Access via your fingerprint

In general terms, biometrics involves the verification of a person's identification by using an unique characteristic that is inherently attached to each individual. This can either be physiological, for example fingerprints or facial features, or behavioral, for example dynamic signatures or voice samples. In contrast to identification tokens for instance keys or smart cards, biometric characteristics cannot be lost or stolen and thus cannot be used by non-legitimate persons.

Biometrics entails an enrollment phase and a verification or identification phase. During the enrollment phase, reference data of a respective user is created, which serves as a basic description of the user specific biometric features. During subsequent usage of the biometric system, this initially acquired reference data (in our case, a description of the user's fingerprint) will be used for comparison with the newly acquired featured set.

The raw biometric samples acquired during enrollment are complex data streams produced by sensing devices; no two samples from one user is likely to be identical. Salient features are extracted from the samples and then processed and compressed to construct a digital template of the user's fingerprint. This initial template is stored by the device and essentially takes the place of a password.

Whenever authentication of a user is needed, live samples are captured through the device, processed into a usable form and matched against the enrolled template. This form of biometric authentication is called Verification, since it verifies that the user is whom he claims to be.

There is also another form of authentication called Identification, where the user need no assert an identity. The biometric device compares processed samples of the user against the specified population of templates and decides which template is matched most closely. Depending on match possibilities, the user's identification could be concluded to be that corresponding to the template with the closest match.

IT Trust supplies and installs the following biometric readers.


The Suprema BioStation

Image result for The Suprema BioStation


  • 1 to 3,000 identification in 1 sec
  • 2.5" QVGA 16M Color LCD
  • 400,000 templates (1:1), 20,000 templates
  • Wireless LAN (optional), TCP/IP, RS485
  • USB, RS232
  • Deadbolt, EM lock, door strike, automatic door
  • Microphone and speaker for door phone
  • 4 Function Keys to user-defined functions
  • 1GB Flash + 34 MB RAM


 BioLite Net



  • 5,000 fingerprints (10,000 templates)
  • 2,000 matches in 1 second
  • Finger / PIN / Card
  • IP65 class
  • Deadbolt, EM lock, door strike, automatic door
  • 128 x 64 pixel, black & white
  • 3 x 4 keypad, 3 navigation keys
  • Multi-color LED and multi-tone buzzer


The iPulse IPB6

                 Image result for The iPulse IPB6 



  • Fully-functional stand-alone unit
  • 500 DPI Sensor
  • Up to 10,000 locally stored fingerprints
  • Up to 18 million locally stored transactions
  • Optional FIPS 201 compliance
  • Rugged Polycarbonate casing
  • Full color LCD screen
  • Unmatched intelligence & flexibility
  • Secure communications via IntelliRelay
  • Advanced Access Control


The iPulse IPB7            



  • Fully-functional stand-alone unit
  • 500 DPI Sensor
  • Up to 10,000 locally stored fingerprints
  • Optional FIPS 201 compliance
  • Rugged Polycarbonate casing 
  • Full colour 3.4” LCD screen
  • Unmatched intelligence& flexibility 
  • Secure communications via IntelliRelay
  • 1 Year Warranty (Extendable to 3 years)


IT support - IT services - IT solutions - IT outsourcing - IT company - Best IT company