Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Our Solutions


Tracking System

Access Control

Surveillance Systems

Forensic Solutions

Encryption Technology

Face Recognition

Face recognition

Walk-through identification

Our device is the first in the world capable of visually identifying a person as easily as humans identify each other. Identification takes a split second. Walk or even run past, simply glance at the device and it will “remember” and recognize the identity of one of the tens of thousands of previously registered people. Unlike other biometrics, the 3D face doesn’t require direct physical contact or exact positioning in front of the identification device. The device identifies walking or even running people regardless of their age or height.

Similar to humans, the device is equipped with a 3D vision system, which “remembers” the unique three-dimensional shape of the face. Unlike human vision, however, the device is able to differentiate nuanced geometry with accuracy of up to fractions of a millimeter, enabling it to tell apart identical twins and making it one of the most accurate biometric devices.

It can be used to increase the effectiveness of Access Control Systems (ACS) in conjunction with any doors, electric locks, gates, turnstiles and other devices. Moreover, the device can be used with electronic information kiosks, payment terminals, customer loyalty program stations for identity authorization, etc.

Reliability and Security

Our product currently provides the highest security level of access control. Access is granted only if there is a match between the person’s face and his stored 3D image in the database. Recording of the 3D images allows for statistical data gathering and records attempts to get unauthorized access. It will not be fooled by a user in make up or a stolen badge or keycard. This device eradicates the “human factor” mistakes, for instance, when a security guard’s attention diminishes due to an influx of people at the ACS.

A time saver

The Check Point capacity reaches up to 60 people per minute even with large databases (>10,000 enrollees). This increases the throughput capacity of any checkpoint or gate, and makes keycards and badges obsolete all the while retaining a high level of security.

Protection against loss or theft of a badge

In cases where keycards or badges are used, the Check Point protects against an unsanctioned use of stolen, lost or transferred cards. When granting access, the device not only checks the authenticity of the card itself, but also the identity of the person using the card.

Work hours audit

The Check Point allows you to automate and enhance employee attendance record keeping systems and eliminatesthe danger of falsification.

Simple Integration

The Check Point quickly and easily integrates into an existing access control system (ACS). There is no need to change the current ACS or get rid of badges/key cards. Each user can choose a scenario that works best for his or her company.

Safeguarding personal information

Most biometric methods require the storage of personal information, which people usually do not share with others in their daily lives (fingerprints, retina and iris scans, etc). This leads to a viable risk of identity theft where personal data is used against the person (biometric falsification to obtain unauthorized access or fabricate evidence in a court of law, access to personal medical data, etc). Unlike other biometrics, 3D face identification doesn’t carry the risk of private data being used against the person since the geometric dimensions of a face is “public information”. That information is used in most identification methods in the form of a photograph. Moreover, the use of a dynamic 3D image of the face eliminates the risk of falsification almost entirely.