You are here:  

Solutions for Government

Print PDF



Securing assets is a very challenging aspect for any government. This is fundamental component of day to day operations, a small security breach can trigger chaos amongst the public.

A major hazard can topple a government.

Government's have physical security concerns apart from Network Security Concerns. Physical security concerns are such as specific entry points (i.e. doorways at major government buildings, stock rooms, report rooms, computer rooms, etc.) as well as essential security necessities.

We pledge to increase/enhance security in your daily activities, in the following areas,

  • Biometrics Access to Secure Areas
  • Remote Network Access processing using Biometrics Recognition.
  • Biometrics Identification to safeguard in finance and cash handling departments.
  • Time and Attendance Verification



biometric_dooraccessBiometric Access to Secure Areas

Matcess identification can be a secure, convenient, and cost-effective alternative to passwords, badges, swipe cards and PINs. The biometric reader mounts on a wall near your secure door. These biometric scanners offer various levels of authorization for an individual. This authorization includes a scheduling mechanism for allowing access for individuals based on the time of day.

Unlike systems that require proprietary networking, Matcess uses your existing local area network

  • A truly secure method of securing electronic transactions - Biometric authorization takes place at the host web site's secure environment - not at the local machine where password and PINS can be entered by anyone.
  • Easy to install for end users - By installing a small Internet Explorer plug-in and the software driver for the biometric reader, an end user is now ready to go. An existing web cam or a biometric reader plugs into an available USB Port on the end user's computer.
  • Fosters goodwill by providing your clients, visitors and employees with the electronic security and "peace of mind" because you show the utmost importance for their secure transactions.
  • Computer and network security is an important aspect in any government as data is a crucial factor of daily life. Security Passwords, PINs, security codes, user names are usually the first line of defense against cyber attacks in the real world, but Biometric Security is the ultimate.

Implementing Matcess not only increases security, but also productivity and hence better Return on investment.


Remote Network Access for Internet/Intranets using Biometric Recognition.biometric_networking

d'face enables organisations to have a secure Internet and Intranet operations, all at no cost if you are using face recognition as most of the computer users use web-cam as standard equipment.

  • Access data based on biometrics, by department, branch etc.
  • Will ensure that the person, who is accessing the data from your server, is part of your organisation, vendor, customer who is authorized by you.
  • Better Intranet transactions among inter/intra departmental transactions, and hence have better and secure communications at a faster pace.
  • Better ROI with secured environment.

d'face will secure identities before data is transferred to and from an Intranet, Internet or other type of remote location. Because security is weakest at the remote computer, d'face work with a web browser at the server level.     d'face captures the user's face/fingerprint on a lightweight face/fingerprint reader at the local machine and then translates and encrypts the biometric data to be sent to the server for authentication. The authentication takes place at the website's host environment versus the local machine - behind appropriate security and firewall technology. No record of PINs, passwords, or biometric data resides in cache memory on the local computer.


biometric_vaultaccessBiometric Identification to safeguard in finance and cash handling departments

Matcess, biometric-ally manages who can unlock latched enclosures according to a specific schedule and a specific authorization level, thus increasing companies security by utilizing biometrics for controlling access to specific latched enclosures.

  • Decrease the opportunity for theft by utilizing a face/fingerprint for access versus a key which can be lost or stolen.
  • Audit logs can be immediately generated for speedy reports including who accessed which enclosures at what times.
  • Responsibility for an enclosure(s) can be assigned to a face/fingerprint from a single individual, to a fingerprint from any one of a group of individuals, or to two or more fingerprints - one from each individual, providing dual-access.
  • Save time and money because there is no need to re-key enclosures in the event of an employee dismissal or a lost key. “Face is the Key”
  • Easy of use, just need one time training.

Time and Attendance Verificationbiometric_timeattendance

Payroll, one of the applications for computer technology, is often only half automated, leaving organisations vulnerable to employee time theft. Experts estimate that long lunches, “buddy punching”, late arrivals and other abuses cost phenomenal figures to the government.

Our Biometric recognition is secure, convenient and accurate alternative to time clocks and card-based systems. It can help employers avoid time theft losses and enjoy the enhanced productivity and savings of an automated time/attendance solution that integrates directly with accounting and payroll processing software

  • Avoid common mistakes that are related with the manual entry of time and attendance data.
  • Clock hours are shown in accumulated and daily basis; administrator can set shifts, holiday list, employee type etc., on the fly.
  • Concurrently handle various departments.
  • Eliminate pay errors with automatic computation and monitoring of overtime.

Typically, magnetic cards, proximity cards, access tokens, punch card time and attendance systems, and passwords/PINs are the default methods of control. Unfortunately, anyone can use these portable devices and punch card systems to defraud, or access confidential data which could cost millions to the government directly and indirectly, and the current systems deployed do not authenticate the person using the portable device is really who they claim to be.

Biometrics can eliminate the vulnerability of lost, stolen or mismanaged access methods. A face/fingerprint can't be lost or stolen whereas portable devices and "buddy punching" for time and attendance can be used as fraudulent tools. By using a centralized profile management system, facilities management personnel can control the addition, deletion, and modification of access profiles for all employees without the cost of issuing new portable devices or the cost of lost time and productivity waiting for the changes to take place