Toll Free: 1-888-928-9744
Published: Nov, 2013 | Pages:
563 | Publisher: WinterGreen Research
Industry: ICT | Report Format: Electronic (PDF)
WinterGreen Research announces that it has published a new study Biometrics: Market Shares, Strategy, and Forecasts, Worldwide, 2013 to 2019. The 2013 study has 563 pages, 249 tables and figures. Worldwide markets are poised to achieve significant growth. As people use electronics in their personal life more, protection of individual information becomes a more compelling problem. Biometrics devices protect individual information. Biometric identity units provide security protection. Units are comprised of integrated biometric capture devices. Biometrics is used to identify anyone in an accurate, repeatable manner. Physiological characteristics used for biometrics commonly include the face, fingerprints, and DNA. Behavioral characteristics include the user\'s digital signature, his or her voiceprint, and walk. As law enforcement programs are redesigned to include information from social media and to initiate smarter cities initiatives, biometrics becomes a more compelling technology, both fingerprinting and facial recognition. Technologies. With the worldwide rise in the threat of terror, biometric systems become a more compelling tool in the hands of the authorities charged with keeping populations safe. A rise in government projects has been seen as terrorists become an increasing threat. This has been accompanied by increasing data security concerns. There is a need for advanced security devices. Security systems implementations drive the market for biometric systems. Biometric data protection is being used to replace photographs, passwords and PIN codes. Growth of biometric technologies has been in response to global security threats. Terrorist attacks, airport security initiatives, and attempts to lower crime rates have brought an increasing investment in biometric security systems. Government projects include ePassports, eDriving licenses, border management, and national IDs. These initiatives have been implemented in developed countries. India, Mexico and Russia are driving the extraordinary growth of biometric systems. China has a biometric national ID program that commenced in 2013. Computer storage of important documents has created an increasing need for biometric security systems. The global biometrics market is at $5.2 billion in 2012 anticipated to reach $16.7 billion by 2019. Market growth is a result of demand for protection of individual information and for the needs of organization to control access to documents and to areas. According to Susan Eustis, lead author of the WinterGreen Research team that prepared the study, \"Biometric devices represent a major factor impacting law enforcement and border patrol markets. Governments and law enforcement agencies are leveraging biometric devices to strengthen all aspects of citizen protection. Healthcare organizations are implementing biometric systems to provide patient privacy Companies Profiled Selected Market Leaders NEC 3M / Cogent Safron Morpho Bio-key Gelamto / Avalon Biometrics Tyco Apple / AuthenTec Suprema DigitalPersona Google Motorola Motorola Solutions Cross Match Technologies IBM Aware Green Bit Cognitec Systems Iris ID Systems Iritech Selected Market Participants Amano Japan / Accu-Time Systems Aware Cognitec Systems CIC Cross Match / Francisco Partners Cross Match Technologies Labcal eKey EgisTec Fingerprint Cards Fujitsu Gemalto /Avalon Biometrics Google Motorola Green Bit IdentiPHI Interlink Electronics Iris ID Systems IriTech RDSK / Litronic Mereal Biometrics Merkatum Biometrics Security & ID Motorola Solutions NitGen & Company Precise Biometrics Nuance Voice Biometrics Science Applications International Corporation (SAIC) SecuGen Siemens AG SmartMetric Smiths Detection Steria STMicroelectronics Suprema Symantec Vision-Box Witswell Consulting and Services / Cyber-SIGN Zvetco Biometrics
Biometrics and Biometric Fingerprint Equipment Executive Summary Biometrics and Biometric Fingerprint Equipment Market Driving Forces Biometric Fingerprint Equipment Market Driving Forces Biometrics Market Shares Biometric Market Forecasts Biometric Device Market Trends 1. Biometrics and Biometric Fingerprint Equipment Market Description and Market Dynamics 1.1 Biometric Sensor Devices 1.1.1 Biometrics for Security and Management 1.1.2 Biometrics for Convenience 1.1.3 Biometric Systems Characteristics 1.1.4 Biometric Systems Hidden Expenses 1.2 Biometrics Industry Segments 1.2.1 Biometrics Are In Law Enforcement 1.2.2 Biometrics Personal Identity Verification 1.2.3 Biometrics Increase Security 1.2.4 Financial Institutions Use Biometrics 1.2.5 Law Enforcement Uses Biometrics 1.2.6 Immigration Uses Biometrics 1.2.7 Social Services Use Biometrics 1.2.8 Airports Use Biometrics 1.2.9 Healthcare Use Biometrics 1.2.10 Consumer Use Biometrics 1.3 Applications for Biometrics 1.3.1 Casino Facial Recognition Capability 1.4 Store & Forward Systems 1.5 Mobile Identification Systems 1.5.1 Fingerprint Recognition 1.6 Human Mechanism To Distinguish Between Human Faces 1.6.1 Identifying People From Their Iris 1.6.2 Authenticating a User 1.7 Fingerprint Scanner 1.8 Gesture-Interfaces 1.8.1 Biometric Components of Signatures 1.9 Risks in Biometric-Based Authentication 1.10 Multi-Factor Authentication Solutions 1.11 Biometrics Automated Technique 1.12 Security of Input Mechanism 1.13 Digital Data Security 1.13.1 Security Issues 1.14 Global Economy 1.14.1 The IT Market 1.14.2 New World Order Built On The Globally Integrated Enterprise 1.15 Enterprise Information Accessed By Mobile Workers 1.15.1 Cloud Technology Brings Rapid Time to Value 1.16 Application Server Virtual Systems, Clustering, Fail-Over, and Load Balancing 1.16.1 Cloud System Continuous Deployment Models 2. Wireless Car Chargers Market Shares and Market Forecasts 2.1 Biometrics and Biometric Fingerprint Equipment Market Driving Forces 2.1.1 Biometric Fingerprint Equipment Market Driving Forces 2.2 Biometrics Market Shares 2.2.1 NEC 2.2.2 NEC 2.2.3 Sagem Morpho 2.2.4 3M/Cogent Systems 2.2.5 3M Cogent Systems CAFIS ™ 2.2.6 3M / Cogent 2.2.7 Motorola 2.2.8 Francisco Partners / Cross Match SEEK® Avenger 2.2.9 Francisco Partners / CrossMatch 2.2.10 Avalon Biometrics 2.2.11 DigitalPersona 2.2.12 Apple / AuthenTec / UPEK 2.2.13 BIO-key 2.2.14 Suprema 2.2.15 Suprema 2.2.16 eKey 2.2.17 Vision-Box 2.2.18 EgisTec 2.2.19 CIC Electronic Signature Competition 2.3 Biometric Market Forecasts 2.3.1 Biometric Device Market Trends 2.3.2 Fingerprint Biometrics 2.3.3 Non-Automated Fingerprint Identification Systems 2.3.4 Automated Fingerprint Identification Systems (AFIS) 2.3.5 National ID Control Biometrics 2.3.6 Facial Recognition Biometric Technologies Market Shares and Forecast 5.1.1 Cross Match Technologies Incorporates NEC’s Facial Recognition in SEEK 2.3.7 Voice Recognition Biometric Technologies Market Forecast 2.3.8 Workplace Access Fingerprint Biometrics 2.3.9 Healthcare Biometrics 2.3.10 Mobile Phone Biometrics Market Forecasts 2.3.11 Electronic Signature, Digital Signature, Signature Verification 2.3.12 Biometric Readers Market 2.3.13 Financial: 2.3.14 Consumer 2.3.15 Commercial Biometric Fingerprint Markets 2.4 Large Biometric Market Segments 2.4.1 Airport Screening / Facial Recognition 2.5 Mid Range Biometric Reader Markets 2.5.1 Commercial Biometric Fingerprint Markets 2.6 Biometric Sensors 2.6.1 Fingerprint Cards 2.6.2 Apple / Authentec 2.6.3 SAIC 2.7 Biometrics Device and Sensor Market Forecasts 2.7.1 Biometric Sensors for Law Enforcement 2.7.2 Government: 2.8 Biometric, Smart Card and PKI Technologies 2.9 Biometric Equipment Prices 2.9.1 Biometric Fingerprint Equipment Prices 2.9.2 Biometric Facial Recognition Equipment 2.9.3 Biometric Sensors 2.10 Biometric Fingerprint Equipment Regional Market Analysis 3. Biometrics Product Description 3.1 NEC Hybrid Finger Identification 3.1.1 NEC Fingerprint Identification 3.1.2 NEC Fingerprint Biometrics Accuracy 3.1.3 NEC Finger Print Matching Smart Analytics 3.1.4 NEC Fingerprint Recognition Minutiae and Related Method 3.1.5 NEC Fingerprint Matching Processor (FMP) 3.1.6 NEC Multi-Biometrics 3.1.7 NEC Portable DNA Analyzer 3.2 Safran Morpho Identity Management 3.2.1 Safran Morpho Supports Compliance with standards 3.2.2 Safron Morpho MorphoCivis™ 3.2.3 Safran Morpho System™ 3.2.4 Safron Morpho MorphoPerso 3.2.5 Safran Morpho ID Documents Uniqueness Protections 3.2.6 Safron Morpho MorphoCheck™ 3.2.7 Safron Morpho MorphoRapID™ 3.2.8 Safron Morpho MorphoTouch™ 1200 Series 3.2.9 Safron Morpho MorphoBIS 3.2.10 Safron Morpho MetaMorpho 3.2.11 Safran Morpho Secure Biometric Multibiometric Reader 3.2.12 Safran Morpho Outdoor MorphoAccess® 500 Series 3.2.13 Safran Morpho Border Control 3.2.14 Safran Morpho Border Automated Control 3.2.15 Safran Morpho Border Semi-Automatic Control Booths 3.2.16 Safran Morpho Border Mobile Control Terminal 3.2.17 Safran Morpho Secure Biometric Access 3.2.18 Safran Morpho / Bioscrypt 3.3 Cross Match 3.3.1 Cross Match Technologies Incorporates NEC’s Facial Recognition in SEEK 3.3.2 Cross Match SEEK® II 3.3.3 Cross Match SEEK® Avenger 3.3.4 Cross Match Guardian® 3.3.5 Cross Match Patrol ID / Patrol 3.3.6 Cross Match L SCAN® 1000T 3.3.7 Cross Match Verifier® 300 LC 2.0 3.4 3M/Cogent Systems 3.4.1 3M Cogent Systems CAFIS™ 3.4.2 3M Cogent Systems CAPFIS™ 3.4.3 3M Cogent Systems Multi-Biometric Enrollment Station (CBES) 3.4.4 3M Cogent Systems Biometric Registration Software (BRS) 3.5 Motorola Solutions 3.5.1 Motorola Identity Management 3.5.2 Motorola Multi-Biometric Enrollment 3.5.3 Motorola Multi-Biometric Verification 3.5.4 Motorola Multi-Biometric Capture and Verification Peripherals 3.5.5 Motorola Biometircs Use in Document Central Registry 3.5.6 Motorola Biometircs Use in Data Preparation and Key Management 3.5.7 Motorola Biometircs Use in Personalization Servers 3.5.8 Biometric Identification Solution (BIS) 3.5.9 Motorola Mobile Biometric Identification 3.6 Intel Healthcare 3.7 BIO-key Healthcare 3.7.1 BIO-key Large Scale ID 3.7.2 BIO-key for End Users 3.7.3 BIO-key BSP ( Biometric Service Provider) 3.7.4 BIO-key International\'s BSP Advantages 3.7.5 BIO-key Finger-based Biometric Identification and Personal Identity Verification 3.8 Precise Biometrics Tactivo 3.8.1 Precise Tactivo for iPhone 3.8.2 Precise Tactivo for iPad 3.8.3 Precise Tactivo Mini for Android 3.8.4 Precise Biometrics Easy App Integration 3.8.5 Precise Biometrics Smart Card Government Compliance 3.8.6 Precise Match-on-Card for National ID 3.8.7 Precise U.S. Government Solutions 3.8.8 Precise Enterprise Solutions for Secure Sign-On 3.8.9 Precise Biometrics Reduces Risk and Cost 3.8.10 Precise Secure Mobile Authentication for Enterprise 3.8.11 Precise Match-on-Card for Enterprise Solutions 3.8.12 Precise Biometrics Flexible Solution 3.8.13 Precise Biometrics Customization 3.8.14 Precise Partner Solutions 3.9 DigitalPersona 3.9.1 DigitalPersona Biometrics, Multi-Factor Authentication and Access Management 3.9.2 DigitalPersona Pro Enterprise 3.9.3 DigitalPersona Fingerprint Biometrics 3.9.4 DigitalPersona 5160 Fingerprint Reader 3.9.5 DigitalPersona, Inc. UPEK TouchChip TCRU1C 3.9.6 DigitalPersona, ikonTouch 700 3.9.7 DigitalPersona, Inc. ikonTouch 700 3.10 Fujitsu 3.10.1 Fujitsu PalmSecure™ 3.10.2 Fujitsu PalmEntry™ Access Control System 3.10.3 Fujitsu PalmSecure Vein Recognition Technology 3.10.4 Fujitsu Med-Serv 50 3.11 Labcal India 3.11.1 Labcal Be.U Mobile Series 3.11.2 Labcal Applications for the Be.U Mobile 3.12 SecuGen 3.12.1 SecuGen Hamster Plus 3.12.2 SecuGen Hamster IV 3.12.3 Benefits of Using SecuGen Peripherals 3.12.4 SecuGen OptiMouse Plus 3.13 NitGen & Company 3.13.1 NitGen NAC-5000 3.13.2 NitGen FINGKEY ACCESS Plus 3.13.3 NitGen NAC-2500 Plus 3.13.4 NitGen Access Manager Pro 3.13.5 NitGen FIM Module 3.14 Atmel 3.15 CSC 3.15.1 CSC Identity Management Trusted Enterprise Suite 3.16 Accu-Time Systems 3.16.1 Accu-Time Systems Optimus2 3.16.2 Accu-Time Systems AccuTouch 3.16.3 Accu-Time Systems Maximus 3.16.4 Accu-Time Systems Prodigy 3.17 Avalon Biometrics 3.17.1 Avalon MVT - Mobile Application Suite - Enrolment / Verification / Identification terminal 3.18 eKey 3.18.1 ekey home - Stand-alone Solution 3.18.2 ekey Home Finger Scanner Wall-Mounted 3.18.3 ekey Home Finger Scanner FSB 3.18.4 ekey Multi - Extended Stand-Alone Solution 3.18.5 ekey Multi Finger Scanner Outlet-Mounted 3.18.6 ekey Net - Networkable Solution 3.18.7 ekey Logon Server 3.19 Green Bit 3.19.1 Green Bit Law Enforcement & P.A. 3.19.2 Green Bit Commercial Applications 3.19.3 Green Bit DactyMatch SDK 3.20 Fingerprints Card AB 3.20.1 Fingerprints FPC1011F3 Area 3.20.2 Fingerprints FPC1080A Swipe 3.20.3 Fingerprints FPC2020 3.21 Merkatum: Biometrics Security & ID 3.21.1 Merkatum emfiva F/FRS 3.21.2 Merkatum ELA Logical Authentication 3.22 Suprema 3.22.1 Suprema RealScan G10 3.22.2 Suprema RealScan D 3.23 UnionCommunity / Virdi 3.23.1 VIRDI AC F100 3.23.2 ViRDI AC 5000 3.24 Aware 3.25 Zvetco Biometrics Products 3.26 Apple / AuthenTec 3.27 Tyco Integrated Security Biometrics 3.27.1 Tyco Facial Recognition Profile 3.28 EgisTec 3.28.1 EgisTec Image Quality 3.28.2 EgisTec Cloud 3.29 STMicroelectronics Biometric Solutions for Healthcare 3.29.1 STMicroelectronics Body Gateway 3.29.2 STMicroelectronics Lab-on-Chip 3.29.3 STMicroelectronics Pulse Generator for Ultrasound Imaging 3.29.4 STMicroelectronics’ Cooperation with French Start-ups and SMEs 2.10.1 ST Microelectronics (Finger-Scan) 3.30 SAIC 3.30.1 SAIC Voice Identity Biometrics Exploitation Services (VIBES) 3.30.2 SAIC Voice Biometrics Applications 3.31 Gemalto Avalon Biometrics Border Management 3.31.1 Gemalto Avalon Biometrics Document Verification of Travel & ID Documents 4. Biometrics Technology 4.1 Enabling Biometric Fingerprint Technologies 4.1.1 Fingerprint Recognition 4.1.2 Fingerprint Technology 4.1.3 Fingerprint SDKs 4.1.4 Fingerprint Enabling Technology 4.1.5 Surface Texture Analysis 4.2 Facial Recognition: 4.2.1 Facial Recognition SDKs 4.2.2 Facial Recognition Uses 4.2.3 Face Recognition Biometric System Deployment Considerations 4.2.4 Face Recognition Technology 4.3 Iris Reading Algorithms 4.3.1 Iris Reading Accuracy 4.4 Biometrics Impact On Network Operations 4.5 Enrollment and Identification 4.6 Neural Networks 4.7 Security of Biometric ID Systems 4.8 Perceptual Computing and Apps Detect Heart Rate 5. Biometrics Company Description 5.1 Selected Biometric Industry Mergers and Acquisitions 5.1.1 Safran Acquisition of L-1 Identity Solutions Formed From A Merger of Visage Technology, Inc. and Identix 5.1.2 3M Acquisition of Cogent 5.1.3 Amano USA Holdings, Inc. (AUH) acquired ATS 5.1.4 Apple Acquired AuthenTec 5.1.5 AuthenTec Acquisitions of SafeNet’s Embedded Security Solution Division, UPEK, Inc., PeerSec Networks and Proxure, Inc. 5.1.6 Smart Sensor Solutions 5.1.7 BIO-Key International / S.I.C. 5.1.8 Cross Match has acquired the biometric authentication business of Labcal Technologies 5.1.9 Francisco Partners Acquires Cross Match Technologies 5.1.10 Gemalto /Avalon Biometrics 5.2 3M/Cogent Systems 5.2.1 3M Cogent Advanced Technology 5.2.2 3M at a Glance (Year-end 2012) 5.2.3 3M Business Groups 5.2.4 3M Business. 5.2.5 3M Revenue 5.3 Amano Japan / Accu-Time Systems 5.4 Apple / AuthenTec 5.4.1 Authentec Revenue Recognition - Smart Sensors 5.4.2 Apple 5.4.3 Apple Business Strategy 5.4.4 Apple Products 5.4.5 Apple iPhone 5.4.6 Apple Mac Hardware Products 5.4.7 Apple iPod 5.4.8 Apple iTunes® 5.4.9 Apple Mac App Store 5.4.10 Apple iCloud 5.4.11 Apple Software Products and Computer Technologies 5.4.12 Apple Operating System Software iOS 5.4.13 Apple Mac OS X 5.4.14 Apple TV 5.4.15 Apple Third-Largest Mobile Phone Maker 5.4.16 Apple Regional Segment Operating Performance 5.4.17 Apple Americas 5.4.18 Apple Europe 5.4.19 Apple Japan 5.4.20 Apple Asia-Pacific 5.4.21 Apple Retail 5.4.22 Apple Revenue 5.4.23 Apple Net Sales 5.4.24 Apple iPhone Shipments 5.4.1 Apple iPad Shipments 5.5 Aware 5.5.1 Aware Company Overview 5.5.2 Aware DSL 5.5.3 Aware DSL Revenue 5.5.4 Aware’s Strategy 5.5.5 Aware Mobile Biometric Solution 5.5.6 Aware Revenue 5.5.7 Aware Biometrics and Imaging Revenue 5.6 BIO-key 5.6.1 BIO-key Security Solutions 5.6.2 BIO-key Smart Phone Markets 5.6.3 BIO-key Business Model 5.6.4 BIO-key Identity Management, User Authentication, Privilege Entitlement and Access Control 5.6.5 BIO-key Revenue 5.7 Cognitec Systems 5.8 Communication Intelligence Corporation 5.8.1 CIC Customers 5.8.2 CIC Business 5.8.3 CIC Revenue 5.8.4 CIC Core Technologies 5.8.5 CIC Products 5.8.6 CIC Revenue 5.9 Cross Match / Francisco Partners 5.9.1 Cross Match SEEK Avenger Handheld 5.9.2 Cross Match SEEK Avenger Customers 5.9.3 Cross Match Technologies Labcal 5.9.4 Labcal India 5.9.5 Cross Match Products 5.9.6 Cross Match Technologies Labcal 5.10 CSC 5.10.1 CSC Strategy 5.11 DigitalPersona 5.11.1 DigitalPersona Target Markets and Customers 5.12 eKey 5.13 EgisTec 5.14 Fingerprint Cards AB 5.14.1 Fingerprint Cards Sensor Technology Positioning 5.14.2 Fingerprint Cards Revenue 5.15 Fujitsu 5.15.1 Fujitsu Revenue 5.15.2 Fujitsu Technology Solutions Services 5.15.3 Fujitsu Personal Computers 5.15.4 Fujitsu Development and Production Facilities 5.15.5 Fujitsu Corporate Strategy 5.15.6 Fujitsu Revenue 5.15.7 Fujitsu Interstage 5.15.8 Fujitsu Acquires RunMyProcess Cloud Service Provider 5.16 Gemalto 5.16.1 Gemalto /Avalon Biometrics 5.16.2 Avalon Biometrics Solutions 5.16.3 Gemalto Avalon Biometrics Border Management 5.16.4 Gemalto Avalon Biometrics Document Verification of Travel & ID Documents 5.16.5 Gemalto Avalon Biometrics Live & Form-based Enrollment 5.16.6 Gemalto Avalon Biometrics Live Enrollment Solutions Mobile Applications 5.16.7 Avalon Biometrics 5.16.8 Avalon Biometrics SL Ghana Visa & Border Management System 5.17 Google 5.17.1 Google 2012 Corporate Highlights 5.17.2 Google Search 5.17.3 Google Revenue 5.17.4 Google Second Quarter 2013 Results 5.17.5 Google / Motorola 5.18 Green Bit 5.19 IBM Facial Recognition 5.19.1 IBM 5.19.2 IBM Strategy 5.19.3 IBM PureData System for Transactions 5.19.4 IBM Business Partners 5.19.5 IBM Messaging Extension for Web Application Pattern 5.19.6 IBM PureSystems Partners 5.19.7 IBM MobileFirst 5.19.8 IBM Business Analytics and Optimization Strategy 5.19.9 IBM Growth Market Initiatives 5.19.10 IBM Business Analytics and Optimization 5.19.11 IBM Strategy 5.19.12 IBM Smarter Planet 5.19.13 IBM Cloud Computing 5.19.14 IBM Business Model 5.19.15 IBM Business Revenue Segments and Capabilities 5.20 IdentiPHI 5.21 Interlink Electronics 5.22 Iris ID Systems 5.23 IriTech 5.24 RDSK / Litronic 5.24.1 Litronic Customers 5.24.2 Litronic Patents 5.25 Mereal Biometrics 5.26 Merkatum Biometrics Security & ID 5.26.1 Merkatum Target Customers 5.27 Motorola Solutions 5.27.1 Motorola Solutions Strategy 5.27.2 Motorola Solutions Biometric Attachment Mobile Identification Solution 5.27.3 Motorola Solutions Revenue 5.27.4 Motorola Mobile Biometric Identification Solution 5.27.5 Motorola Solutions Mobile Biometric Identification 5.28 NitGen & Company 5.28.1 Nitgen & Company, Investment of US $38 Million 5.28.2 Nitgen Marine Oil Bunkering business 5.28.3 Supply of Fingerprint Scanner with the Korean Government\'s National Electral System 5.29 Precise Biometrics 5.29.1 Precise Biometrics Customers 5.29.2 Precise Biometrics’ Tactivo™ Security Enhancements for Mobile Apps 5.30 NEC 5.30.1 NEC Business Outline 5.30.2 NEC Revenue 5.31 Nuance 5.31.1 Nuance Voice Biometrics 5.32 Safran Morpho 5.32.1 Safron Morpho Identification Division 5.32.2 Safron Morpho e-Documents Division 5.32.3 Safron Morpho e-Documents Payments 5.32.4 Safron Morpho e-Documents Identity & Access Management 5.32.5 Safron Morpho Global Presence 5.32.6 Safron Morpho Detection Division 5.32.7 Safron Morpho Revenue 5.33 Science Applications International Corporation (SAIC) 5.34 SecuGen 5.34.1 SecuGen Fingerprint Technology for Android 5.34.2 SecuGen Hamster IV Fingerprint Reader STQC Certification for India\'s UID Project 5.35 Siemens AG 5.36 SmartMetric 5.37 Smiths Detection 5.38 Steria 5.38.1 Steria Revenue 5.39 STMicroelectronics 5.40 Suprema 5.40.1 Suprema FVC Results 5.40.2 Suprema Revenue 5.41 Symantec 5.41.1 Symantec Security in Information-Driven World 5.41.2 Symantec Core Business Positioned for Growth 5.41.3 Symantec Acquires VeriSign Security Business 5.41.4 VeriSign Check Mark Signifying Trust Online 5.41.5 Symantec Creating Trusted Interactions Online 5.41.6 Symantec Revenue 5.42 Tyco Integrated Security 5.42.1 Tyco 5.42.2 Tyco Regional Revenue 5.42.3 Tyco Revenue 5.43 UnionCommunity / Virdi 5.44 Vision-Box 5.44.1 Vision-Box Border Control Biometrics 5.44.2 Vision-Box Facial Recognition Technology 5.45 Witswell Consulting and Services / Cyber-SIGN 5.45.1 Cyber-SIGN Biometric Technology 5.46 Zvetco Biometrics 5.46.1 Zvetco Biometrics Products 5.47 List of Companies Participating in the Biometrics Industry
Table ES-1 Types of Biometric Devices Table ES-2 Biometric Device Target Markets Table ES-3 Biometrics Devices Market Driving Forces Table ES-4 Biometrics Devices Market Dynamics Table ES-5 Biometrics Devices Market Restraints Figure ES-6 Biometric Devices Market Shares, Dollars, Worldwide, 2012 Figure ES-7 Biometric Devices Market Forecasts Dollars, Worldwide, 2013-2019 Table ES-8 Biometric Market Trends Table ES-9 Biometric Technology Market Growth Factors Table 1-1 Index of Biometrics Types Table 1-2 Biometrics Industry Segments Table 1-4 Biometric Store & Forward Systems Functions Table 1-12 Cloud System Continuous Deployment Models Table 2-1 Types of Biometric Devices Table 2-2 Biometric Device Target Markets Table 2-3 Biometrics Devices Market Driving Forces Table 2-4 Biometrics Devices Market Dynamics Table 2-5 Biometrics Devices Market Restraints Figure 2-5 Biometric Devices Market Shares, Dollars, Worldwide, 2012 Table 2-6 Biometrics Market Shares, Dollars, Worldwide, 2012 Table 2-7 Biometrics Market Shares Participants with Measurable Share, Dollars, Worldwide, 2012 Table 2-8 NEC Analysis of Biometric Device Market Principal Competitive Factors Table 2-9 NEC Analysis of Biometric Device Market Competitive Advantage Factors Figure 2-10 Safran Morpho Identity Management Table 2-11 Motorola Biometrics Products Figure 2-12 Cross Match SEEK® Avenger Figure 2-13 Biometric Devices Market Forecasts Dollars, Worldwide, 2013-2019 Table 2-14 Biometric Device Market Forecasts, Dollars, Shipments, Worldwide, 2013-2019 Table 2-15 Biometric Market Trends Table 2-16 Biometric Technology Market Growth Factors Figure 2-17 Biometric Device Market Segments, Dollars, 2012 Figure 2-18 Biometric Device Market Segments, Dollars, 2019 Table 2-19 Biometric Devices, Fingerprint, Facial Recognition, Voice and Other, Dollars, Shipments, Worldwide, 2013-2019 Table 2-20 Biometric Devices, Fingerprint, Facial Recognition, Voice and Other, Percent, Shipments, Worldwide, 2013-2019 Table 2-21 Biometrics Market Segments, Law Enforcement, Government / Documents and Passports, Healthcare, Electronic Device Protection, Airports / Commercial Access Control, Dollars, Worldwide, 2013-2019 Table 2-22 Biometrics Market Segments, Law Enforcement, Government / Documents and Passports, Healthcare, Electronic Device Protection, Airports / Commercial Access Control, Percent, Worldwide, 2013-2019 Table 2-23 Biometrics Devices: Dollars and Units, High End, Mid-Range, and Low End, Shipments, Worldwide, 2013-2019 Table 2-24 Biometrics Facial Recognition and Voice Recognition Devices: Dollars and Units, Shipments, Worldwide, 2013-2019 Table 2-25 Biometric Devices, Units, Shipments, Worldwide, 2013-2019 Table 2-26 Biometric Sensors, Units and Dollars, Shipments, Worldwide, 2013-2019 Figure 2-27 Non-Automated Fingerprint Biometric Market Shares, Dollars, Worldwide, 2012 Table 2-28 Non-Automated FingerPrint Biometric Identification Systems Market Shares, Dollars, Worldwide, 2012 Table 2-29 Non-Automated FingerPrint Biometric Device Market Forecasts, Dollars, 2013-2019 Table 2-30 Automated FingerPrint Information Systems (AFIS) Biometric Market Segments, Dollars, 2012 Table 2-31 Biometrics Automated Fingerprint Information Systems (AFIS): Dollars, Shipments, Worldwide, 2013-2019 Table 2-32 Biometrics Automated / Non Automated Fingerprint Devices: Dollars and Units, High End, Mid Range, and Low End, Shipments, Worldwide, 2013-2019 Figure 2-33 Biometric Facial Recognition Market Shares Dollars, Worldwide, 2012 Table 2-34 Biometric Facial Recognition Market Shares Dollars, Worldwide, 2012 Table 2-35 Biometrics Facial Recognition and Voice Recognition Devices: Dollars and Units, Shipments, Worldwide, 2013-2019 Table 2-36 Biometrics Market Segments Worldwide, 2013-2019 Table 2-37 Biometric Devices, Units, Shipments, Worldwide, 2013-2019 Table 2-38 Biometrics Devices: Dollars and Units, High End, Mid Range, and Low End, Shipments, Worldwide, 2013-2019 Table 2-39 Major Airports in the World Table 2-40 Biometrics Devices: Dollars and Units, High End, Mid Range, and Low End, Shipments, Worldwide, 2013-2019 Figure 2-41 Biometric Sensor Market Shares, Dollars, Worldwide, 2012 Table 2-42 Biometric Sensor Market Shares Dollars, Worldwide, 2012 Figure 2-43 Biometric Sensor Market Shipments Forecasts Dollars, Worldwide, 2013-2019 Figure 2-44 Biometric Sensor Market Shipments Forecasts Dollars, Worldwide, 2013-2019 Table 2-45 Fingerprint Embedded Security Market Shares Dollars, Worldwide, 2012 Table 2-46 Biometrics Device and Sensor Market Forecasts Figure 2-47 Biometric Equipment Regional Market Segments, 2012 Table 2-48 Biometric Equipment Regional Market Segments, 2012 Table 2-49 Biometrics Market Shares, Dollars, Worldwide, 2012 Figure 3-1 NEC Hybrid Finger Identification Figure 3-2 NEC Fingerprint Identification Table 3-3 NEC Fingerprint Identification Features Figure 3-4 NEC Fingerprint Identification Figure 3-5 NEC Minutiae and Related Method Illustrated Figure 3-6 NECFingerprint Matching Processor (FMP) Figure 3-7 NEC Multi-Biometrics Table 3-8 NEC Portable DNA Analyzer Features Table 3-9 NEC Portable DNA Analyzer Step by Step Procedures Table 3-10 NEC Portable DNA Analyzer Technical Highlights Figure 3-11 NEC Portable DNA Analyzer Figure 3-12 NEC Portable DNA Analyzer STR by Electrophoresis Analysis / Analysis Program Figure 3-13 Safran Morpho Identity Management Table 3-14 Safran Morpho Public and Private Sector Security Systems Solutions Figure 3-15 Safran Morpho Identity Management Figure 3-16 Safron Morpho MorphoCivis™ Table 3-17 Safran Morpho System Aspects Figure 3-18 Safron Morpho MorphoPerso Table 3-19 MorphoPerso ID Documents Lifecycle Management Flexible Solution Figure 3-20 Safron Morpho MorphoCheck™ Figure 3-21 Safron Morpho MorphoRapID™ Figure 3-22 Safron Morpho MorphoTouch™ 1200 Series Figure 3-23 Safron Morpho Morphotouch™ 1200 Series Features Figure 3-24 Safron Morpho MorphoBIS Table 3-25 MorphoBIS, Morpho’s Next Generation AFIS Functions Table 3-26 MorphoBIS, Morpho’s next generation AFIS Features Figure 3-27 Safron Morpho MetaMorpho Table 28 MetaMorpho™ ABIS Store and Management of Fingerprints and Palm Prints In A Single Database Feratures Figure 3-29 Safran Morpho Outdoor MorphoAccess® 500 Series Table 3-30 MetaMorpho™ MorphoAccess® (OMA) 500 Series High-Performance Fingerprint Identification Terminals Features Figure 3-31 Safran Morpho Secure Biometric Access Table 3-32 Cross Match Technologies Biometrics Offerings: Figure 3-33 Cross Match SEEK® II Table 3-34 Cross Match SEEK® II Advantages Figure 3-35 Cross Match SEEK® Avenger Figure 3-36 Cross Match SEEK® Avenger Advantages Figure 3-37 Cross Match Guardian® Table 3-38 Cross Match Guardian® Advantages Figure 3-39 Cross Match Patrol ID / Patrol Table 3-40 Cross Match Patrol ID / Patrol Advantages Figure 3-41 Cross Match L SCAN® 1000T Table 3-42 Cross Match L SCAN® 1000T Advantages Figure 3-43 Cross Match Verifier® 300 LC 2.0 Table 3-44 Cross Match Verifier® 300 LC 2.0 Advantages Table 3-45 3M Cogent Systems CAFIS Features Table 3-46 3M CAFIS Agency Solutions: Table 3-47 3M CAFIS Features Table 3-48 3M Cogent Systems Prime Full Function AFIS for Local Law Enforcement Agencies Features: Table 3-49 3M Cogent Systems CAFIS Functional Capabilities Table 3-50 3M Cogent Systems Multi-Biometric Scale Document Issuance Program Target Markets: Table 3-51 3M Cogent Systems Multi-Biometric Enrollment Station (CBES) Key Features: Table 3-52 3M Cogent Systems Biometric Enrollment Software Key Features: Table 3-53 Motorola Identity Management Features Table 3-54 Motorola Multi-Biometric Capture and Verification Peripherals Table 3-55 Biometric Identification Solution (BIS) Features Figure 3-56 Motorola Mobile Biometric Identification Table 3-57 Motorola Mobile Identification Solution Features Table 3-58 Motorola Mobile Identification Solution Target Markets Table 3-59 Google / Motorola Mobile Identification Solution Applications Table 3-60 BIO-key International Biometric Technology Solutions Table 3-61 BIO-key Large Scale ID Features Table 3-62 BIO-key Large Scale ID Functions Table 3-63 BIO-key for End User Systems Table 3-64 BioAPI Consortium Standard API Table 3-65 BIO-key\'s SDK Software Development Kit Features Table 5-66 BIO-key Authentication Technology Benefits Figure 5-67 BIO-key Biometric Tools Offered Table 3-68 Precise Biometrics Tactivo Functions Table 3-69 Precise Biometrics Tactivo Uses Table 3-70 Precise Biometrics Smart Card Product Features Table 3-71 Precise Match-on-Card for National ID Features Table 3-72 Precise Biometrics U.S. Government Solutions Figure 3-73 Precise Enterprise Solutions for Secure Sign-On Figure 3-74 Precise Secure Mobile Authentication for Enterprise Table 3-75 Precise Biometrics Tactivo Features: Figure 3-76 Precise Match-on-Card for Enterprise Solutions Table 3-77 Precise Biometrics Security Functions Figure 3-78 DigitalPersona Biometrics, Multi-Factor Authentication and Access Management Table 3-79 DigitalPersona Biometrics, Multi-Factor Authentication and Access Management Functions Figure 3-80 DigitalPersona Pro Enterprise Table 3-81 DigitalPersona Biometrics, Multi-Factor Authentication Pro Enterprise Features DigitalPersona, Inc. ikonTouch 700Features Figure 3-82 Fujitsu PalmSecure™ Table 3-83 PalmSecure™ Features Figure 3-84 Fujitsu PalmEntry™ Access Control System Table 3-85 Fujitsu PalmEntry Target Markets Table 3-86 Fujitsu PalmEntry Market Positioning Table 3-87 PalmEntry™ Access Control System Figure 3-88 Fujitsu Med-Serv 50 Figure 3-89 Fujitsu Med-Serv 50 Kiosk Features Table 3-90 Fujitsu Med-Serv 50 Features Table 3-91 Labcal Be.U Mobile Series Biometric Features Figure 3-92 SecuGen Hamster Plus Figure 3-93 SecuGen Hamster IV Figure 3-94 SecuGen OptiMouse Plus Figure 3-95 NitGen NAC-5000 Figure 3-96 NitGen FINGKEY ACCESS Plus Figure 3-97 NitGen NAC-2500 Plus Figure 3-98 NitGen Access Manager Pro Figure 3-99 NitGen FIM Module Table 3-100 NitGen & Company Performance Table 3-101 CSC’s Trusted Identity Enterprise Suite Full-Spectrum, Fully Integrated Solution Portfolio Modules Figure 3-102 Accu-Time Systems Optimus2 Table 3-103 Accu-Time Systems Optimus2 Features Figure 3-104 Accu-Time Systems AccuTouch Table 3-105 Accu-Time Systems AccuTouch Figure 3-106 Accu-Time Systems Maximus Figure 3-107 Accu-Time Systems Maximus Figure 3-108 Accu-Time Systems Prodigy Table 3-109 Accu-Time Systems Prodigy Feature Table 3-110 Avalon MVT - Mobile Application Suite Components Table 3-111 Avalon MVT - Mobile Application Suite Key Features Table 3-112 ekey Home Finger Scanner Feature Highlights Figure 3-113 ekey Home Finger Scanner Wall-Mounted 2.0 Figure 3-114 ekey Home Finger Scanner FSB Table 3-115 ekey multi - Extended Stand-Alone Solution Features Figure 3-116 ekey Multi Finger Scanner Outlet-Mounted Table 3-117 ekey Net - Networkable Solution Features Table 3-118 ekey Logon Server Functionality Table 3-119 ekey Logon Server Benefits Table 3-120 Characteristics of Green Bit Scanners Table 3-121 Green Bit DactyMatch SDK Figure 3-122 Fingerprints FPC1011F3 Area Table 3-123 Fingerprints FPC1011F3 Area Figure 3-124 Fingerprints FPC1080A Swipe Table 3-125 Fingerprints FPC1080A Swipe Figure 3-126 Fingerprints FPC2020 Table 3-127 Fingerprints Card FPC2020 Figure 3-128 Merkatum emfiva F/FRS Table 3-129 Merkatum ELA Logical Authentication Benefits: Figure 3-130 Suprema RealScan G10 Figure 3-131 Suprema RealScan D Figure 3-132 VIRDI AC F100 Figure 3-133 ViRDI AC 5000 Table 3-134 Aware Primary Biometrics Systems Target Markets Table 3-135 Tyco Facial Recognition Specifications Table 3-136 Tyco Facial Recognition Special Table 3-137 Tyco Facial Recognition Parameters Table 3-138 Tyco Full Range Of Access Control Solutions Figure 3-139 EgisTec’s Unique E-Field (Capacitance) Imaging Technology Table 3-140 EgisTec Image Quality Advantages Table 3-141 EgisTec Key Features of CloudHub Table 3-142 ST Supports France’s Innovation Clusters Table 3-143 SAIC Voice Biometrics Open Architecture Functions Table 3-144 SAIC Voice Biometrics Open Architecture Features Table 3-145 SAIC Voice Biometrics Open Architecture Benefits Figure 4-1 Biometric Fingerprint Pattern Measurements Figure 4-2 Iris Reading Algorithms Table 5-1 3M Cogent solutions Benefits Table 5-2 3M Cogent Solutions Target Markets Table 5-3 ATS Positioning Table 5-4 Key Elements of Aware Strategy: Table 5-5 BIO-key Authentication Technology Benefits Figure 5-6 BIO-key Biometric Tools Offered Table 5-7 BIO-key Key Areas For Market Growth Figure 5-8 Cross Match SEEK Avenger Handheld Table 5-9 CSC Operating Model for Efficiency Table 5-10 DigitalPersona Customers Table 5-11 DigitalPersona Technology Positioning Table 5-12 DigitalPersona Fingerprint Biometrics for Commercial and Civil ID Applications Table 5-13 Fingerprint Cards AB Profile Figure 5-14 Fujitsu Main Products Figure 5-15 Fujitsu Global Business Figure 5-16 Fujitsu Geographical Market Participation Figure 5-17 Fujitsu Global Alliances Figure 5-18 Fujitsu Mixed IT Environments Forecasts Table 5-19 Fujitsu Facts Table 5-20 Gemalto Avalon Biometrics Live Enrollment Solutions Table 5-21 Avalon Biometrics Target Markets Table 5-22 Green Bit Market Sectors: Law Enforcement, Public Authority and Commercial Applications Table 5-23 IBM PureSystems Target Industries Figure 5-24 IriTech Regional Presence Figure 5-25 IriTech Partners Table 5-26 Litronic Patents Table 5-27 Motorola Mobile Biometric Identification Solution Table 5-28 Safran Morpho Profile Table 5-29 Safron Morpho Technology Position In The Security Chain Table 5-30 Safron Morpho Identification Division Table 5-31 Safron Morpho e-Documents Divisions Table 5-32 Safron Morpho Detection and Divisions Figure 5-33 Steria IT Enabled Business Services Figure 5-34 Suprema Biometrics Products Table 5-35 Symantec Creating Trusted Interactions Online Figure 5-36 Tyco Security Business Figure 5-37 Tyco Mission Critical Solutions Figure 5-38 Tyco Customers Figure 5-39 Witswell Consulting and Services Cyber-SIGN Biometric Technology
Speak to the report author to design an exclusive study to serve your research needs.
Your personal and confidential information is safe and secure.