SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Biometrics Identification and
Registration System
by
Hisplus Systems Limited
info@hisplus.net
Tel: +234-805-5075-777
• Hisplus Integrated Automated Identification
Biometrics System for registration, identification
and verification processes.
• It uses face scan and all the ten fingerprints scan to
ensure high level of accuracy for identification.
• Our biometrics technology authenticates an
individual's identity automatically and has
automatic fingerprint identification, which matches
a fingerprint taken with a print from a database.
• Civil Servant Identification Processing / Time and
Attendant Management.
– To track the way workers spend their time in various
capacities and the ability to keep track of attendance.
– Attendant Management for Payroll
– Employee Time Attendance Recording System
– Biometric door control with time attendance system
• Physical Access Control
– Applications are in access control devices for doors and
restricted and areas.
– Areas where authorization is needed to again access.
– Also where computers with highly confidential and
important information or high level network access is
necessary.
• Border, Airport and Immigration Control
– Identification and Registration.
– Terrorist / Criminals profiling.
– Mobile Biometrics
• Justice and Law Enforcement
– For prison administration and bookings, crime scene
identification.
– National / State identity programs.
– Criminals / Militants Profiling.
– Management of personnel, lawyers, offenders and
witnesses.
• Healthcare Biometrics
– Biometrics Medical Records System
– Biometrics Healthcare Identity Management.
– Data access and retrieval System
• Mobile Biometrics
– For law enforcement, to military, public transportation,
border control, and commercial authorities.
– To speed up processing of people and goods.
– For passport processing and voter registration
– To speed up the identification of individuals in-the field,
saving time, resources and quickly identifying threats.
– Mobile employee time-keeping, access control and security
system for businesses to improve productivity, and reduce
loss & waste.
• For identification processes for security reasons.
• For verification processes.
• For registration purposes
• For access control.
• For ID card production
• Terrorist Identification
• For Integrated Automated Fingerprint Identification
System
• To protect military bases and monitor inmates at
detention centers
• Registration, Verification and Identification of "watch
list" of suspects
• It will help in identity for a
payroll cheque Bearer
• This biometric technology
will help to check something
to ensure the individual is
who he says he is.
• Biometrics Identification for
friendly residents from
insurgents and terrorists,
• Identifying potential
combatants in the field
• To track militants.
• Offices and Residential Identification
System
• For identification at internal checkpoints
and border crossings
• To scrutinize those applying for government
• For foreign mission postings and special
assignments
• High Security Risk Personnel Identification
• Time and attendance management system
• Portable biometrics verifications and
identification for field / foot soldiers
• Enrollment Station Module
– It is a biometric enrollment application to enroll a
user’s Face.
– It gathers biometric samples, extract biometric
template information from them, and send extracted
template matching to Multi-Biometric Matching
Engine to check for duplicates before allowing the
enrollment process to succeed.
• Server Management System.
– It is a repository for various biometric data collected
during the enrollment or registration process.
– It receives request through the search interface and
send the relevant biometric templates for backend
matching via the Multi-Biometric Matching
Engine.
– This server also provides role-based functional
access.
– Server Database is used to store user profiles
including user details and biometric data.
• Multi-biometric Matching Engine
– It searches with various attributes like finger print,
face print, name, date of birth, face marks, physical
disabilities, LGA, state of origin, height range etc
– It produces multiple results from search
characteristics.
– To record eye scans, fingerprints and facial images
• Software
– Server application
• Identification and Verification System
– This is for registration with different criterial
ranging from personal profile like age, height,
colour (eyes, hair, body), LGA, state, tribal
marks, Blood group, face shape and other
special attributes
– Face and fingerprints( 1 – 10) scan
registration.
• Criteria Searching System
– Searching that leads to task or operation.
– Range Searching
– Face, Finger print scan searching
– Mobile Client application
– Web Client application
• Hardware
–Server: HP ProLiant ML370 Tower Server - 1 x
Xeon 2.4GHz - 2 Processor Support - 4 GB 1TB HDD
- DVD-Writer - Serial Attached SCSI RAID Support
Controller - Gigabit Ethernet
– Flat Fingerprint Scanner
• Designed for forensic-quality ten-print fingerprint capture
• Patented technology for quick and easy image capture and
enrollment
• Excellent choice for high-volume processing environments
• It delivers revolutionary enhanced definition capabilities in a
more compact unit.
• Advanced technologies like Moisture Discriminating
Optics™ and Clear Trace Imaging™ help capture more data
and better data for the highest fingerprint image quality in the
industry.
– Camera: High Definition Camera
– Time Attendant Management System
• Digital Clocking Biometrics Device
• Keeps attendance and Logged in files
– Biometrics ID Card System
• ID card based on searching criteria
• ID card Printer
– Access Control Integration System
• Access control interface
• Access control alarm
– Biometrics Automated Toolset( BAT)
• Hardware
– Rugged Laptop
– Hand-held wireless scanner
– Rugged Laptop Bag
Âť Anti-shock, Rugged and water proof Laptop case
Âť Weight absorber
Âť Fitted Spaces for Laptop and Flat Fingerprint Scanner
Âť Padded black nylon interior
Âť Innovative WideGrip interior strap
Âť Four handy inner compartments
– Mobile Rugged Integration
System: This is cataloguing for
"several classified databases" that
could be shared among
intelligence, law enforcement and
border control agencies
– The rugged laptop and its
attached scanners to "register"
prisoners, militants, hoodlums, th
ugs, high risk or susceptible
dangerous people then alert law
enforcers when one tries to enter
the country or cross a certain
classified area or military base.
– This Laptop presents a reliable biometrics system of highest
performance in its class along with the world's most rugged
design. With drop shock protection and a MIL-STD-810G and
IP65 certification, it's the undisputed leader in the fully-rugged
category. Its new Intel Core i5 / i3 processors, along with
available discrete graphics, deliver desktop-class performance
and improved video/3D graphics. It offers a 13.1" brilliant
1100 nit touchscreen available with CircuLumin
technology, integrated webcam and up to 10 hours of battery
life.
• End
• Hisplus Systems Limited

Weitere ähnliche Inhalte

Was ist angesagt? (12)

Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
Biometrics in banking lara and becky
Biometrics in banking lara and beckyBiometrics in banking lara and becky
Biometrics in banking lara and becky
 
Mooney Patent Summary
Mooney Patent SummaryMooney Patent Summary
Mooney Patent Summary
 
Practical pseudonymisationv4
Practical pseudonymisationv4Practical pseudonymisationv4
Practical pseudonymisationv4
 
E world e registration
E world e registrationE world e registration
E world e registration
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 
Access control
Access controlAccess control
Access control
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
 

Andere mochten auch

Enterprise Resource Planning Implementation Proposal
Enterprise Resource Planning Implementation ProposalEnterprise Resource Planning Implementation Proposal
Enterprise Resource Planning Implementation Proposal
Hisplus Systems Limited
 
ERP module
ERP moduleERP module
ERP module
rajnikant
 

Andere mochten auch (7)

Hisplus Forex
Hisplus ForexHisplus Forex
Hisplus Forex
 
Proposal on developing trade sector for economic growth
Proposal on developing trade sector for economic growthProposal on developing trade sector for economic growth
Proposal on developing trade sector for economic growth
 
Fundmentals of ICT in B2b on Telecomms Platform
Fundmentals of ICT in B2b on Telecomms PlatformFundmentals of ICT in B2b on Telecomms Platform
Fundmentals of ICT in B2b on Telecomms Platform
 
Ffint business entertainment services
Ffint business entertainment servicesFfint business entertainment services
Ffint business entertainment services
 
Enterprise Resource Planning Implementation Proposal
Enterprise Resource Planning Implementation ProposalEnterprise Resource Planning Implementation Proposal
Enterprise Resource Planning Implementation Proposal
 
Kindly
KindlyKindly
Kindly
 
ERP module
ERP moduleERP module
ERP module
 

Ähnlich wie Hisplus Biometrics

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology
NEHA SINGH
 
TEAMLIFTSS_RFID_Based_Asset_Management_System
TEAMLIFTSS_RFID_Based_Asset_Management_SystemTEAMLIFTSS_RFID_Based_Asset_Management_System
TEAMLIFTSS_RFID_Based_Asset_Management_System
Venkatesa Prasad
 

Ähnlich wie Hisplus Biometrics (20)

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
ShepHertz Facial recognition based attendance and visitor management system
ShepHertz Facial recognition based attendance and visitor management systemShepHertz Facial recognition based attendance and visitor management system
ShepHertz Facial recognition based attendance and visitor management system
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPSUSING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
 
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
TEAMLIFTSS_RFID_Based_Asset_Management_System
TEAMLIFTSS_RFID_Based_Asset_Management_SystemTEAMLIFTSS_RFID_Based_Asset_Management_System
TEAMLIFTSS_RFID_Based_Asset_Management_System
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io t
 
Intellectual Asset Protection - Case Study
Intellectual Asset Protection - Case StudyIntellectual Asset Protection - Case Study
Intellectual Asset Protection - Case Study
 
Orion Laboratory
Orion Laboratory Orion Laboratory
Orion Laboratory
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptions
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 

Mehr von Hisplus Systems Limited

Afro asia presentation
Afro asia presentation Afro asia presentation
Afro asia presentation
Hisplus Systems Limited
 

Mehr von Hisplus Systems Limited (7)

e-library management system
e-library management systeme-library management system
e-library management system
 
Afro asia presentation
Afro asia presentation Afro asia presentation
Afro asia presentation
 
State elearning proposal
State elearning proposalState elearning proposal
State elearning proposal
 
School digital library general
School digital library generalSchool digital library general
School digital library general
 
Polmot main 2012 general
Polmot main  2012 generalPolmot main  2012 general
Polmot main 2012 general
 
Banker
BankerBanker
Banker
 
Hisplus systems limited company profile
Hisplus systems limited company profileHisplus systems limited company profile
Hisplus systems limited company profile
 

KĂźrzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

KĂźrzlich hochgeladen (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Hisplus Biometrics

  • 1. Biometrics Identification and Registration System by Hisplus Systems Limited info@hisplus.net Tel: +234-805-5075-777
  • 2. • Hisplus Integrated Automated Identification Biometrics System for registration, identification and verification processes. • It uses face scan and all the ten fingerprints scan to ensure high level of accuracy for identification. • Our biometrics technology authenticates an individual's identity automatically and has automatic fingerprint identification, which matches a fingerprint taken with a print from a database.
  • 3. • Civil Servant Identification Processing / Time and Attendant Management. – To track the way workers spend their time in various capacities and the ability to keep track of attendance. – Attendant Management for Payroll – Employee Time Attendance Recording System – Biometric door control with time attendance system • Physical Access Control – Applications are in access control devices for doors and restricted and areas. – Areas where authorization is needed to again access. – Also where computers with highly confidential and important information or high level network access is necessary.
  • 4. • Border, Airport and Immigration Control – Identification and Registration. – Terrorist / Criminals profiling. – Mobile Biometrics • Justice and Law Enforcement – For prison administration and bookings, crime scene identification. – National / State identity programs. – Criminals / Militants Profiling. – Management of personnel, lawyers, offenders and witnesses.
  • 5. • Healthcare Biometrics – Biometrics Medical Records System – Biometrics Healthcare Identity Management. – Data access and retrieval System • Mobile Biometrics – For law enforcement, to military, public transportation, border control, and commercial authorities. – To speed up processing of people and goods. – For passport processing and voter registration – To speed up the identification of individuals in-the field, saving time, resources and quickly identifying threats. – Mobile employee time-keeping, access control and security system for businesses to improve productivity, and reduce loss & waste.
  • 6. • For identification processes for security reasons. • For verification processes. • For registration purposes • For access control. • For ID card production • Terrorist Identification • For Integrated Automated Fingerprint Identification System • To protect military bases and monitor inmates at detention centers • Registration, Verification and Identification of "watch list" of suspects
  • 7. • It will help in identity for a payroll cheque Bearer • This biometric technology will help to check something to ensure the individual is who he says he is. • Biometrics Identification for friendly residents from insurgents and terrorists, • Identifying potential combatants in the field • To track militants.
  • 8. • Offices and Residential Identification System • For identification at internal checkpoints and border crossings • To scrutinize those applying for government • For foreign mission postings and special assignments • High Security Risk Personnel Identification • Time and attendance management system • Portable biometrics verifications and identification for field / foot soldiers
  • 9. • Enrollment Station Module – It is a biometric enrollment application to enroll a user’s Face. – It gathers biometric samples, extract biometric template information from them, and send extracted template matching to Multi-Biometric Matching Engine to check for duplicates before allowing the enrollment process to succeed. • Server Management System. – It is a repository for various biometric data collected during the enrollment or registration process.
  • 10. – It receives request through the search interface and send the relevant biometric templates for backend matching via the Multi-Biometric Matching Engine. – This server also provides role-based functional access. – Server Database is used to store user profiles including user details and biometric data.
  • 11. • Multi-biometric Matching Engine – It searches with various attributes like finger print, face print, name, date of birth, face marks, physical disabilities, LGA, state of origin, height range etc – It produces multiple results from search characteristics. – To record eye scans, fingerprints and facial images
  • 12.
  • 13. • Software – Server application • Identification and Verification System – This is for registration with different criterial ranging from personal profile like age, height, colour (eyes, hair, body), LGA, state, tribal marks, Blood group, face shape and other special attributes – Face and fingerprints( 1 – 10) scan registration. • Criteria Searching System – Searching that leads to task or operation. – Range Searching – Face, Finger print scan searching – Mobile Client application – Web Client application
  • 14. • Hardware –Server: HP ProLiant ML370 Tower Server - 1 x Xeon 2.4GHz - 2 Processor Support - 4 GB 1TB HDD - DVD-Writer - Serial Attached SCSI RAID Support Controller - Gigabit Ethernet – Flat Fingerprint Scanner • Designed for forensic-quality ten-print fingerprint capture • Patented technology for quick and easy image capture and enrollment • Excellent choice for high-volume processing environments • It delivers revolutionary enhanced definition capabilities in a more compact unit.
  • 15. • Advanced technologies like Moisture Discriminating Optics™ and Clear Trace Imaging™ help capture more data and better data for the highest fingerprint image quality in the industry. – Camera: High Definition Camera – Time Attendant Management System • Digital Clocking Biometrics Device • Keeps attendance and Logged in files – Biometrics ID Card System • ID card based on searching criteria • ID card Printer – Access Control Integration System • Access control interface • Access control alarm
  • 16. – Biometrics Automated Toolset( BAT) • Hardware – Rugged Laptop – Hand-held wireless scanner – Rugged Laptop Bag Âť Anti-shock, Rugged and water proof Laptop case Âť Weight absorber Âť Fitted Spaces for Laptop and Flat Fingerprint Scanner Âť Padded black nylon interior Âť Innovative WideGrip interior strap Âť Four handy inner compartments
  • 17. – Mobile Rugged Integration System: This is cataloguing for "several classified databases" that could be shared among intelligence, law enforcement and border control agencies – The rugged laptop and its attached scanners to "register" prisoners, militants, hoodlums, th ugs, high risk or susceptible dangerous people then alert law enforcers when one tries to enter the country or cross a certain classified area or military base.
  • 18. – This Laptop presents a reliable biometrics system of highest performance in its class along with the world's most rugged design. With drop shock protection and a MIL-STD-810G and IP65 certification, it's the undisputed leader in the fully-rugged category. Its new Intel Core i5 / i3 processors, along with available discrete graphics, deliver desktop-class performance and improved video/3D graphics. It offers a 13.1" brilliant 1100 nit touchscreen available with CircuLumin technology, integrated webcam and up to 10 hours of battery life.
  • 19.
  • 20.
  • 21. • End • Hisplus Systems Limited