• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD
Biometrics: Market Shares, Strategies, and Forecasts, Worldwide, 2013 to 2019 Product Image

Biometrics: Market Shares, Strategies, and Forecasts, Worldwide, 2013 to 2019

  • ID: 2689268
  • November 2013
  • Region: Global
  • 563 Pages
  • Wintergreen Research, Inc

FEATURED COMPANIES

  • 7 Avalon Biometrics
  • CSC
  • Gemalto
  • Iris ID Systems
  • Nuance
  • SmartMetric
  • MORE

Worldwide markets are poised to achieve significant growth. As people use electronics in their personal life more, protection of individual information becomes a more compelling problem. Biometrics devices protect individual information.

Biometric identity units provide security protection. Units are comprised of integrated biometric capture devices. Biometrics is used to identify anyone in an accurate, repeatable manner. Physiological characteristics used for biometrics commonly include the face, fingerprints, and DNA. Behavioral characteristics include the user's digital signature, his or her voiceprint, and walk.

As law enforcement programs are redesigned to include information from social media and to initiate smarter cities initiatives, biometrics becomes a more compelling technology, both fingerprinting and facial recognition. Technologies. With the worldwide rise in the threat of terror, biometric systems become a more compelling tool in the hands of the authorities charged with keeping populations safe.

A rise in government projects has been seen as terrorists become an increasing threat. This has been accompanied by increasing data security concerns. There READ MORE >

FEATURED COMPANIES

  • 7 Avalon Biometrics
  • CSC
  • Gemalto
  • Iris ID Systems
  • Nuance
  • SmartMetric
  • MORE

Biometrics and Biometric Fingerprint Equipment Executive Summary
Biometrics and Biometric Fingerprint Equipment Market Driving Forces
Biometric Fingerprint Equipment Market Driving Forces
Biometrics Market Shares
Biometric Market Forecasts
Biometric Device Market Trends

1. Biometrics and Biometric Fingerprint Equipment Market Description and Market Dynamics
1.1 Biometric Sensor Devices
1.1.1 Biometrics for Security and Management
1.1.2 Biometrics for Convenience
1.1.3 Biometric Systems Characteristics
1.1.4 Biometric Systems Hidden Expenses
1.2 Biometrics Industry Segments
1.2.1 Biometrics Are In Law Enforcement
1.2.2 Biometrics Personal Identity Verification
1.2.3 Biometrics Increase Security
1.2.4 Financial Institutions Use Biometrics
1.2.5 Law Enforcement Uses Biometrics
1.2.6 Immigration Uses Biometrics
1.2.7 Social Services Use Biometrics
1.2.8 Airports Use Biometrics
1.2.9 Healthcare Use Biometrics
1.2.10 Consumer Use Biometrics
1.3 Applications for Biometrics
1.3.1 Casino Facial Recognition Capability
1.4 Store & Forward Systems
1.5 Mobile Identification Systems
1.5.1 Fingerprint Recognition
1.6 Human Mechanism To Distinguish Between Human Faces
1.6.1 Identifying People From Their Iris
1.6.2 Authenticating a User
1.7 Fingerprint Scanner
1.8 Gesture-Interfaces
1.8.1 Biometric Components of Signatures
1.9 Risks in Biometric-Based Authentication
1.10 Multi-Factor Authentication Solutions
1.11 Biometrics Automated Technique
1.12 Security of Input Mechanism
1.13 Digital Data Security
1.13.1 Security Issues
1.14 Global Economy
1.14.1 The IT Market
1.14.2 New World Order Built On The Globally Integrated Enterprise
1.15 Enterprise Information Accessed By Mobile Workers
1.15.1 Cloud Technology Brings Rapid Time to Value
1.16 Application Server Virtual Systems, Clustering, Fail-Over, and Load Balancing
1.16.1 Cloud System Continuous Deployment Models

2. Wireless Car Chargers Market Shares and Market Forecasts
2.1 Biometrics and Biometric Fingerprint Equipment Market Driving Forces
2.1.1 Biometric Fingerprint Equipment Market Driving Forces
2.2 Biometrics Market Shares
2.2.1 NEC
2.2.2 NEC
2.2.3 Sagem Morpho
2.2.4 3M/Cogent Systems
2.2.5 3M Cogent Systems CAFIS™
2.2.6 3M / Cogent
2.2.7 Motorola
2.2.8 Francisco Partners / Cross Match SEEK® Avenger
2.2.9 Francisco Partners / CrossMatch
2.2.10 Avalon Biometrics
2.2.11 DigitalPersona
2.2.12 Apple / AuthenTec / UPEK
2.2.13 BIO-key
2.2.14 Suprema
2.2.15 Suprema
2.2.16 eKey
2.2.17 Vision-Box
2.2.18 EgisTec
2.2.19 CIC Electronic Signature Competition
2.3 Biometric Market Forecasts
2.3.1 Biometric Device Market Trends
2.3.2 Fingerprint Biometrics
2.3.3 Non-Automated Fingerprint Identification Systems
2.3.4 Automated Fingerprint Identification Systems (AFIS)
2.3.5 National ID Control Biometrics
2.3.6 Facial Recognition Biometric Technologies Market Shares and Forecast
5.1.1 Cross Match Technologies Incorporates NEC's Facial Recognition in SEEK
2.3.7 Voice Recognition Biometric Technologies Market Forecast
2.3.8 Workplace Access Fingerprint Biometrics
2.3.9 Healthcare Biometrics
2.3.10 Mobile Phone Biometrics Market Forecasts
2.3.11 Electronic Signature, Digital Signature, Signature Verification
2.3.12 Biometric Readers Market
2.3.13 Financial:
2.3.14 Consumer
2.3.15 Commercial Biometric Fingerprint Markets
2.4 Large Biometric Market Segments
2.4.1 Airport Screening / Facial Recognition
2.5 Mid Range Biometric Reader Markets
2.5.1 Commercial Biometric Fingerprint Markets
2.6 Biometric Sensors
2.6.1 Fingerprint Cards
2.6.2 Apple / Authentec
2.6.3 SAIC
2.7 Biometrics Device and Sensor Market Forecasts
2.7.1 Biometric Sensors for Law Enforcement
2.7.2 Government:
2.8 Biometric, Smart Card and PKI Technologies
2.9 Biometric Equipment Prices
2.9.1 Biometric Fingerprint Equipment Prices
2.9.2 Biometric Facial Recognition Equipment
2.9.3 Biometric Sensors
2.10 Biometric Fingerprint Equipment Regional Market Analysis

3. Biometrics Product Description
3.1 NEC Hybrid Finger Identification
3.1.1 NEC Fingerprint Identification
3.1.2 NEC Fingerprint Biometrics Accuracy
3.1.3 NEC Finger Print Matching Smart Analytics
3.1.4 NEC Fingerprint Recognition Minutiae and Related Method
3.1.5 NEC Fingerprint Matching Processor (FMP)
3.1.6 NEC Multi-Biometrics
3.1.7 NEC Portable DNA Analyzer
3.2 Safran Morpho Identity Management
3.2.1 Safran Morpho Supports Compliance with standards
3.2.2 Safron Morpho MorphoCivis™
3.2.3 Safran Morpho System™
3.2.4 Safron Morpho MorphoPerso
3.2.5 Safran Morpho ID Documents Uniqueness Protections
3.2.6 Safron Morpho MorphoCheck™
3.2.7 Safron Morpho MorphoRapID™
3.2.8 Safron Morpho MorphoTouch™ 1200 Series
3.2.9 Safron Morpho MorphoBIS
3.2.10 Safron Morpho MetaMorpho
3.2.11 Safran Morpho Secure Biometric Multibiometric Reader
3.2.12 Safran Morpho Outdoor MorphoAccess® 500 Series
3.2.13 Safran Morpho Border Control
3.2.14 Safran Morpho Border Automated Control
3.2.15 Safran Morpho Border Semi-Automatic Control Booths
3.2.16 Safran Morpho Border Mobile Control Terminal
3.2.17 Safran Morpho Secure Biometric Access
3.2.18 Safran Morpho / Bioscrypt
3.3 Cross Match
3.3.1 Cross Match Technologies Incorporates NEC's Facial Recognition in SEEK
3.3.2 Cross Match SEEK® II
3.3.3 Cross Match SEEK® Avenger
3.3.4 Cross Match Guardian®
3.3.5 Cross Match Patrol ID / Patrol
3.3.6 Cross Match L SCAN® 1000T
3.3.7 Cross Match Verifier® 300 LC 2.0
3.4 3M/Cogent Systems
3.4.1 3M Cogent Systems CAFIS™
3.4.2 3M Cogent Systems CAPFIS™
3.4.3 3M Cogent Systems Multi-Biometric Enrollment Station (CBES)
3.4.4 3M Cogent Systems Biometric Registration Software (BRS)
3.5 Motorola Solutions
3.5.1 Motorola Identity Management
3.5.2 Motorola Multi-Biometric Enrollment
3.5.3 Motorola Multi-Biometric Verification
3.5.4 Motorola Multi-Biometric Capture and Verification Peripherals
3.5.5 Motorola Biometircs Use in Document Central Registry
3.5.6 Motorola Biometircs Use in Data Preparation and Key Management
3.5.7 Motorola Biometircs Use in Personalization Servers
3.5.8 Biometric Identification Solution (BIS)
3.5.9 Motorola Mobile Biometric Identification
3.6 Intel Healthcare
3.7 BIO-key Healthcare
3.7.1 BIO-key Large Scale ID
3.7.2 BIO-key for End Users
3.7.3 BIO-key BSP ( Biometric Service Provider)
3.7.4 BIO-key International's BSP Advantages
3.7.5 BIO-key Finger-based Biometric Identification and Personal Identity Verification
3.8 Precise Biometrics Tactivo
3.8.1 Precise Tactivo for iPhone
3.8.2 Precise Tactivo for iPad
3.8.3 Precise Tactivo Mini for Android
3.8.4 Precise Biometrics Easy App Integration
3.8.5 Precise Biometrics Smart Card Government Compliance
3.8.6 Precise Match-on-Card for National ID
3.8.7 Precise U.S. Government Solutions
3.8.8 Precise Enterprise Solutions for Secure Sign-On
3.8.9 Precise Biometrics Reduces Risk and Cost
3.8.10 Precise Secure Mobile Authentication for Enterprise
3.8.11 Precise Match-on-Card for Enterprise Solutions
3.8.12 Precise Biometrics Flexible Solution
3.8.13 Precise Biometrics Customization
3.8.14 Precise Partner Solutions
3.9 DigitalPersona
3.9.1 DigitalPersona Biometrics, Multi-Factor Authentication and Access Management
3.9.2 DigitalPersona Pro Enterprise
3.9.3 DigitalPersona Fingerprint Biometrics
3.9.4 DigitalPersona 5160 Fingerprint Reader
3.9.5 DigitalPersona, Inc. UPEK TouchChip TCRU1C
3.9.6 DigitalPersona, ikonTouch 700
3.9.7 DigitalPersona, Inc. ikonTouch 700
3.10 Fujitsu
3.10.1 Fujitsu PalmSecure™
3.10.2 Fujitsu PalmEntry™ Access Control System
3.10.3 Fujitsu PalmSecure Vein Recognition Technology
3.10.4 Fujitsu Med-Serv 50
3.11 Labcal India
3.11.1 Labcal Be.U Mobile Series
3.11.2 Labcal Applications for the Be.U Mobile
3.12 SecuGen
3.12.1 SecuGen Hamster Plus
3.12.2 SecuGen Hamster IV
3.12.3 Benefits of Using SecuGen Peripherals
3.12.4 SecuGen OptiMouse Plus
3.13 NitGen & Company
3.13.1 NitGen NAC-5000
3.13.2 NitGen FINGKEY ACCESS Plus
3.13.3 NitGen NAC-2500 Plus
3.13.4 NitGen Access Manager Pro
3.13.5 NitGen FIM Module
3.14 Atmel
3.15 CSC
3.15.1 CSC Identity Management Trusted Enterprise Suite
3.16 Accu-Time Systems
3.16.1 Accu-Time Systems Optimus2
3.16.2 Accu-Time Systems AccuTouch
3.16.3 Accu-Time Systems Maximus
3.16.4 Accu-Time Systems Prodigy
3.17 Avalon Biometrics
3.17.1 Avalon MVT - Mobile Application Suite - Enrolment / Verification / Identification terminal
3.18 eKey
3.18.1 ekey home – Stand-alone Solution
3.18.2 ekey Home Finger Scanner Wall-Mounted
3.18.3 ekey Home Finger Scanner FSB
3.18.4 ekey Multi – Extended Stand-Alone Solution
3.18.5 ekey Multi Finger Scanner Outlet-Mounted
3.18.6 ekey Net – Networkable Solution
3.18.7 ekey Logon Server
3.19 Green Bit
3.19.1 Green Bit Law Enforcement & P.A.
3.19.2 Green Bit Commercial Applications
3.19.3 Green Bit DactyMatch SDK
3.20 Fingerprints Card AB
3.20.1 Fingerprints FPC1011F3 Area
3.20.2 Fingerprints FPC1080A Swipe
3.20.3 Fingerprints FPC2020
3.21 Merkatum: Biometrics Security & ID
3.21.1 Merkatum emfiva F/FRS
3.21.2 Merkatum ELA Logical Authentication
3.22 Suprema
3.22.1 Suprema RealScan G10
3.22.2 Suprema RealScan D
3.23 UnionCommunity / Virdi
3.23.1 VIRDI AC F100
3.23.2 ViRDI AC 5000
3.24 Aware
3.25 Zvetco Biometrics Products
3.26 Apple / AuthenTec
3.27 Tyco Integrated Security Biometrics
3.27.1 Tyco Facial Recognition Profile
3.28 EgisTec
3.28.1 EgisTec Image Quality
3.28.2 EgisTec Cloud
3.29 STMicroelectronics Biometric Solutions for Healthcare
3.29.1 STMicroelectronics Body Gateway
3.29.2 STMicroelectronics Lab-on-Chip
3.29.3 STMicroelectronics Pulse Generator for Ultrasound Imaging
3.29.4 STMicroelectronics' Cooperation with French Start-ups and SMEs
2.10.1 ST Microelectronics (Finger-Scan)
3.30 SAIC
3.30.1 SAIC Voice Identity Biometrics Exploitation Services (VIBES)
3.30.2 SAIC Voice Biometrics Applications
3.31 Gemalto Avalon Biometrics Border Management
3.31.1 Gemalto Avalon Biometrics Document Verification of Travel & ID Documents

4. Biometrics Technology
4.1 Enabling Biometric Fingerprint Technologies
4.1.1 Fingerprint Recognition
4.1.2 Fingerprint Technology
4.1.3 Fingerprint SDKs
4.1.4 Fingerprint Enabling Technology
4.1.5 Surface Texture Analysis
4.2 Facial Recognition:
4.2.1 Facial Recognition SDKs
4.2.2 Facial Recognition Uses
4.2.3 Face Recognition Biometric System Deployment Considerations
4.2.4 Face Recognition Technology
4.3 Iris Reading Algorithms
4.3.1 Iris Reading Accuracy
4.4 Biometrics Impact On Network Operations
4.5 Enrollment and Identification
4.6 Neural Networks
4.7 Security of Biometric ID Systems
4.8 Perceptual Computing and Apps Detect Heart Rate

5. Biometrics Company Description
5.1 Selected Biometric Industry Mergers and Acquisitions
5.1.1 Safran Acquisition of L-1 Identity Solutions Formed From A Merger of Visage Technology, Inc. and Identix
5.1.2 3M Acquisition of Cogent
5.1.3 Amano USA Holdings, Inc. (AUH) acquired ATS
5.1.4 Apple Acquired AuthenTec
5.1.5 AuthenTec Acquisitions of SafeNet's Embedded Security Solution Division, UPEK, Inc., PeerSec Networks and Proxure, Inc.
5.1.6 Smart Sensor Solutions
5.1.7 BIO-Key International / S.I.C.
5.1.8 Cross Match has acquired the biometric authentication business of Labcal Technologies
5.1.9 Francisco Partners Acquires Cross Match Technologies
5.1.10 Gemalto /Avalon Biometrics
5.2 3M/Cogent Systems
5.2.1 3M Cogent Advanced Technology
5.2.2 3M at a Glance (Year-end 2012)
5.2.3 3M Business Groups
5.2.4 3M Business.
5.2.5 3M Revenue
5.3 Amano Japan / Accu-Time Systems
5.4 Apple / AuthenTec
5.4.1 Authentec Revenue Recognition – Smart Sensors
5.4.2 Apple
5.4.3 Apple Business Strategy
5.4.4 Apple Products
5.4.5 Apple iPhone
5.4.6 Apple Mac Hardware Products
5.4.7 Apple iPod
5.4.8 Apple iTunes®
5.4.9 Apple Mac App Store
5.4.10 Apple iCloud
5.4.11 Apple Software Products and Computer Technologies
5.4.12 Apple Operating System Software iOS
5.4.13 Apple Mac OS X
5.4.14 Apple TV
5.4.15 Apple Third-Largest Mobile Phone Maker
5.4.16 Apple Regional Segment Operating Performance
5.4.17 Apple Americas
5.4.18 Apple Europe
5.4.19 Apple Japan
5.4.20 Apple Asia-Pacific
5.4.21 Apple Retail
5.4.22 Apple Revenue
5.4.23 Apple Net Sales
5.4.24 Apple iPhone Shipments
5.4.1 Apple iPad Shipments
5.5 Aware
5.5.1 Aware Company Overview
5.5.2 Aware DSL
5.5.3 Aware DSL Revenue
5.5.4 Aware's Strategy
5.5.5 Aware Mobile Biometric Solution
5.5.6 Aware Revenue
5.5.7 Aware Biometrics and Imaging Revenue
5.6 BIO-key
5.6.1 BIO-key Security Solutions
5.6.2 BIO-key Smart Phone Markets
5.6.3 BIO-key Business Model
5.6.4 BIO-key Identity Management, User Authentication, Privilege Entitlement and Access Control
5.6.5 BIO-key Revenue
5.7 Cognitec Systems
5.8 Communication Intelligence Corporation
5.8.1 CIC Customers
5.8.2 CIC Business
5.8.3 CIC Revenue
5.8.4 CIC Core Technologies
5.8.5 CIC Products
5.8.6 CIC Revenue
5.9 Cross Match / Francisco Partners
5.9.1 Cross Match SEEK Avenger Handheld
5.9.2 Cross Match SEEK Avenger Customers
5.9.3 Cross Match Technologies Labcal
5.9.4 Labcal India
5.9.5 Cross Match Products
5.9.6 Cross Match Technologies Labcal
5.10 CSC
5.10.1 CSC Strategy
5.11 DigitalPersona
5.11.1 DigitalPersona Target Markets and Customers
5.12 eKey
5.13 EgisTec
5.14 Fingerprint Cards AB
5.14.1 Fingerprint Cards Sensor Technology Positioning
5.14.2 Fingerprint Cards Revenue
5.15 Fujitsu
5.15.1 Fujitsu Revenue
5.15.2 Fujitsu Technology Solutions Services
5.15.3 Fujitsu Personal Computers
5.15.4 Fujitsu Development and Production Facilities
5.15.5 Fujitsu Corporate Strategy
5.15.6 Fujitsu Revenue
5.15.7 Fujitsu Interstage
5.15.8 Fujitsu Acquires RunMyProcess Cloud Service Provider
5.16 Gemalto
5.16.1 Gemalto /Avalon Biometrics
5.16.2 Avalon Biometrics Solutions
5.16.3 Gemalto Avalon Biometrics Border Management
5.16.4 Gemalto Avalon Biometrics Document Verification of Travel & ID Documents
5.16.5 Gemalto Avalon Biometrics Live & Form-based Enrollment
5.16.6 Gemalto Avalon Biometrics Live Enrollment Solutions Mobile Applications
5.16.7 Avalon Biometrics
5.16.8 Avalon Biometrics SL Ghana Visa & Border Management System
5.17 Google
5.17.1 Google 2012 Corporate Highlights
5.17.2 Google Search
5.17.3 Google Revenue
5.17.4 Google Second Quarter 2013 Results
5.17.5 Google / Motorola
5.18 Green Bit
5.19 IBM Facial Recognition
5.19.1 IBM
5.19.2 IBM Strategy
5.19.3 IBM PureData System for Transactions
5.19.4 IBM Business Partners
5.19.5 IBM Messaging Extension for Web Application Pattern
5.19.6 IBM PureSystems Partners
5.19.7 IBM MobileFirst
5.19.8 IBM Business Analytics and Optimization Strategy
5.19.9 IBM Growth Market Initiatives
5.19.10 IBM Business Analytics and Optimization
5.19.11 IBM Strategy
5.19.12 IBM Smarter Planet
5.19.13 IBM Cloud Computing
5.19.14 IBM Business Model
5.19.15 IBM Business Revenue Segments and Capabilities
5.20 IdentiPHI
5.21 Interlink Electronics
5.22 Iris ID Systems
5.23 IriTech
5.24 RDSK / Litronic
5.24.1 Litronic Customers
5.24.2 Litronic Patents
5.25 Mereal Biometrics
5.26 Merkatum Biometrics Security & ID
5.26.1 Merkatum Target Customers
5.27 Motorola Solutions
5.27.1 Motorola Solutions Strategy
5.27.2 Motorola Solutions Biometric Attachment Mobile Identification Solution
5.27.3 Motorola Solutions Revenue
5.27.4 Motorola Mobile Biometric Identification Solution
5.27.5 Motorola Solutions Mobile Biometric Identification
5.28 NitGen & Company
5.28.1 Nitgen & Company, Investment of US $38 Million
5.28.2 Nitgen Marine Oil Bunkering business
5.28.3 Supply of Fingerprint Scanner with the Korean Government's National Electral System
5.29 Precise Biometrics
5.29.1 Precise Biometrics Customers
5.29.2 Precise Biometrics' Tactivo™ Security Enhancements for Mobile Apps
5.30 NEC
5.30.1 NEC Business Outline
5.30.2 NEC Revenue
5.31 Nuance
5.31.1 Nuance Voice Biometrics
5.32 Safran Morpho
5.32.1 Safron Morpho Identification Division
5.32.2 Safron Morpho e-Documents Division
5.32.3 Safron Morpho e-Documents Payments
5.32.4 Safron Morpho e-Documents Identity & Access Management
5.32.5 Safron Morpho Global Presence
5.32.6 Safron Morpho Detection Division
5.32.7 Safron Morpho Revenue
5.33 Science Applications International Corporation (SAIC)
5.34 SecuGen
5.34.1 SecuGen Fingerprint Technology for Android
5.34.2 SecuGen Hamster IV Fingerprint Reader STQC Certification for India's UID Project
5.35 Siemens AG
5.36 SmartMetric
5.37 Smiths Detection
5.38 Steria
5.38.1 Steria Revenue
5.39 STMicroelectronics
5.40 Suprema
5.40.1 Suprema FVC Results
5.40.2 Suprema Revenue
5.41 Symantec
5.41.1 Symantec Security in Information-Driven World
5.41.2 Symantec Core Business Positioned for Growth
5.41.3 Symantec Acquires VeriSign Security Business
5.41.4 VeriSign Check Mark Signifying Trust Online
5.41.5 Symantec Creating Trusted Interactions Online
5.41.6 Symantec Revenue
5.42 Tyco Integrated Security
5.42.1 Tyco
5.42.2 Tyco Regional Revenue
5.42.3 Tyco Revenue
5.43 UnionCommunity / Virdi
5.44 Vision-Box
5.44.1 Vision-Box Border Control Biometrics
5.44.2 Vision-Box Facial Recognition Technology
5.45 Witswell Consulting and Services / Cyber-SIGN
5.45.1 Cyber-SIGN Biometric Technology
5.46 Zvetco Biometrics
5.46.1 Zvetco Biometrics Products
5.47 List of Companies Participating in the Biometrics Industry

List of Tables and Figures

Table ES-1 Types of Biometric Devices
Table ES-2 Biometric Device Target Markets
Table ES-3 Biometrics Devices Market Driving Forces
Table ES-4 Biometrics Devices Market Dynamics
Table ES-5 Biometrics Devices Market Restraints
Figure ES-6 Biometric Devices Market Shares, Dollars, Worldwide, 2012
Figure ES-7 Biometric Devices Market Forecasts Dollars, Worldwide, 2013-2019
Table ES-8 Biometric Market Trends
Table ES-9 Biometric Technology Market Growth Factors
Table 1-1 Index of Biometrics Types
Table 1-2 Biometrics Industry Segments
Table 1-4 Biometric Store & Forward Systems Functions
Table 1-12 Cloud System Continuous Deployment Models
Table 2-1 Types of Biometric Devices
Table 2-2 Biometric Device Target Markets
Table 2-3 Biometrics Devices Market Driving Forces
Table 2-4 Biometrics Devices Market Dynamics
Table 2-5 Biometrics Devices Market Restraints
Figure 2-5 Biometric Devices Market Shares, Dollars, Worldwide, 2012
Table 2-6 Biometrics Market Shares, Dollars, Worldwide, 2012
Table 2-7 Biometrics Market Shares Participants with Measurable Share, Dollars, Worldwide, 2012
Table 2-8 NEC Analysis of Biometric Device Market Principal Competitive Factors
Table 2-9 NEC Analysis of Biometric Device Market Competitive Advantage Factors
Figure 2-10 Safran Morpho Identity Management
Table 2-11 Motorola Biometrics Products
Figure 2-12 Cross Match SEEK® Avenger
Figure 2-13 Biometric Devices Market Forecasts Dollars, Worldwide, 2013-2019
Table 2-14 Biometric Device Market Forecasts, Dollars, Shipments, Worldwide, 2013-2019
Table 2-15 Biometric Market Trends
Table 2-16 Biometric Technology Market Growth Factors
Figure 2-17 Biometric Device Market Segments, Dollars, 2012
Figure 2-18 Biometric Device Market Segments, Dollars, 2019
Table 2-19 Biometric Devices, Fingerprint, Facial Recognition, Voice and Other, Dollars, Shipments, Worldwide, 2013-2019
Table 2-20 Biometric Devices, Fingerprint, Facial Recognition, Voice and Other, Percent, Shipments, Worldwide, 2013-2019
Table 2-21 Biometrics Market Segments, Law Enforcement, Government / Documents and Passports, Healthcare, Electronic Device Protection, Airports / Commercial Access Control, Dollars, Worldwide, 2013-2019
Table 2-22 Biometrics Market Segments, Law Enforcement, Government / Documents and Passports, Healthcare, Electronic Device Protection, Airports / Commercial Access Control, Percent, Worldwide, 2013-2019
Table 2-23 Biometrics Devices: Dollars and Units, High End, Mid-Range, and Low End, Shipments, Worldwide, 2013-2019
Table 2-24 Biometrics Facial Recognition and Voice Recognition Devices: Dollars and Units, Shipments, Worldwide, 2013-2019
Table 2-25 Biometric Devices, Units, Shipments, Worldwide, 2013-2019
Table 2-26 Biometric Sensors, Units and Dollars, Shipments, Worldwide, 2013-2019
Figure 2-27 Non-Automated Fingerprint Biometric Market Shares, Dollars, Worldwide, 2012
Table 2-28 Non-Automated FingerPrint Biometric Identification Systems Market Shares, Dollars, Worldwide, 2012
Table 2-29 Non-Automated FingerPrint Biometric Device Market Forecasts, Dollars, 2013-2019
Table 2-30 Automated FingerPrint Information Systems (AFIS) Biometric Market Segments, Dollars, 2012
Table 2-31 Biometrics Automated Fingerprint Information Systems (AFIS): Dollars, Shipments, Worldwide, 2013-2019
Table 2-32 Biometrics Automated / Non Automated Fingerprint Devices: Dollars and Units, High End, Mid Range, and Low End, Shipments, Worldwide, 2013-2019
Figure 2-33 Biometric Facial Recognition Market Shares Dollars, Worldwide, 2012
Table 2-34 Biometric Facial Recognition Market Shares Dollars, Worldwide, 2012
Table 2-35 Biometrics Facial Recognition and Voice Recognition Devices: Dollars and Units, Shipments, Worldwide, 2013-2019
Table 2-36 Biometrics Market Segments Worldwide, 2013-2019
Table 2-37 Biometric Devices, Units, Shipments, Worldwide, 2013-2019
Table 2-38 Biometrics Devices: Dollars and Units, High End, Mid Range, and Low End, Shipments, Worldwide, 2013-2019
Table 2-39 Major Airports in the World
Table 2-40 Biometrics Devices: Dollars and Units, High End, Mid Range, and Low End, Shipments, Worldwide, 2013-2019
Figure 2-41 Biometric Sensor Market Shares, Dollars, Worldwide, 2012
Table 2-42 Biometric Sensor Market Shares Dollars, Worldwide, 2012
Figure 2-43 Biometric Sensor Market Shipments Forecasts Dollars, Worldwide, 2013-2019
Figure 2-44 Biometric Sensor Market Shipments Forecasts Dollars, Worldwide, 2013-2019
Table 2-45 Fingerprint Embedded Security Market Shares Dollars, Worldwide, 2012
Table 2-46 Biometrics Device and Sensor Market Forecasts
Figure 2-47 Biometric Equipment Regional Market Segments, 2012
Table 2-48 Biometric Equipment Regional Market Segments, 2012
Table 2-49 Biometrics Market Shares, Dollars, Worldwide, 2012
Figure 3-1 NEC Hybrid Finger Identification
Figure 3-2 NEC Fingerprint Identification
Table 3-3 NEC Fingerprint Identification Features
Figure 3-4 NEC Fingerprint Identification
Figure 3-5 NEC Minutiae and Related Method Illustrated
Figure 3-6 NECFingerprint Matching Processor (FMP)
Figure 3-7 NEC Multi-Biometrics
Table 3-8 NEC Portable DNA Analyzer Features
Table 3-9 NEC Portable DNA Analyzer Step by Step Procedures
Table 3-10 NEC Portable DNA Analyzer Technical Highlights
Figure 3-11 NEC Portable DNA Analyzer
Figure 3-12 NEC Portable DNA Analyzer STR by Electrophoresis Analysis / Analysis Program
Figure 3-13 Safran Morpho Identity Management
Table 3-14 Safran Morpho Public and Private Sector Security Systems Solutions
Figure 3-15 Safran Morpho Identity Management
Figure 3-16 Safron Morpho MorphoCivis™
Table 3-17 Safran Morpho System Aspects
Figure 3-18 Safron Morpho MorphoPerso
Table 3-19 MorphoPerso ID Documents Lifecycle Management Flexible Solution
Figure 3-20 Safron Morpho MorphoCheck™
Figure 3-21 Safron Morpho MorphoRapID™
Figure 3-22 Safron Morpho MorphoTouch™ 1200 Series
Figure 3-23 Safron Morpho Morphotouch™ 1200 Series Features
Figure 3-24 Safron Morpho MorphoBIS
Table 3-25 MorphoBIS, Morpho's Next Generation AFIS Functions
Table 3-26 MorphoBIS, Morpho's next generation AFIS Features
Figure 3-27 Safron Morpho MetaMorpho
Table 28 MetaMorpho™ ABIS Store and Management of Fingerprints and Palm Prints In A Single Database Feratures
Figure 3-29 Safran Morpho Outdoor MorphoAccess® 500 Series
Table 3-30 MetaMorpho™ MorphoAccess® (OMA) 500 Series High-Performance Fingerprint Identification Terminals Features
Figure 3-31 Safran Morpho Secure Biometric Access
Table 3-32 Cross Match Technologies Biometrics Offerings:
Figure 3-33 Cross Match SEEK® II
Table 3-34 Cross Match SEEK® II Advantages
Figure 3-35 Cross Match SEEK® Avenger
Figure 3-36 Cross Match SEEK® Avenger Advantages
Figure 3-37 Cross Match Guardian®
Table 3-38 Cross Match Guardian® Advantages
Figure 3-39 Cross Match Patrol ID / Patrol
Table 3-40 Cross Match Patrol ID / Patrol Advantages
Figure 3-41 Cross Match L SCAN® 1000T
Table 3-42 Cross Match L SCAN® 1000T Advantages
Figure 3-43 Cross Match Verifier® 300 LC 2.0
Table 3-44 Cross Match Verifier® 300 LC 2.0 Advantages
Table 3-45 3M Cogent Systems CAFIS Features
Table 3-46 3M CAFIS Agency Solutions:
Table 3-47 3M CAFIS Features
Table 3-48 3M Cogent Systems Prime Full Function AFIS for Local Law Enforcement Agencies Features:
Table 3-49 3M Cogent Systems CAFIS Functional Capabilities
Table 3-50 3M Cogent Systems Multi-Biometric Scale Document Issuance Program Target Markets:
Table 3-51 3M Cogent Systems Multi-Biometric Enrollment Station (CBES) Key Features:
Table 3-52 3M Cogent Systems Biometric Enrollment Software Key Features:
Table 3-53 Motorola Identity Management Features
Table 3-54 Motorola Multi-Biometric Capture and Verification Peripherals
Table 3-55 Biometric Identification Solution (BIS) Features
Figure 3-56 Motorola Mobile Biometric Identification
Table 3-57 Motorola Mobile Identification Solution Features
Table 3-58 Motorola Mobile Identification Solution Target Markets
Table 3-59 Google / Motorola Mobile Identification Solution Applications
Table 3-60 BIO-key International Biometric Technology Solutions
Table 3-61 BIO-key Large Scale ID Features
Table 3-62 BIO-key Large Scale ID Functions
Table 3-63 BIO-key for End User Systems
Table 3-64 BioAPI Consortium Standard API
Table 3-65 BIO-key's SDK Software Development Kit Features
Table 5-66 BIO-key Authentication Technology Benefits
Figure 5-67 BIO-key Biometric Tools Offered
Table 3-68 Precise Biometrics Tactivo Functions
Table 3-69 Precise Biometrics Tactivo Uses
Table 3-70 Precise Biometrics Smart Card Product Features
Table 3-71 Precise Match-on-Card for National ID Features
Table 3-72 Precise Biometrics U.S. Government Solutions
Figure 3-73 Precise Enterprise Solutions for Secure Sign-On
Figure 3-74 Precise Secure Mobile Authentication for Enterprise
Table 3-75 Precise Biometrics Tactivo Features:
Figure 3-76 Precise Match-on-Card for Enterprise Solutions
Table 3-77 Precise Biometrics Security Functions
Figure 3-78 DigitalPersona Biometrics, Multi-Factor Authentication and Access Management
Table 3-79 DigitalPersona Biometrics, Multi-Factor Authentication and Access Management Functions
Figure 3-80 DigitalPersona Pro Enterprise
Table 3-81 DigitalPersona Biometrics, Multi-Factor Authentication Pro Enterprise Features DigitalPersona, Inc. ikonTouch 700Features
Figure 3-82 Fujitsu PalmSecure™
Table 3-83 PalmSecure™ Features
Figure 3-84 Fujitsu PalmEntry™ Access Control System
Table 3-85 Fujitsu PalmEntry Target Markets
Table 3-86 Fujitsu PalmEntry Market Positioning
Table 3-87 PalmEntry™ Access Control System
Figure 3-88 Fujitsu Med-Serv 50
Figure 3-89 Fujitsu Med-Serv 50 Kiosk Features
Table 3-90 Fujitsu Med-Serv 50 Features
Table 3-91 Labcal Be.U Mobile Series Biometric Features
Figure 3-92 SecuGen Hamster Plus
Figure 3-93 SecuGen Hamster IV
Figure 3-94 SecuGen OptiMouse Plus
Figure 3-95 NitGen NAC-5000
Figure 3-96 NitGen FINGKEY ACCESS Plus
Figure 3-97 NitGen NAC-2500 Plus
Figure 3-98 NitGen Access Manager Pro
Figure 3-99 NitGen FIM Module
Table 3-100 NitGen & Company Performance
Table 3-101 CSC's Trusted Identity Enterprise Suite Full-Spectrum, Fully Integrated Solution Portfolio Modules
Figure 3-102 Accu-Time Systems Optimus2
Table 3-103 Accu-Time Systems Optimus2 Features
Figure 3-104 Accu-Time Systems AccuTouch
Table 3-105 Accu-Time Systems AccuTouch
Figure 3-106 Accu-Time Systems Maximus
Figure 3-107 Accu-Time Systems Maximus
Figure 3-108 Accu-Time Systems Prodigy
Table 3-109 Accu-Time Systems Prodigy Feature
Table 3-110 Avalon MVT - Mobile Application Suite Components
Table 3-111 Avalon MVT - Mobile Application Suite Key Features
Table 3-112 ekey Home Finger Scanner Feature Highlights
Figure 3-113 ekey Home Finger Scanner Wall-Mounted 2.0
Figure 3-114 ekey Home Finger Scanner FSB
Table 3-115 ekey multi – Extended Stand-Alone Solution Features
Figure 3-116 ekey Multi Finger Scanner Outlet-Mounted
Table 3-117 ekey Net – Networkable Solution Features
Table 3-118 ekey Logon Server Functionality
Table 3-119 ekey Logon Server Benefits
Table 3-120 Characteristics of Green Bit Scanners
Table 3-121 Green Bit DactyMatch SDK
Figure 3-122 Fingerprints FPC1011F3 Area
Table 3-123 Fingerprints FPC1011F3 Area
Figure 3-124 Fingerprints FPC1080A Swipe
Table 3-125 Fingerprints FPC1080A Swipe
Figure 3-126 Fingerprints FPC2020
Table 3-127 Fingerprints Card FPC2020
Figure 3-128 Merkatum emfiva F/FRS
Table 3-129 Merkatum ELA Logical Authentication Benefits:
Figure 3-130 Suprema RealScan G10
Figure 3-131 Suprema RealScan D
Figure 3-132 VIRDI AC F100
Figure 3-133 ViRDI AC 5000
Table 3-134 Aware Primary Biometrics Systems Target Markets
Table 3-135 Tyco Facial Recognition Specifications
Table 3-136 Tyco Facial Recognition Special
Table 3-137 Tyco Facial Recognition Parameters
Table 3-138 Tyco Full Range Of Access Control Solutions
Figure 3-139 EgisTec's Unique E-Field (Capacitance) Imaging Technology
Table 3-140 EgisTec Image Quality Advantages
Table 3-141 EgisTec Key Features of CloudHub
Table 3-142 ST Supports France's Innovation Clusters
Table 3-143 SAIC Voice Biometrics Open Architecture Functions
Table 3-144 SAIC Voice Biometrics Open Architecture Features
Table 3-145 SAIC Voice Biometrics Open Architecture Benefits
Figure 4-1 Biometric Fingerprint Pattern Measurements
Figure 4-2 Iris Reading Algorithms
Table 5-1 3M Cogent solutions Benefits
Table 5-2 3M Cogent Solutions Target Markets
Table 5-3 ATS Positioning
Table 5-4 Key Elements of Aware Strategy:
Table 5-5 BIO-key Authentication Technology Benefits
Figure 5-6 BIO-key Biometric Tools Offered
Table 5-7 BIO-key Key Areas For Market Growth
Figure 5-8 Cross Match SEEK Avenger Handheld
Table 5-9 CSC Operating Model for Efficiency
Table 5-10 DigitalPersona Customers
Table 5-11 DigitalPersona Technology Positioning
Table 5-12 DigitalPersona Fingerprint Biometrics for Commercial and Civil ID Applications
Table 5-13 Fingerprint Cards AB Profile
Figure 5-14 Fujitsu Main Products
Figure 5-15 Fujitsu Global Business
Figure 5-16 Fujitsu Geographical Market Participation
Figure 5-17 Fujitsu Global Alliances
Figure 5-18 Fujitsu Mixed IT Environments Forecasts
Table 5-19 Fujitsu Facts
Table 5-20 Gemalto Avalon Biometrics Live Enrollment Solutions
Table 5-21 Avalon Biometrics Target Markets
Table 5-22 Green Bit Market Sectors: Law Enforcement, Public Authority and Commercial Applications
Table 5-23 IBM PureSystems Target Industries
Figure 5-24 IriTech Regional Presence
Figure 5-25 IriTech Partners
Table 5-26 Litronic Patents
Table 5-27 Motorola Mobile Biometric Identification Solution
Table 5-28 Safran Morpho Profile
Table 5-29 Safron Morpho Technology Position In The Security Chain
Table 5-30 Safron Morpho Identification Division
Table 5-31 Safron Morpho e-Documents Divisions
Table 5-32 Safron Morpho Detection and Divisions
Figure 5-33 Steria IT Enabled Business Services
Figure 5-34 Suprema Biometrics Products
Table 5-35 Symantec Creating Trusted Interactions Online
Figure 5-36 Tyco Security Business
Figure 5-37 Tyco Mission Critical Solutions
Figure 5-38 Tyco Customers
Figure 5-39 Witswell Consulting and Services Cyber-SIGN Biometric Technology

- 1 Cyber-SIGN Biometric Technology
- 1 Merkatum Target Customers
- 1 Zvetco Biometrics Products
- 7 Avalon Biometrics
- 7 Safron Morpho Revenue
- Amano Japan / Accu-Time Systems
- Apple / AuthenTec
- Aware
- BIO-key
- CSC
- Cognitec Systems
- Communication Intelligence Corporation
- Cross Match / Francisco Partners
- DigitalPersona
- EgisTec
- Fingerprint Cards AB
- Fujitsu
- Gemalto
- Google
- Green Bit
- IBM Facial Recognition
- IdentiPHI
- Interlink Electronics
- IriTech
- Iris ID Systems
- Mereal Biometrics
- Motorola Solutions
- NEC
- NitGen & Company
- Nuance
- Precise Biometrics
- RDSK / Litronic
- STMicroelectronics
- Safran Morphoion
- Science Applications International Corporation (SAIC)
- SecuGen
- Siemens AG
- SmartMetric
- Smiths Detection
- Steria
- Suprema
- Symantec
- Tyco Integrated Security
- UnionCommunity / Virdi
- Vision-Box
- Witswell Consulting and Services / Cyber-SIGN
- Zvetco Biometrics
- eKey

Note: Product cover images may vary from those shown

RELATED PRODUCTS

Our Clients

Our clients' logos