NEC Digital ID

The powerful combination of our top-ranked biometric technology and continually refined AI algorithms present quick and accurate solutions for identifying and verifying individuals.

#

Identification and Verification

NEC biometrics for face, iris, fingerprint, finger vein, palm print and voice are consistently rated in the top of their class by the National Institute of Standards and Technology (NIST). Our advanced biometrics algorithm is the basis of all our solutions to verify (1:1) people in a data set or identify (1:n) people who are not known.

NEC NSS offers hardware, software and end-to-end solutions for:

ABIS Solutions

An Automated Biometrics Identification System (ABIS) is used to search biometric records for a match. Our hardware-agnostic software as a service (SaaS for ABIS) relies on the most accurate matching algorithm as validated by NIST: NEC’s NeoFace® algorithm.

#

At A Glance

Our scalable ABIS solutions are defined in two groups: AIM XM and AIM-ES. Both have search options to be determined for each application, with 1:1 and 1:n multimodal matching capabilities for fingerprint, palmprint, face, and iris records.

  • NEC’s Advanced Identity Manager extensible Multimodal (AIM XM) provides integrated multimodal matching services for fingerprint, palmprint, face, and iris. It provides a platform to build a variety of biometric identification and secure credentialing solutions for law enforcement and public safety communities to establish identities and prevent fraud.
  • NEC's Advanced Identity Matcher - Edge Source (AIM-ES) is the fastest and most precise small-scale biometric engine available for creating and administering face and fingerprint recognition galleries and templates. It also provides industry-leading accuracy and search response times in identity matching and scoring, making it a highly dependable tool for government agencies.
#

Identity Intelligence

Identity intelligence (I2) combines biometrics with forensics and document and media exploitation (DOMEX) to quickly generate actionable intelligence and identify potential threats. I2 fuses biometric and other data, including geo-fencing, mobile sensing, historical events, and transaction risk to enable decision-making capabilities for users across a spectrum of Federal operations and mission sets.