narrative, and enables users to identify the truth faster and more accurately than previously possible.

Combines three modes of operation:

Online Mode
Online Mode is used to conduct investigations where analysis is required in real-time. This allows users to focus on suspected portions of speech, screen large numbers of subjects by process of elimination, and save precious investigation time.

  • For investigations requiring real-time analysis
  • Used in face-to-face interviews (microphone) or via telephone
  • Easy-to-use mode providing many automatic analysis tools
  • Real-time feedback helps focus on suspected issues and obtain more leads
  • Displays top level analysis using simple expressions such as "Truth", "Inaccuracy", "High Stress", and "False Statement"
  • Records the conversation for further analysis or future use

Offline Mode
The Offline Mode analyzes pre-recorded material to produce an in-depth psychological protocol. Offline mode can analyze vocal segments from any source of audio such as tape recordings, DAT (Digital Audio Tape) recordings, video recordings, radio, television, live subjects or phone calls.

  • Analysis of recorded voice data to provide an in-depth view of the subject's complete range of emotions during time of recording
  • Interactive data presentation, graphs, reports and statistical information
  • Built-in database for audio files and recordings
  • Each voice segment analyzed separately

Investigation Mode
Investigation Mode provides quick and computerized summaries and reports using familiar techniques of questioning that are standard in polygraph examinations.

  • Similar to the Polygraph, using yes/no question templates
  • Unlike the Polygraph, requires no contact equipment other than a microphone
  • Designed for direct truth verification using a pre-planned questionnaire
  • Very short learning cycle for any trained polygraph expert

LVA 6.50 offers two recording modes for optimal format recording of sound files:

  • Basic Recorder - begins recording face-to-face conversations immediately either via microphone or telephone (a special telephone-PC connector is included with the product). The recording is then logged into the LVA database for quick retrieval.
  • Advanced Recorder - designed to serve the Offline Mode analysis of recorded conversations from external sources. This mode enables you to fine-tune the output volume from your external unit to generate the best possible recording to a file.

Layered Voice Analysis (LVA) Technology
The Layered Voice Analysis technology enables a quick and effective decision-making process based on any available audio data. LVA has the ability to identify various types of stress, cognitive processes and emotional reactions which combine to build the complete "emotional structure" of an individual at the time of voice capture.
LVA uses a series of patented signal processing algorithms to detect different emotional levels within a given voice sample, and subsequently identify deceptive motivation, criminal intention, and general credibility. These tools will simplify any investigative procedure.


  • Most advanced Voice Analysis technology available
  • No gender, orientation, ethnicity, or age bias
  • Provides both on-site real-time and offline in-depth analysis and truth verification
  • Records, categorizes, and analyzes incoming voice segments from any source of audio
  • Language-independent- analyzes "how" a person speaks and not "what" is being said
  • Easily adaptable to different interface languages


  • Investigation Focus Tools
  • Multi-purpose intelligence use
  • High Security Employment Screening Hostage Negotiation
  • Intelligence/Counter-intelligence

Fair Integrity Assessment for your Human Resource needs

The  LVA-i is the state-of-the-art in automated Integrity/Risk Assessment system.
Using a unique combination of advanced questionnaire methodology and voice analysis technology, LVA-i provides an unprecedented level of insight into the integrity and risk potential of employment candidates. LVA-i is an essential tool for recruitment agencies and in-house HR divisions seeking to optimize the employee screening and selection process.
Featuring a fully automated and user-friendly interface, LVA-i requires no technical or assessment expertise for operation.

  • Fully automated testing, assessment and reporting
  • Promotes fair hiring practices by providing non-biased assessments
  • Customizable test topics to meet your organization's evolving needs
  • Language-independent: analyzes responses spoken in any language
  • Helps protect your organization from potential workforce liabilities

HR professionals face the constant challenge of identifying the most capable and dependable employees from an often very large pool of candidates. Neglecting to conduct effective pre-employment assessments can result in poor workforce productivity, potential law suits, damaged company reputation, and financial loss- all of which threaten the success of your business or organization.
Various pre-employment screening techniques are available to help meet this challenge. Aptitude tests, background checks and personality profiling aid in the assessment of technical skills, prior experience, and overall credentials of a candidate. But what can employers do to reduce the threat of liability that a potential employee may pose in the future? How can you accurately identify a candidate’s level of risk regarding unlawful acts relevant to your business?


Introducing LVA-i Automated Integrity Assessment
LVA-i is a revolutionary product in integrity and risk assessment techniques. LVA-I leverages the advanced Layered Voice Analysis technology to estimate a candidate’s liability potential by analyzing the emotional content of his or her voice when responding to specifically designed questions. An LVA-i assessment provides insights into a candidate’s ethical inclinations, identifies what portions of her/his response s/he is uncertain about, what questions require more of her/ his mental attention, and what topic areas appear to be sensitive issues for the candidate.
This information is analyzed by the LVA-i engine to produce a final “Risk Report” for the candidate, highlighting any specific areas that may be of concern to an employer.

Test Themes & Topics
The HR Manager, or hiring officer, may use the integrity-risk score as a supportive indicator for next-step interviews with the applicant. This Integrity Score is an indication of the level of risk that the potential employee may introduce to the organization with regard to the following topics and themes:

  • Confidentiality and secrecy
  • Loyalty
  • Honesty
  • Drug usage
  • Theft from place of employment
  • Credibility, Honesty and Integrity
  • Gambling
  • Bribery and Kickbacks
  • Fraud and Deceit

Automated Assessment

  • No intimidation, no preparation - simply refer the candidates to a room with privacy and let the automated voice system guide them through the assessment.
  • Immediately generated report – easy to understand, intuitive and instantly produced at the end of the assessment.
  • Language customizable - tests can be generated in a variety of languages.
  • Accessible – no special operator training required.

Business and CRM
These Business and CRM develops innovative tools and services that leverage the attributes of Layered Voice Analysis (LVA) technology to meet the needs of the commercial and financial markets. We currently offer three types of applications for these markets:

  • QA5 series for Quality Assurance & Customer Relationship Management
  • RA5 solutions for Fraud Detection & Risk Management

LVA (Layered Voice Analysis) Technology
The Layered Voice Analysis technology detects and measures the emotional content of human speech, captured live or extracted from recorded audio. LVA identifies various types of stress, cognitive processes and emotional reactions which together comprise an individual’s “emotional structure” at the time of voice capture.
By utilizing a wide range spectrum analysis to detect minute, involuntary changes in the speech waveform, LVA can detect anomalies in brain activity and classify them in terms of stress, excitement, deception, and varying emotional states, accordingly.

Verifier 3.0, advanced voice authentication software, enables businesses to provide secure access to sensitive information over the telephone. Like a fingerprint, Verifier voice authentication software creates individual voiceprints to authenticate callers and customers with just their voices, enabling secure access to information. Verifier 3.0 can also deliver improved caller satisfaction through convenient access to key automated speech solutions, including Financial & Retail transactions and account management, personal information access, time management, PIN reset, and benefit access. Adding voice authentication to these applications may result in increased use of automated systems and reduced fraud, saving Call Center costs. When deployed with  speech recognition and textto- speech, businesses around the world can build a range of secure, cost effective applications that can increase automation and improve customer satisfaction.

Meeting the security challenge: voice authentication
Companies today have a wide range of options to choose from for security: touch-tone PINs, agent identification questions (e.g., “What are the last four digits of your social security number?”), pre-chosen passwords and now, voice authentication. Of those options, voice authentication offers the best combination of accuracy, convenience, and cost-effectiveness. This biometric technology captures specific physical characteristics of the human voice, using those characteristics to identify callers, something that other security measures just cannot do. This technology can also be a fundamental component of a multi-factor authentication approach. From securing financial transactions to allowing access to private health records, voice authentication takes security to a whole new level – with just a telephone and the human voice.

Reduce the costs of customer service by increasing automation
Typically, security measures such as touch-tone PINs and agent questions have a high cost associated with them. PINs can be forgotten, so a customer service representative must reset them. After resetting the PIN, the representative may not be able to send the caller back to the automated system, requiring them to assist the caller with a transaction that a more cost-effective automated system could otherwise complete. In addition, agent identification questioning can take up to a minute to complete, increasing the overall length of an already long and expensive call.

Verifier 3.0 can reduce the costs associated with both of these security options. Customers may no longer need to remember long complicated PINs, reducing the costs associated with PIN resets. In addition, no longer needing to reset PINs could allow callers to remain in the automated system to complete their transactions. Using Verifier 3.0 to identify a caller prior to transferring the call to an agent can reduce the length of a call by removing the need to ask identifying questions. In addition, agents are freed up to handle more complex tasks rather than spending time identifying the caller. consumers find voice authentication convenient and secure.
A study by Touchpoint Consulting determined that consumers are comfortable using voice authentication as a means of convenient and secure access. In fact, 88% of participants found voice authentication to be more or equally convenient than touch-tone PINs. Seventy-four percent of participants also felt that voice authentication was more or equally secure than PINs.

Using Verifier 3.0
Using Verifier 3.0 is simple. Callers participate in a brief, one-time enrollment process during which they answer several questions, allowing Verifier to capture and store their voiceprint. The voiceprint is not a recording, but an encrypted file similar to that found in fingerprinting technology.
When a caller accesses the application at a later point, Verifier compares the caller’s voice to the voiceprints on file. If Verifier finds a match, the caller gains access to the system. state of the art technology
Verifier 3.0 builds upon years of research and deployment expertise to deliver high levels of accuracy and security to applications. It allows for a single voiceprint enrollment for ongoing use from any phone at any time, provides high accuracy for use in noisy, wireless and handsfree environments, and has the ability to adapt to changes in a caller’s voice to ensure that applications using Verifier will be easy for callers to use over and over again. While results vary by application, Verifier 3.0 has achieved false accept rates lower than one percent. maximum flexibility  Verifier 3.0 applications can be developed to meet a wide range of customer needs. Applications can be deployed with very high security for access to highly sensitive information such as financial or health care information. Verifier 3.0 can also support applications with convenience in mind, such as remote time management reporting. Companies have the flexibility to determine the best mix of security and convenience to meet their application needs. In addition, Verifier 3.0 provides options for enrollment and verification that allow groups to share the same identifier, enroll and verify using rotating questions, or even verify callers in the background while the callers are completing other tasks.

Verifier deployments made easier
Tempestini Group enables partners and customers to reduce voice authentication application deployment time by up to 25% through tuning capabilities and mentoring services. Verifier 3.0 includes application logs that track key performance data, allowing for more effective application tuning and analysis. We also offer Verifier Mentoring Services that provide partners and customers with mentoring on voice authentication application design, testing methodologies and tuning analysis. These services leverage Tempestini Group’s expertise in Verifier deployments and enable partners and customers to deploy effective applications to their customers, and ultimately, deliver satisfied callers. supporting multi-factor authentication
Multi-factor authentication is becoming increasingly important as a defense to growing threats of security attacks, especially security attacks based on obtaining an individual’s password via ‘social engineering’ (trickery). The 2005 FFIEC guidance,
“Authentication in an Internet Banking Environment”, and the follow-on FAQ in 2006 focus on further increasing the security of all electronic banking channels, including the telephone. The FFIEC recommends that financial institutions employ two of the following three factors to maximize security:

  • Something the user possesses – (e.g., a token, ATM card, or USB device)
  • Something the user knows – (e.g., a shared secret, password, or account number)
  • Something the user is – (e.g., a fingerprint, iris scan or voice print)

Speaker verification solutions support a highly secure, cost effective approach to customer multi-factor authentication over the voice channel.

Verifier 3.0 offering:

  • Effective in a wide range of environments—landline, wireless or handsfree phones
  • Language-independent, does not required speech recognition
  • High accuracy
  • One-time enrollment for verification during any subsequent call, from any type of phone
  • Speaker identification allows multiple users to share an account or identifier
  • Ongoing adaptation of voiceprint characteristics as voices change or age, improving the quality of voiceprints for faster, more accurate verification
  • Supports liveness testing to safeguard against ‘spoofing’ with recorded speech
  • Channel and gender identification
  • Server architecture supports high transaction volumes
  • Accessible via standard VXML
  • Verification using letters, numbers, alphanumeric strings, phrases, etc.
  • Dynamically detects if more information is needed to verify callers
  • Advanced logging for more effective application tuning
  • Can increase system automation and cost savings by reducing reliance on live agents to identify customers
  • Can reduce occurrences of PIN resets, reducing call center costs
  • Can increase security of information access, reducing the potential for fraud and identity theft
  • Can improve customer service with a convenient means of security
  • Flexible means of verification for individuals or groups
  • Simple maintenance, load balancing and fault tolerance

Operating systems

  • Windows® Server 2003
  • Red Hat Linux ES 4.0
Tuesday, 28 April 2009 11:41

Sistema controllo accessi

Soluzioni tecnologiche per l’identificazione
Il controllo degli accessi in aree sensibili ha una valenza fondamentale in termini di sicurezza.
Il badge non rappresenta la soluzione, mentre molti sistemi biometrici sono troppo costosi o difficili da gestire.

  • Sistemi a tessera
    • Badge
    • Smart Cards
  • Sistemi biometrici
    • Impronta digitale
    • Riconoscimento facciale (o dell’iride)
    • Riconoscimento vocale

Problemi tecnologici irrisolti inerenti il controllo accesso in sicurezza con i sistemi a tessera (badge o smart cards)

  • Chi mi garantisce che l’accesso è sicuramente effettuato dal possessore della tessera?
  • Come faccio a verificare l’accesso remoto del personale in trasferta?
  • Come impedire lo smarrimento delle tessere?
  • Come gestire la duplicazione delle tessere?
  • Come ridurre il rischio di manomissione dei lettori?
  • Come ridurre i costi di gestione delle tessere e dei lettori?

Controllo Accessi
Utilizzando sistemi biometrici di riconoscimento e verifica della voce, è possibile sviluppare soluzioni di Controllo Accessi basate su:

  • Tecnologie telefoniche (facilmente accessibili da parte del personale)
  • Riconoscimento dell’impronta vocale (massima sicurezza e identificazione univoca)
  • Integrazione completa con i sistemi informativi del cliente (garantendo l’automazione della procedura)
  • Efficienza in termini di tempo e risorse necessarie alla realizzazione

Il riconoscimento vocale
I sistemi di riconoscimento e verifica automatica della voce (ASR - Authomatic Speech Recognition) sono sistemi biometrici, basati su due livelli tecnologici:

  • il riconoscimento
  • la verifica

Il riconoscimento avviene tramite il confronto diretto tra le frasi o parole pronunciate, in maniera naturale, e una serie di vocabolari pre-definiti che contengono:

  • i fonemi di base della lingua parlata e tutte le loro varianti in concatenazione
  • l’elenco delle parole da riconoscere
  • le concatenazioni più comuni tra queste parole

La verifica avviene tramite il confronto tra lo spettro energetico della voce del parlatore (che é generato dalla conformazione geometrica della gola del parlatore) e lo spettro contenuto in un database costruito sullo stesso parlatore.

Il riconoscimento vocale risolve i problemi tecnologici irrisolti con i sistemi a tessera

  • Risolve i problemi tecnologici precedentemente elencati
  • Tra i sistemi biometrici é quello che offre maggiori garanzie di sicurezza dal punto di vista tecnologico

Esempio di dialogo:
D: Salve, mi dica, per favore, il suo nome e cognome
R: Fabrizio Jemma
D: Grazie, lei è stato identificato (la porta si apre)

Tabella comparativa tra i sistemi a tessera e a riconoscimento vocale

Specifiche funzionali del sistema

  • Il sistema riconosce e autentica l’utente, sulla base di una traccia vocale precedentemente memorizzata, in presenza di un addetto alla sicurezza.
  • I tempi di interazione cliente-macchina sono dell’ordine di pochi secondi e i picchi di comunicazione sono gestiti.
  • Gli accessi sono registrati presso un server centrale, che:
    • registra il nome dell’utente, la data, l’ora e la porta a cui si accede
    • permette la consultazione, la registrazione e la stampa delle informazioni
    • effettua il backup del log
    • consente la diagnostica a distanza delle perifiriche
  • L’applicazione di riconoscimento vocale risiede su un server centrale collegato, attraverso rete LAN/WAN, al modulo citofonico, comprensivo dell’elettroserratura, con sblocco antipanico comandato dall’interno nel rispetto della normativa vigente.
  • Il sistema é gestito e manutenuto da personale scelto.

Sequenza di eventi per l’uso del Server di Gestione Accessi

Sequenza di registrazione e verifica dell’impronta vocale

Sequence diagram dell’interazione tra il Citofono e l’AGI

Schema di connessione TCP/IP tra il Citofono e l’AGI

Archittetura logica del sistema

Architettura fisica del sistema

Gestione della sicurezza

Soluzione tecnologica per il Citofono IP semplice

Soluzione tecnologica per il Citofono IP, corredata da sensoristica accessoria

Possibilità di connessione Wi-Fi, Gprs, Gsm, ISDN, Ethernet, radio frequenza
Web server integrato
Oltre alle funzionalità di base richieste è possibile avere alcune funzionalità aggiuntive:

  • Attivazione tramite motion detection o audio detection
  • Registrazione su evento predeterminato (es. accesso negato)
  • Autenticazione delle immagini registrate


La Verifica della Voce


L'identificazione Vocale
La Verifica su Larga Scala

  • II Progetto Youth Offenders (Arresti Domiciliari in Inghilterra)
  • Valutazioni Economiche e Applicazioni
  • I Vantaggi della Tecnologia Verifier
  • Test di Utilizzo

Che cosa é l’identificazione Vocale ?

  • Identifica chi parla all’interno di un insieme conosciuto di voci
  • Nessuna richiesta di identificazione da parte dell’utente (Mappatura “molti a uno”)
  • Riconoscimento di voci al di fuori dell’insieme in esame con dichiarazione “non e’ presente nella lista”

La Verifica su Larga Scala

Riconoscimento di nomi con più di 1 Milione di Utenti

“Mi chiamo Giovanni Tagli”

“Mi chiamo Franco Bilpiu”

“Mi chiamo Sandro Felpa”

“Mi chiamo Giovanni Franco”

Gli utenti si aspettano un’interfaccia naturale, semplice per una procedura di identificazione:

  • “Come ti chiami?”
  • “Qual e’ il tuo numero di telefono?”
  • “Qual e’ il tuo codice fiscale?”
  • “Qual e’ il numero del tuo conto corrente?”
  • “Mi dice per favore il suo numero di carta di credito?”
  • “Mi ripeta la seguente sequenza di numeri”

Un esperimento

Come Funziona L’Identificazione Vocale ?

Viene Autenticata l’identita’ utilizzando le caratteristiche peculiari della voce (Biometria)

Registrazione – Una Volta

  • L’utente si registra per telefono
  • Il Verifier crea l’impronta vocale e la salva
  • L’impronta vocale immagazzina le caratteristiche della voce.
  • Non e’ una registrazione. Non si registrano file audio!


  • L’utente pronuncia il nome o un codice identificativo
  • Il Verifier compara le informazioni ottenute con quelle registrate

I Vantaggi dell’Identificazione Vocale

  • Non e’ intrusiva
    • Non e’ invasiva, non e’ pericolosa
    • Facile da usare
  • Ubiqua
    • Si puo’ accedere da ogni telefono, in ogni dove
    • Non servono apparecchiature specifiche
  • Se integrata con il riconoscimento vocale e’ di maggiore affidabilita’

L’Autenticazione vocale é il migliore compromesso costo / prestazioni all’interno dei sistemi biometrici per sicurezza.

Comparazione dei Metodi di Sicurezza

Il Progetto Youth Offenders


Il sistema e’ usato dal Governo Inglese all’interno del Programma Intensive Supervision and Surveillance

  • Usa la voiceprinting technology di Verifier™ per identificare e seguire i giovani carcerati
  • Supporta le sentenze del Tribunale e migliora le condizioni di detenzione

Il sistema e’ usato dal Youth Justice Board ed e’ controllato dal National Probation Service

  • Il sistema viene usato per controllare I giovani carcerati in casa, assicurando che siano dove e quando loro richiesto:
    • Dalle sedi del programma di riabilitazione educativa
    • Dalle sedi dei corsi
    • Dalle sedi del lavoro

Youth Justice Board
Il Youth Justice Board investira’ $70M nei prossimi 3 anni per programmi atti a:

  • Ridurre la frequenza e la gravita’ di questo tipo di reati limitatamente a gruppi selezionati (riabilitazione)
  • Migliorare l’ambiente che porta a crimini di questo genere, investendo in particolare in educazione e training
  • Migliorare la sorveglianza

Ecco come funziona!

  1. Ogni giorno, il sistema chiama automaticamente in luoghi predeterminati
  2. Quindi chiede alla persona di identificarsi ripetendo un insieme di numeri a caso
  3. L’impronta vocale viene comparata con quella registrata e il risultato viene inviato al Control Centre
  4. Il sistema conferma l’identita’, il luogo e l’ora in cui avviene l’interazione
  5. Viene inviato un rapporto alle autorita’ competenti.

Valutazioni Economiche



  • Riduce le frodi
  • Elimina il PIN Reset
  • Riduce la durata delle chiamate & l’uso degli operatori
  • Riduce I costi gestionali
  • Favorisce servizi personalizzati
  • Non é intrusiva

Approvata legislativamente

  • Segue lo standard: HIPAA

Vantaggi della Tecnologia Verifier

  • Dimostrata accuratezza e robustezza
  • Efficienza, Scalabilita’, Risparmio
  • Aumento della sicurezza e dell’accettabilita’
  • Interfaccia utente flessibile
  • Supporto internazionale

Supporto Internazionale

  • North American English
  • UK English
  • South African English
  • Australian English
  • Japanese
  • German
  • European French
  • Canadian French
  • Italian
  • Latin American Spanish
  • European Spanish
  • Brazilian Portuguese
  • Cantonese
  • Mandarin
  • Swedish
  • Dutch
  • Korean
  • Swiss German

Nessun altra technologia offre tale supporto multi lingua!

Tuesday, 28 April 2009 10:18

Wireless RF Biometric Access Control

Download pdf

Highly Secure Access System Upgrade and Expansion


Features & Benefits

  • Flexible and secure access control solution offering integrated or standalone security.
  • Biometric fingerprint security eliminates identity fraud and cannot be stolen, forged or forgotten.
  • Wireless operation for maximum flexibility and hassle-free installation.
  • Flexible RF communications allow for multi-receiver activation.
  • Multiple receivers allow for increased functionality and multi-site utilisation.
  • Save time and improve productivity with a one-off enrolment and simple subsequent identity checks.
  • Long range RF transmission Keeloq code hopping technology.
  • Eliminate costs associated with key and card based systems.

Slim Flush – Mount Design

Elegant – Metalic Fascia

Technical Specifications
BIO-15 Wireless Fingerprint Access Unit

BIO-15 Fingerprint reader

REC-18 receiver

REC-18RF Controller

Also available BIOFOB, for Ultimate Security.

Tuesday, 28 April 2009 09:20

Biometric Facial Recognition System

Download pdf

Objective analysis, evaluation and modification of facial images quality.
Images features assessment and optimization within the International standards.

Setting: The image quality is decisive for the biometric recognition.

The individuals’ facial images allows for quick and accurate recognition – this is the reason why these images are included in official documents all over the world. The electronic passport – the new International passport – also includes, a a photo digital identification of the subject.

Facial images used in the facial biometrics recognition process must comply with specific quality standards. The machines’ Images and characteristics must be objectively verified and optimized based on objective international standards , excluding all subjective criteria. The same requirements also apply to other electronic documents, such as the driving license and recognition/identity card. NEC’s experience in facial biometrics field, gained in over 30 years, as well as the fingerprint recognition, delivers solution of an extremely high professionalism in response to these new and complex issues. QTF solution is also available in SDK version, ensuring flexibility in the creation of a customized application on a personal requirements basis.


A 3-step process for the modification for the rendering of images compatible with the biometric identification.
Facial images are analyzed and optimized by the system accordingly to the standard ISO 19794-5, which states the facial images’ geometry and the setting requirements.
Digital facial images are processed in 3-step.

Step 1: Analysis
The System tests face areas according to the following features:
  • Contrast/Brightness/Colour
  • Number of faces in the image
  • Face location to the vertical and horizontal axis with respect to the eyes direction
  • Scale the Face dimension on the basis of the eyes distance
  • Face rotation around the nose axis
  • Image aspect ratio
  • Image dimension
  • Image resolution
Step 2: Assessment
Based on the analisys, an image is classified in one of three categories accordingly to the ultimate values previously defined:
  • Optimum quality
  • Changeable
  • Not changeable
Step 3: Change
In the third step, images can be altered to meet the required geometry (image format ICAO). This step is carried out in accordance to the prototype image pre-set values, and includes the following characteristics:
  • Contrast/Brightness/Colour
  • Number of faces in the image
  • Face location to the vertical and horizontal axis with respect to the eyes direction
  • Scale the Face dimension on the basis of the eyes distance
  • Face rotation around the nose axis
  • Image aspect ratio
  • Image dimension
  • Image resolution

The editing process also takes into account interdependencies among features

Result: a facial image which meets the requirements of electronic documents.

In the second step of the optimization process, the ultimate values are used to alter the image according to its suitability biometrics.

Cards photos must strictly comply with the standards of the biometrical recognition process.

The system produces images which detects specific biometrics. This picture simply shows the expressed concepts:

Image Basic Characteristics:
  • Image width: 2
  • Width –height Ratio: 2/3
  • Height of the image defined accordingly
  • Distance between eyes: 1
  • Face position determined by: A + B
  • Horizontal rotation of the head compared to the nose axis: 1
  • Horizontal position of the head defined by: A
  • Vertical position of the head defined by: B

List of criteria used by QTF:

QTF examines the following criteria:
  • Head position
  • Number of faces
  • Lightening
  • Exposure
  • Focus
  • Unnatural colours
  • Image Format
  • Horizontal/vertical position
  • Adult/Child select
  • Head width
  • Colour range
  • Colour intensity
  • Resolution
  • Print resolution
  • Effect Compression
Additional developing criteria:
  • Red eyes
  • Eyewear
  • Ocular Zone Hat/veil
  • Background shadows
  • Background uniformity
  • Shadows on the face
  • Shoulders position

Brightness and contrast are two images parameters closely related. They must be optimized in relation to one another.

Possible uses:

  • Initial checking of the quality of digital photos
  • SDK use
    • Initial checking of the quality or when the photos are inserted into the system
    • Inter-process modification system
Image Formats supported:
  • JPG/JPG 2000 (8-Bit gray scale o 24-Bit color)
  • BMP (24-Bit not compressed)
  • Further formats on request
Minimum configuration requirements of the system:
  • Intel Pentium IV, 2.0 GHz or comparable
  • 512 MB RAM
  • 50 MB HDD
  • Windows XP, 2000, 2003
  • Software Development Kit with demo application in C/C++ API
  • Documentation for developers
  • Documentazione per gli sviluppatori
<< Start < Prev 81 82 83 84 85 86 87 88 89 90 Next > End >>
Page 90 of 105