Security: transfer for most modern and efficient Security Printing Plants for the production of eDocuments such as high secure eID cards, eVisa and eData pages including pre-personalization of RFID chip and personalization of eDocuments.

Forensic  Evidence  Systems: using international  protocols.

Border Control  Systems: Integrated with international eDocuments readers.

Back-end and desktop: Microsoft .NET, Java, C++, PHP.

Mobile: iOS, Android, Windows Phone .

Web development: Drupal, WordPress, Joomla, Pimcore, Magento, Sitecore, EPiServer.

Databases and data warehouses: Oracle ,Microsoft SQL Server, MySQL, IBM DB2.

ASBT’s offering embraces the full cycle of custom software development, platform-based consulting, outsourced product development and IT services:

   
  Platform-based solutions: business intelligence,  ERP, portals, security intelligence and IT service management.
  Web development: portals, web apps and e-Commerce solutions.
  Outsourced product development: from requirements gathering through design and implementation to maintenance and support.
  Full lifecycle testing: functional, performance, automated, localization, mobile and acceptance testing.
  Data analysis: data warehousing and ETL; OLAP cubes, reporting and visualization; predictive analytics.
  Security intelligence: penetration testing, security information and event management (SIEM), identity and access management (IAM) and compliance.
  Software maintenance (fixing defects and creating new features) and support, 24/7 help desk services.
  IT services: infrastructure services (network and server management) and data center management.

 

Advanced Traffic Observer and Traffic Analysis Solution
The newest generation of Laser Scanner aimed for traffic flow analysis and speed control.

Advanced Traffic Observer and Traffic Analysis Solution
The newest generation of Laser Scanner aimed for traffic flow analysis and speed control.

Iris recognition refers to the automated method of identifying or confirming the identity of a subject by analyzing the random pattern of the iris. Iris recognition is relatively young, being only commercially developed the last decade mostly due to previous patent limitations.

How iris recognition works:

The following sequence applies to both enrollment and recognition:

  1. Capture iris image. The camera acquires an image from the iris, lighting is mostly done with Near Infrared (NIR) light because with NIR there is less noise in the image due to reflections when compared to visible light. Also NIR light does not cause harm or discomfort to the subject.
  2. Finding iris in the image. One of the challenging parts of iris recognition is for the algorithm finding the concentric circular outside boundaries of pupil and iris. Often part of the iris is covered by eyelids or eyelashes, which even more complicates this step.
  3. Convert image. The set of pixels which cover the iris on the image are then transformed into a bit pattern that preserves required information for template comparisson but allows faster and statistical meaningful comparisson. Dr. Daugman’s algorithms, refered to as IrisCode ™, translates the visible characteristics from the image into a 512 byte code, the template, which allows extremely quick searches and a very low false acceptance rate.

When a subject tries to authenticate or identify himself, the generated IrisCode is compared with templates stored in the database. A test of statistical independence determines whether the IrisCode resulting from the scan and a stored IrisCode template are from the same iris.

Multifunctional Iris Device:

  • Iris Indoor and Outdoor Camera :
  • Iris Smart Keypad
  • Iris Indoor Wireless Video Camera

 

  • Iris Mouse

GRP is software designed for the unique requirements of public financial management. GRP software is budget-driven through the use of Commitment Accounting, where the budget is the legal embodiment of government objectives. Commitment Accounting is used only in government and other forms of public financial management.

Government Resource Planning Services:

  • Financial Management.
  • Human Resources Management System.
  • Payroll Management Systems.
  • Asset Life Management Systems.
  • Supply Chain Management Systems.

The basis for a compliant, reliable and efficient FTA process is a precise free trade agreement management software. The system can store and process rules of origin for an unlimited number of unique free trade agreements. In addition The system makes it easier to generate and track origin requests through various options including a web front end application for suppliers (supply chain solicitation system).

  • Import management.
  • Export management.
  • Store management.
  • Finance management.
  • Stock management.
  • Origin management.
  • Supply Chain Compliance.

 

Fingerprint recognition refers to the automated method of identifying or confirming the identity of an individual based on the comparison of two fingerprints. Fingerprint recognition is one of the most well known biometrics, and it is by far the most used biometric solution for authentication on computerized systems. The reasons for fingerprint recognition being so popular are the ease of acquisition, established use and acceptance when compared to other biometrics, and the fact that there are numerous (ten) sources of this biometric on each individual.

Professional, compact 10 fingerprint scanning device for acquisition of single finger flats, rolls and four finger slaps. The FBI certified device provides superior image quality. The native segmentation and quality control algorithm guarantees the best fingerprint result.

The device is highly scalable: the finger sequence, the capture mode and further capture parameters can be configured by the user. The images can be saved in any industry standard format even in NIST structure. The forensic quality of the fingerprint scans makes them ideal for precise and reliable identification.

Flexible integration is supported by the dual power system: The device can be powered through USB connection, or from external power supply.

The durable, rugged housing resist any environmental effect it  can be efficiently used in various applications eliminating the need for paper based fingerprint: police database, eVISA application, border control, etc.

examples:

Fingerprint readers and scanner

  • Optical readers
  • Capacitive readers
  • Ultrasound readers
  • Thermal readers

 

 

 

An inborn quality in humans that they can recognize and distinguish between faces. But the computers have also proved their ability of recognizing and distinguishing faces. Scientist named Woody Bledsoe along with Helen Chan Wolf and Charles Bisson configured the computer to recognize and identify the human face in the mid-1960s and since then the facial recognition tech has come a long way.

A facial recognition system is nothing but a computer application which identifies and verifies an image created on the spot of a face, by matching it with a given set of different digital images or video frames in a storage one by one. Such technique is mostly used in security systems which usually compare with other biometrics techs such as in fingerprint or eye iris recognition systems

This process is used as one means of identification when an attacker or assailant has left some kind of bodily fluid or blood at the scene of a crime and when no visual identification is possible.

DNA – or genetic – fingerprinting relies heavily on the principle that no two individuals share the same genetic code – except for identical twins and statistically those elements of DNA that are examined and used to obtain a match will be unique.

The process of DdnaNA fingerprinting was first used during the 1980’s and its application was quickly to become that of identification of suspects involved in serious crimes including murder. The premise that most attackers or killers will leave some measure of bodily fluid at a crime scene – be it saliva, blood, semen or other such fluid – was quickly accepted as common place and it became a staple of many criminal investigations.