SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Biometrics Identification and
Registration System
by
Hisplus Systems Limited
info@hisplus.net
Tel: +234-805-5075-777
• Hisplus Integrated Automated Identification
Biometrics System for registration, identification
and verification processes.
• It uses face scan and all the ten fingerprints scan to
ensure high level of accuracy for identification.
• Our biometrics technology authenticates an
individual's identity automatically and has
automatic fingerprint identification, which matches
a fingerprint taken with a print from a database.
• Civil Servant Identification Processing / Time and
Attendant Management.
– To track the way workers spend their time in various
capacities and the ability to keep track of attendance.
– Attendant Management for Payroll
– Employee Time Attendance Recording System
– Biometric door control with time attendance system
• Physical Access Control
– Applications are in access control devices for doors and
restricted and areas.
– Areas where authorization is needed to again access.
– Also where computers with highly confidential and
important information or high level network access is
necessary.
• Border, Airport and Immigration Control
– Identification and Registration.
– Terrorist / Criminals profiling.
– Mobile Biometrics
• Justice and Law Enforcement
– For prison administration and bookings, crime scene
identification.
– National / State identity programs.
– Criminals / Militants Profiling.
– Management of personnel, lawyers, offenders and
witnesses.
• Healthcare Biometrics
– Biometrics Medical Records System
– Biometrics Healthcare Identity Management.
– Data access and retrieval System
• Mobile Biometrics
– For law enforcement, to military, public transportation,
border control, and commercial authorities.
– To speed up processing of people and goods.
– For passport processing and voter registration
– To speed up the identification of individuals in-the field,
saving time, resources and quickly identifying threats.
– Mobile employee time-keeping, access control and security
system for businesses to improve productivity, and reduce
loss & waste.
• For identification processes for security reasons.
• For verification processes.
• For registration purposes
• For access control.
• For ID card production
• Terrorist Identification
• For Integrated Automated Fingerprint Identification
System
• To protect military bases and monitor inmates at
detention centers
• Registration, Verification and Identification of "watch
list" of suspects
• It will help in identity for a
payroll cheque Bearer
• This biometric technology
will help to check something
to ensure the individual is
who he says he is.
• Biometrics Identification for
friendly residents from
insurgents and terrorists,
• Identifying potential
combatants in the field
• To track militants.
• Offices and Residential Identification
System
• For identification at internal checkpoints
and border crossings
• To scrutinize those applying for government
• For foreign mission postings and special
assignments
• High Security Risk Personnel Identification
• Time and attendance management system
• Portable biometrics verifications and
identification for field / foot soldiers
• Enrollment Station Module
– It is a biometric enrollment application to enroll a
user’s Face.
– It gathers biometric samples, extract biometric
template information from them, and send extracted
template matching to Multi-Biometric Matching
Engine to check for duplicates before allowing the
enrollment process to succeed.
• Server Management System.
– It is a repository for various biometric data collected
during the enrollment or registration process.
– It receives request through the search interface and
send the relevant biometric templates for backend
matching via the Multi-Biometric Matching
Engine.
– This server also provides role-based functional
access.
– Server Database is used to store user profiles
including user details and biometric data.
• Multi-biometric Matching Engine
– It searches with various attributes like finger print,
face print, name, date of birth, face marks, physical
disabilities, LGA, state of origin, height range etc
– It produces multiple results from search
characteristics.
– To record eye scans, fingerprints and facial images
• Software
– Server application
• Identification and Verification System
– This is for registration with different criterial
ranging from personal profile like age, height,
colour (eyes, hair, body), LGA, state, tribal
marks, Blood group, face shape and other
special attributes
– Face and fingerprints( 1 – 10) scan
registration.
• Criteria Searching System
– Searching that leads to task or operation.
– Range Searching
– Face, Finger print scan searching
– Mobile Client application
– Web Client application
• Hardware
–Server: HP ProLiant ML370 Tower Server - 1 x
Xeon 2.4GHz - 2 Processor Support - 4 GB 1TB HDD
- DVD-Writer - Serial Attached SCSI RAID Support
Controller - Gigabit Ethernet
– Flat Fingerprint Scanner
• Designed for forensic-quality ten-print fingerprint capture
• Patented technology for quick and easy image capture and
enrollment
• Excellent choice for high-volume processing environments
• It delivers revolutionary enhanced definition capabilities in a
more compact unit.
• Advanced technologies like Moisture Discriminating
Optics™ and Clear Trace Imaging™ help capture more data
and better data for the highest fingerprint image quality in the
industry.
– Camera: High Definition Camera
– Time Attendant Management System
• Digital Clocking Biometrics Device
• Keeps attendance and Logged in files
– Biometrics ID Card System
• ID card based on searching criteria
• ID card Printer
– Access Control Integration System
• Access control interface
• Access control alarm
– Biometrics Automated Toolset( BAT)
• Hardware
– Rugged Laptop
– Hand-held wireless scanner
– Rugged Laptop Bag
» Anti-shock, Rugged and water proof Laptop case
» Weight absorber
» Fitted Spaces for Laptop and Flat Fingerprint Scanner
» Padded black nylon interior
» Innovative WideGrip interior strap
» Four handy inner compartments
– Mobile Rugged Integration
System: This is cataloguing for
"several classified databases" that
could be shared among
intelligence, law enforcement and
border control agencies
– The rugged laptop and its
attached scanners to "register"
prisoners, militants, hoodlums, th
ugs, high risk or susceptible
dangerous people then alert law
enforcers when one tries to enter
the country or cross a certain
classified area or military base.
– This Laptop presents a reliable biometrics system of highest
performance in its class along with the world's most rugged
design. With drop shock protection and a MIL-STD-810G and
IP65 certification, it's the undisputed leader in the fully-rugged
category. Its new Intel Core i5 / i3 processors, along with
available discrete graphics, deliver desktop-class performance
and improved video/3D graphics. It offers a 13.1" brilliant
1100 nit touchscreen available with CircuLumin
technology, integrated webcam and up to 10 hours of battery
life.
• End
• Hisplus Systems Limited

Weitere ähnliche Inhalte

Was ist angesagt? (12)

Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
Biometrics in banking lara and becky
Biometrics in banking lara and beckyBiometrics in banking lara and becky
Biometrics in banking lara and becky
 
Mooney Patent Summary
Mooney Patent SummaryMooney Patent Summary
Mooney Patent Summary
 
Practical pseudonymisationv4
Practical pseudonymisationv4Practical pseudonymisationv4
Practical pseudonymisationv4
 
E world e registration
E world e registrationE world e registration
E world e registration
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 
Access control
Access controlAccess control
Access control
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
 

Andere mochten auch

Enterprise Resource Planning Implementation Proposal
Enterprise Resource Planning Implementation ProposalEnterprise Resource Planning Implementation Proposal
Enterprise Resource Planning Implementation Proposal
Hisplus Systems Limited
 

Andere mochten auch (7)

Hisplus Forex
Hisplus ForexHisplus Forex
Hisplus Forex
 
Proposal on developing trade sector for economic growth
Proposal on developing trade sector for economic growthProposal on developing trade sector for economic growth
Proposal on developing trade sector for economic growth
 
Fundmentals of ICT in B2b on Telecomms Platform
Fundmentals of ICT in B2b on Telecomms PlatformFundmentals of ICT in B2b on Telecomms Platform
Fundmentals of ICT in B2b on Telecomms Platform
 
Ffint business entertainment services
Ffint business entertainment servicesFfint business entertainment services
Ffint business entertainment services
 
Enterprise Resource Planning Implementation Proposal
Enterprise Resource Planning Implementation ProposalEnterprise Resource Planning Implementation Proposal
Enterprise Resource Planning Implementation Proposal
 
Kindly
KindlyKindly
Kindly
 
ERP module
ERP moduleERP module
ERP module
 

Ähnlich wie Hisplus Biometrics

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology
NEHA SINGH
 
TEAMLIFTSS_RFID_Based_Asset_Management_System
TEAMLIFTSS_RFID_Based_Asset_Management_SystemTEAMLIFTSS_RFID_Based_Asset_Management_System
TEAMLIFTSS_RFID_Based_Asset_Management_System
Venkatesa Prasad
 

Ähnlich wie Hisplus Biometrics (20)

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
ShepHertz Facial recognition based attendance and visitor management system
ShepHertz Facial recognition based attendance and visitor management systemShepHertz Facial recognition based attendance and visitor management system
ShepHertz Facial recognition based attendance and visitor management system
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPSUSING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
 
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
TEAMLIFTSS_RFID_Based_Asset_Management_System
TEAMLIFTSS_RFID_Based_Asset_Management_SystemTEAMLIFTSS_RFID_Based_Asset_Management_System
TEAMLIFTSS_RFID_Based_Asset_Management_System
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io t
 
Intellectual Asset Protection - Case Study
Intellectual Asset Protection - Case StudyIntellectual Asset Protection - Case Study
Intellectual Asset Protection - Case Study
 
Orion Laboratory
Orion Laboratory Orion Laboratory
Orion Laboratory
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptions
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 

Mehr von Hisplus Systems Limited

Afro asia presentation
Afro asia presentation Afro asia presentation
Afro asia presentation
Hisplus Systems Limited
 

Mehr von Hisplus Systems Limited (7)

e-library management system
e-library management systeme-library management system
e-library management system
 
Afro asia presentation
Afro asia presentation Afro asia presentation
Afro asia presentation
 
State elearning proposal
State elearning proposalState elearning proposal
State elearning proposal
 
School digital library general
School digital library generalSchool digital library general
School digital library general
 
Polmot main 2012 general
Polmot main  2012 generalPolmot main  2012 general
Polmot main 2012 general
 
Banker
BankerBanker
Banker
 
Hisplus systems limited company profile
Hisplus systems limited company profileHisplus systems limited company profile
Hisplus systems limited company profile
 

Kürzlich hochgeladen

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Kürzlich hochgeladen (20)

TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 

Hisplus Biometrics

  • 1. Biometrics Identification and Registration System by Hisplus Systems Limited info@hisplus.net Tel: +234-805-5075-777
  • 2. • Hisplus Integrated Automated Identification Biometrics System for registration, identification and verification processes. • It uses face scan and all the ten fingerprints scan to ensure high level of accuracy for identification. • Our biometrics technology authenticates an individual's identity automatically and has automatic fingerprint identification, which matches a fingerprint taken with a print from a database.
  • 3. • Civil Servant Identification Processing / Time and Attendant Management. – To track the way workers spend their time in various capacities and the ability to keep track of attendance. – Attendant Management for Payroll – Employee Time Attendance Recording System – Biometric door control with time attendance system • Physical Access Control – Applications are in access control devices for doors and restricted and areas. – Areas where authorization is needed to again access. – Also where computers with highly confidential and important information or high level network access is necessary.
  • 4. • Border, Airport and Immigration Control – Identification and Registration. – Terrorist / Criminals profiling. – Mobile Biometrics • Justice and Law Enforcement – For prison administration and bookings, crime scene identification. – National / State identity programs. – Criminals / Militants Profiling. – Management of personnel, lawyers, offenders and witnesses.
  • 5. • Healthcare Biometrics – Biometrics Medical Records System – Biometrics Healthcare Identity Management. – Data access and retrieval System • Mobile Biometrics – For law enforcement, to military, public transportation, border control, and commercial authorities. – To speed up processing of people and goods. – For passport processing and voter registration – To speed up the identification of individuals in-the field, saving time, resources and quickly identifying threats. – Mobile employee time-keeping, access control and security system for businesses to improve productivity, and reduce loss & waste.
  • 6. • For identification processes for security reasons. • For verification processes. • For registration purposes • For access control. • For ID card production • Terrorist Identification • For Integrated Automated Fingerprint Identification System • To protect military bases and monitor inmates at detention centers • Registration, Verification and Identification of "watch list" of suspects
  • 7. • It will help in identity for a payroll cheque Bearer • This biometric technology will help to check something to ensure the individual is who he says he is. • Biometrics Identification for friendly residents from insurgents and terrorists, • Identifying potential combatants in the field • To track militants.
  • 8. • Offices and Residential Identification System • For identification at internal checkpoints and border crossings • To scrutinize those applying for government • For foreign mission postings and special assignments • High Security Risk Personnel Identification • Time and attendance management system • Portable biometrics verifications and identification for field / foot soldiers
  • 9. • Enrollment Station Module – It is a biometric enrollment application to enroll a user’s Face. – It gathers biometric samples, extract biometric template information from them, and send extracted template matching to Multi-Biometric Matching Engine to check for duplicates before allowing the enrollment process to succeed. • Server Management System. – It is a repository for various biometric data collected during the enrollment or registration process.
  • 10. – It receives request through the search interface and send the relevant biometric templates for backend matching via the Multi-Biometric Matching Engine. – This server also provides role-based functional access. – Server Database is used to store user profiles including user details and biometric data.
  • 11. • Multi-biometric Matching Engine – It searches with various attributes like finger print, face print, name, date of birth, face marks, physical disabilities, LGA, state of origin, height range etc – It produces multiple results from search characteristics. – To record eye scans, fingerprints and facial images
  • 12.
  • 13. • Software – Server application • Identification and Verification System – This is for registration with different criterial ranging from personal profile like age, height, colour (eyes, hair, body), LGA, state, tribal marks, Blood group, face shape and other special attributes – Face and fingerprints( 1 – 10) scan registration. • Criteria Searching System – Searching that leads to task or operation. – Range Searching – Face, Finger print scan searching – Mobile Client application – Web Client application
  • 14. • Hardware –Server: HP ProLiant ML370 Tower Server - 1 x Xeon 2.4GHz - 2 Processor Support - 4 GB 1TB HDD - DVD-Writer - Serial Attached SCSI RAID Support Controller - Gigabit Ethernet – Flat Fingerprint Scanner • Designed for forensic-quality ten-print fingerprint capture • Patented technology for quick and easy image capture and enrollment • Excellent choice for high-volume processing environments • It delivers revolutionary enhanced definition capabilities in a more compact unit.
  • 15. • Advanced technologies like Moisture Discriminating Optics™ and Clear Trace Imaging™ help capture more data and better data for the highest fingerprint image quality in the industry. – Camera: High Definition Camera – Time Attendant Management System • Digital Clocking Biometrics Device • Keeps attendance and Logged in files – Biometrics ID Card System • ID card based on searching criteria • ID card Printer – Access Control Integration System • Access control interface • Access control alarm
  • 16. – Biometrics Automated Toolset( BAT) • Hardware – Rugged Laptop – Hand-held wireless scanner – Rugged Laptop Bag » Anti-shock, Rugged and water proof Laptop case » Weight absorber » Fitted Spaces for Laptop and Flat Fingerprint Scanner » Padded black nylon interior » Innovative WideGrip interior strap » Four handy inner compartments
  • 17. – Mobile Rugged Integration System: This is cataloguing for "several classified databases" that could be shared among intelligence, law enforcement and border control agencies – The rugged laptop and its attached scanners to "register" prisoners, militants, hoodlums, th ugs, high risk or susceptible dangerous people then alert law enforcers when one tries to enter the country or cross a certain classified area or military base.
  • 18. – This Laptop presents a reliable biometrics system of highest performance in its class along with the world's most rugged design. With drop shock protection and a MIL-STD-810G and IP65 certification, it's the undisputed leader in the fully-rugged category. Its new Intel Core i5 / i3 processors, along with available discrete graphics, deliver desktop-class performance and improved video/3D graphics. It offers a 13.1" brilliant 1100 nit touchscreen available with CircuLumin technology, integrated webcam and up to 10 hours of battery life.
  • 19.
  • 20.
  • 21. • End • Hisplus Systems Limited