Worldwide markets are poised to achieve significant growth. As people use electronics in their personal life more, protection of individual information becomes a more compelling problem. Biometrics devices protect individual information.

Biometric identity units provide security protection. Units are comprised of integrated biometric capture devices. Biometrics is used to identify anyone in an accurate, repeatable manner. Physiological characteristics used for biometrics commonly include the face, fingerprints, and DNA. Behavioral characteristics include the user’s digital signature, his or her voiceprint, and walk.

As law enforcement programs are redesigned to include information from social media and to initiate smarter cities initiatives, biometrics becomes a more compelling technology, both fingerprinting and facial recognition. Technologies. With the worldwide rise in the threat of terror, biometric systems become a more compelling tool in the hands of the authorities charged with keeping populations safe.

A rise in government projects has been seen as terrorists become an increasing threat. This has been accompanied by increasing data security concerns. There is a need for advanced security devices. Security systems implementations drive the market for biometric systems. Biometric data protection is being used to replace photographs, passwords and PIN codes.

Growth of biometric technologies has been in response to global security threats. Terrorist attacks, airport security initiatives, and attempts to lower crime rates have brought an increasing investment in biometric security systems. Government projects include ePassports, eDriving licenses, border management, and national IDs. These initiatives have been implemented in developed countries.

India, Mexico and Russia are driving the extraordinary growth of biometric systems. China has a biometric national ID program that commenced in 2013. Computer storage of important documents has created an increasing need for biometric security systems.

The global biometrics market is at $5.2 billion in 2012 anticipated to reach $16.7 billion by 2019. Market growth is a result of demand for protection of individual information and for the needs of organization to control access to documents and to areas.

According to Susan Eustis, lead author of the WinterGreen Research team that prepared the study, “Biometric devices represent a major factor impacting law enforcement and border patrol markets. Governments and law enforcement agencies are leveraging biometric devices to strengthen all aspects of citizen protection. Healthcare organizations are implementing biometric systems to provide patient privacy.”

WinterGreen Research is an independent research organization funded by the sale of market research studies all over the world and by the implementation of ROI models that are used to calculate the total cost of ownership of equipment, services, and software. The company has 35 distributors worldwide, including Global Information Info Shop, Market Research.com, Research and Markets, Bloomberg, and Thompson Financial.

WinterGreen Research is positioned to help customers face challenges that define the modern enterprises. The increasingly global nature of science, technology and engineering is a reflection of the implementation of the globally integrated enterprise. Customers trust WinterGreen Research to work alongside them to ensure the success of the participation in a particular market segment.

WinterGreen Research supports various market segment programs; provides trusted technical services to the marketing departments. It carries out accurate market share and forecast analysis services for a range of commercial and government customers globally. These are all vital market research support solutions requiring trust and integrity.

Report Methodology

This is the 576th report in a series of primary market research reports that provide forecasts in communications, telecommunications, the Internet, computer, software, telephone equipment, health equipment, and energy. Automated process and significant growth potential are a priority in topic selection. The project leaders take direct responsibility for writing and preparing each report. They have significant experience preparing industry studies.


They are supported by a team, each person with specific research tasks and proprietary automated process database analytics. Forecasts are based on primary research and proprietary data bases.

The primary research is conducted by talking to customers, distributors and companies. The survey data is not enough to make accurate assessment of market size, so WinterGreen Research looks at the value of shipments and the average price to achieve market assessments. Our track record in achieving accuracy is unsurpassed in the industry. We are known for being able to develop accurate market shares and projections. This is our specialty.

The analyst process is concentrated on getting good market numbers. This process involves looking at the markets from several different perspectives, including vendor shipments. The interview process is an essential aspect as well. We do have a lot of granular analysis of the different shipments by vendor in the study and addenda prepared after the study was published if that is appropriate.

Forecasts reflect analysis of the market trends in the segment and related segments. Unit and dollar shipments are analyzed through consideration of dollar volume of each market participant in the segment. Installed base analysis and unit analysis is based on interviews and an information search. Market share analysis includes conversations with key customers of products, industry segment leaders, marketing directors, distributors, leading market participants, opinion leaders, and companies seeking to develop measurable market share.

Over 200 in depth interviews are conducted for each report with a broad range of key participants and industry leaders in the market segment. We establish accurate market forecasts based on economic and market conditions as a base. Use input/output ratios, flow charts, and other economic methods to quantify data. Use in-house analysts who meet stringent quality standards.

Interviewing key industry participants, experts and end-users is a central part of the study. Our research includes access to large proprietary databases. Literature search includes analysis of trade publications, government reports, and corporate literature.

Findings and conclusions of this report are based on information gathered from industry sources, including manufacturers, distributors, partners, opinion leaders, and users. Interview data was combined with information gathered through an extensive review of internet and printed sources such as trade publications, trade associations, company literature, and online databases. The projections contained in this report are checked from top down and bottom up analysis to be sure there is congruence from that perspective.


The base year for analysis and projection is 2012. With 2012 and several years prior to that as a baseline, market projections were developed for 2013 through 2019. These projections are based on a combination of a consensus among the opinion leader contacts interviewed combined with understanding of the key market drivers and their impact from a historical and analytical perspective.

The analytical methodologies used to generate the market estimates are based on penetration analyses, similar market analyses, and delta calculations to supplement independent and dependent variable analysis. All analyses are displaying selected descriptions of products and services.

This research includes referencde to an ROI model that is part of a series that provides IT systems financial planners access to information that supports analysis of all the numbers that impact management of a product launch or large and complex data center. The methodology used in the models relates to having a sophisticated analytical technique for understanding the impact of workload on processor consumption and cost.

WinterGreen Research has looked at the metrics and independent research to develop assumptions that reflect the actual anticipated usage and cost of systems. Comparative analyses reflect the input of these values into models.

The variables and assumptions provided in the market research study and the ROI models are based on extensive experience in providing research to large enterprise organizations and data centers. The ROI models have lists of servers from different manufacturers, Systems z models from IBM, and labor costs by category around the world.

This information has been developed from WinterGreen research proprietary data bases constructed as a result of preparing market research studies that address the software, energy, healthcare, telecommunicatons, and hardware businesses.

Table Of Contents

Table of Contents

BIOMETRICS AND BIOMETRIC FINGERPRINT EQUIPMENT EXECUTIVE SUMMARY 34

Biometrics and Biometric Fingerprint Equipment Market Driving Forces 34
Biometric Fingerprint Equipment Market Driving Forces 36
Biometrics Market Shares 39
Biometric Market Forecasts 40
Biometric Device Market Trends 42

BIOMETRICS AND BIOMETRIC FINGERPRINT EQUIPMENT MARKET DESCRIPTION AND MARKET DYNAMICS 45

1.1 Biometric Sensor Devices 45
1.1.1 Biometrics for Security and Management 46
1.1.2 Biometrics for Convenience 47
1.1.3 Biometric Systems Characteristics 47
1.1.4 Biometric Systems Hidden Expenses 49
1.2 Biometrics Industry Segments 49
1.2.1 Biometrics Are In Law Enforcement 50
1.2.2 Biometrics Personal Identity Verification 50
1.2.3 Biometrics Increase Security 52
1.2.4 Financial Institutions Use Biometrics 54
1.2.5 Law Enforcement Uses Biometrics 54
1.2.6 Immigration Uses Biometrics 55
1.2.7 Social Services Use Biometrics 55
1.2.8 Airports Use Biometrics 55
1.2.9 Healthcare Use Biometrics 55
1.2.10 Consumer Use Biometrics 56
1.3 Applications for Biometrics 58
1.3.1 Casino Facial Recognition Capability 59
1.4 Store and Forward Systems 59
1.5 Mobile Identification Systems 60
1.5.1 Fingerprint Recognition 61
1.6 Human Mechanism To Distinguish Between Human Faces 62
1.6.1 Identifying People From Their Iris 62
1.6.2 Authenticating a User 63
1.7 Fingerprint Scanner 65
1.8 Gesture-Interfaces 65
1.8.1 Biometric Components of Signatures 66
1.9 Risks in Biometric-Based Authentication 66
1.10 Multi-Factor Authentication Solutions 69
1.11 Biometrics Automated Technique 69
1.12 Security of Input Mechanism 70
1.13 Digital Data Security 71
1.13.1 Security Issues 72
1.14 Global Economy 73
1.14.1 The IT Market 75
1.14.2 New World Order Built On The Globally Integrated Enterprise 75
1.15 Enterprise Information Accessed By Mobile Workers 77
1.15.1 Cloud Technology Brings Rapid Time to Value 78
1.16 Application Server Virtual Systems, Clustering, Fail-Over, And Load Balancing 79
1.16.1 Cloud System Continuous Deployment Models 81

2. WIRELESS CAR CHARGERS MARKET SHARES AND MARKET FORECASTS 84

2.1 Biometrics and Biometric Fingerprint Equipment Market Driving Forces 84
2.1.1 Biometric Fingerprint Equipment Market Driving Forces 87
2.2 Biometrics Market Shares 90
2.2.1 NEC 93
2.2.2 NEC 94
2.2.3 Sagem Morpho 96
2.2.4 3M/Cogent Systems 97
2.2.5 3M Cogent Systems CAFISâ„¢ 97
2.2.6 3M / Cogent 98
2.2.7 Motorola 98
2.2.8 Francisco Partners / Cross Match SEEK® Avenger 100
2.2.9 Francisco Partners / CrossMatch 101
2.2.10 Avalon Biometrics 102
2.2.11 DigitalPersona 102
2.2.12 Apple / AuthenTec / UPEK 102
2.2.13 BIO-key 103
2.2.14 Suprema 104
2.2.15 Suprema 104
2.2.16 eKey 104
2.2.17 Vision-Box 105
2.2.18 EgisTec 105
2.2.19 CIC Electronic Signature Competition 105
2.3 Biometric Market Forecasts 106
2.3.1 Biometric Device Market Trends 108
2.3.2 Fingerprint Biometrics 122
2.3.3 Non-Automated Fingerprint Identification Systems 122
2.3.4 Automated Fingerprint Identification Systems (AFIS) 126
2.3.5 National ID Control Biometrics 131
2.3.6 Facial Recognition Biometric Technologies Market Shares and Forecast 132
5.1.1 Cross Match Technologies Incorporates NEC’s Facial Recognition in SEEK 134
2.3.7 Voice Recognition Biometric Technologies Market Forecast 135
2.3.8 Workplace Access Fingerprint Biometrics 136
2.3.9 Healthcare Biometrics 136
2.3.10 Mobile Phone Biometrics Market Forecasts 138
2.3.11 Electronic Signature, Digital Signature, Signature Verification 139
2.3.12 Biometric Readers Market 139
2.3.13 Financial: 140
2.3.14 Consumer 140
2.3.15 Commercial Biometric Fingerprint Markets 141
2.4 Large Biometric Market Segments 141
2.4.1 Airport Screening / Facial Recognition 143
2.5 Mid Range Biometric Reader Markets 145
2.5.1 Commercial Biometric Fingerprint Markets 147
2.6 Biometric Sensors 147
2.6.1 Fingerprint Cards 149
2.6.2 Apple / Authentec 151
2.6.3 SAIC 153
2.7 Biometrics Device and Sensor Market Forecasts 157
2.7.1 Biometric Sensors for Law Enforcement 157
2.7.2 Government: 158
2.8 Biometric, Smart Card And PKI Technologies 160
2.9 Biometric Equipment Prices 160
2.9.1 Biometric Fingerprint Equipment Prices 160
2.9.2 Biometric Facial Recognition Equipment 169
2.9.3 Biometric Sensors 169
2.10 Biometric Fingerprint Equipment Regional Market Analysis 169

3. BIOMETRICS PRODUCT DESCRIPTION 173

3.1 NEC Hybrid Finger Identification 173
3.1.1 NEC Fingerprint Identification 174
3.1.2 NEC Fingerprint Biometrics Accuracy 174
3.1.3 NEC Finger Print Matching Smart Analytics 176
3.1.4 NEC Fingerprint Recognition Minutiae and Related Method 177
3.1.5 NEC Fingerprint Matching Processor (FMP) 179
3.1.6 NEC Multi-Biometrics 180
3.1.7 NEC Portable DNA Analyzer 181
3.2 Safran Morpho Identity Management 187
3.2.1 Safran Morpho Supports Compliance with standards 188
3.2.2 Safron Morpho MorphoCivisâ„¢ 190
3.2.3 Safran Morpho Systemâ„¢ 191
3.2.4 Safron Morpho MorphoPerso 192
3.2.5 Safran Morpho ID Documents Uniqueness Protections 193
3.2.6 Safron Morpho MorphoCheckâ„¢ 194
3.2.7 Safron Morpho MorphoRapIDâ„¢ 195
3.2.8 Safron Morpho MorphoTouchâ„¢ 1200 Series 196
3.2.9 Safron Morpho MorphoBIS 197
3.2.10 Safron Morpho MetaMorpho 200
3.2.11 Safran Morpho Secure Biometric Multibiometric Reader 201
3.2.12 Safran Morpho Outdoor MorphoAccess® 500 Series 202
3.2.13 Safran Morpho Border Control 203
3.2.14 Safran Morpho Border Automated Control 204
3.2.15 Safran Morpho Border Semi-Automatic Control Booths 204
3.2.16 Safran Morpho Border Mobile Control Terminal 204
3.2.17 Safran Morpho Secure Biometric Access 205
3.2.18 Safran Morpho / Bioscrypt 205
3.3 Cross Match 206
3.3.1 Cross Match Technologies Incorporates NEC’s Facial Recognition in SEEK 207
3.3.2 Cross Match SEEK® II 208
3.3.3 Cross Match SEEK® Avenger 209
3.3.4 Cross Match Guardian® 212
3.3.5 Cross Match Patrol ID / Patrol 213
3.3.6 Cross Match L SCAN® 1000T 215
3.3.7 Cross Match Verifier® 300 LC 2.0 216
3.4 3M/Cogent Systems 217
3.4.1 3M Cogent Systems CAFISâ„¢ 217
3.4.2 3M Cogent Systems CAPFISâ„¢ 220
3.4.3 3M Cogent Systems Multi-Biometric Enrollment Station (CBES) 223
3.4.4 3M Cogent Systems Biometric Registration Software (BRS) 225
3.5 Motorola Solutions 226
3.5.1 Motorola Identity Management 227
3.5.2 Motorola Multi-Biometric Enrollment 228
3.5.3 Motorola Multi-Biometric Verification 229
3.5.4 Motorola Multi-Biometric Capture and Verification Peripherals 229
3.5.5 Motorola Biometircs Use in Document Central Registry 230
3.5.6 Motorola Biometircs Use in Data Preparation and Key Management 230
3.5.7 Motorola Biometircs Use in Personalization Servers 230
3.5.8 Biometric Identification Solution (BIS) 230
3.5.9 Motorola Mobile Biometric Identification 232
3.6 Intel Healthcare 236
3.7 BIO-key Healthcare 236
3.7.1 BIO-key Large Scale ID 238
3.7.2 BIO-key for End Users 239
3.7.3 BIO-key BSP ( Biometric Service Provider) 240
3.7.4 BIO-key International's BSP Advantages 241
3.7.5 BIO-key Finger-based Biometric Identification and Personal Identity Verification 244
3.8 Precise Biometrics Tactivo 247
3.8.1 Precise Tactivo for iPhone 248
3.8.2 Precise Tactivo for iPad 249
3.8.3 Precise Tactivo Mini for Android 249
3.8.4 Precise Biometrics Easy App Integration 249
3.8.5 Precise Biometrics Smart Card Government Compliance 250
3.8.6 Precise Match-on-Card for National ID 250
3.8.7 Precise U.S. Government Solutions 252
3.8.8 Precise Enterprise Solutions for Secure Sign-On 254
3.8.9 Precise Biometrics Reduces Risk And Cost 255
3.8.10 Precise Secure Mobile Authentication for Enterprise 256
3.8.11 Precise Match-on-Card for Enterprise Solutions 258
3.8.12 Precise Biometrics Flexible Solution 259
3.8.13 Precise Biometrics Customization 259
3.8.14 Precise Partner Solutions 259
3.9 DigitalPersona 260
3.9.1 DigitalPersona Biometrics, Multi-Factor Authentication and Access Management 261
3.9.2 DigitalPersona Pro Enterprise 263
3.9.3 DigitalPersona Fingerprint Biometrics 264
3.9.4 DigitalPersona 5160 Fingerprint Reader 264
3.9.5 DigitalPersona, Inc. UPEK TouchChip TCRU1C 265
3.9.6 DigitalPersona, ikonTouch 700 267
3.9.7 DigitalPersona, Inc. ikonTouch 700 267
3.10 Fujitsu 269
3.10.1 Fujitsu PalmSecureâ„¢ 269
3.10.2 Fujitsu PalmEntryâ„¢ Access Control System 271
3.10.3 Fujitsu PalmSecure Vein Recognition Technology 274
3.10.4 Fujitsu Med-Serv 50 276
3.11 Labcal India 279
3.11.1 Labcal Be.U Mobile Series 279
3.11.2 Labcal Applications for the Be.U Mobile 280
3.12 SecuGen 282
3.12.1 SecuGen Hamster Plus 283
3.12.2 SecuGen Hamster IV 285
3.12.3 Benefits of Using SecuGen Peripherals 286
3.12.4 SecuGen OptiMouse Plus 287
3.13 NitGen and Company 289
3.13.1 NitGen NAC-5000 289
3.13.2 NitGen FINGKEY ACCESS Plus 290
3.13.3 NitGen NAC-2500 Plus 291
3.13.4 NitGen Access Manager Pro 292
3.13.5 NitGen FIM Module 293
3.14 Atmel 294
3.15 CSC 295
3.15.1 CSC Identity Management Trusted Enterprise Suite 296
3.16 Accu-Time Systems 298
3.16.1 Accu-Time Systems Optimus2 299
3.16.2 Accu-Time Systems AccuTouch 301
3.16.3 Accu-Time Systems Maximus 303
3.16.4 Accu-Time Systems Prodigy 305
3.17 Avalon Biometrics 306
3.17.1 Avalon MVT - Mobile Application Suite - Enrolment / Verification / Identification terminal 307
3.18 eKey 308
3.18.1 ekey home - Stand-alone Solution 308
3.18.2 ekey Home Finger Scanner Wall-Mounted 309
3.18.3 ekey Home Finger Scanner FSB 310
3.18.4 ekey Multi - Extended Stand-Alone Solution 311
3.18.5 ekey Multi Finger Scanner Outlet-Mounted 312
3.18.6 ekey Net - Networkable Solution 313
3.18.7 ekey Logon Server 314
3.19 Green Bit 316
3.19.1 Green Bit Law Enforcement and P.A. 316
3.19.2 Green Bit Commercial Applications 317
3.19.3 Green Bit DactyMatch SDK 318
3.20 Fingerprints Card AB 319
3.20.1 Fingerprints FPC1011F3 Area 320
3.20.2 Fingerprints FPC1080A Swipe 322
3.20.3 Fingerprints FPC2020 324
3.21 Merkatum: Biometrics Security and ID 326
3.21.1 Merkatum emfiva F/FRS 326
3.21.2 Merkatum ELA Logical Authentication 327
3.22 Suprema328
3.22.1 Suprema RealScan G10 329
3.22.2 Suprema RealScan D 331
3.23 UnionCommunity / Virdi 332
3.23.1 VIRDI AC F100 332
3.23.2 ViRDI AC 5000 333
3.24 Aware 333
3.25 Zvetco Biometrics Products 335
3.26 Apple / AuthenTec 335
3.27 Tyco Integrated Security Biometrics 335
3.27.1 Tyco Facial Recognition Profile 337
3.28 EgisTec 340
3.28.1 EgisTec Image Quality 340
3.28.2 EgisTec Cloud 342
3.29 STMicroelectronics Biometric Solutions for Healthcare 345
3.29.1 STMicroelectronics Body Gateway 345
3.29.2 STMicroelectronics Lab-on-Chip 345
3.29.3 STMicroelectronics Pulse Generator for Ultrasound Imaging 346
3.29.4 STMicroelectronics’ Cooperation with French Start-ups and SMEs 346
2.10.1 ST Microelectronics (Finger-Scan) 348
3.30 SAIC 349
3.30.1 SAIC Voice Identity Biometrics Exploitation Services (VIBES) 349
3.30.2 SAIC Voice Biometrics Applications 350
3.31 Gemalto Avalon Biometrics Border Management 353
3.31.1 Gemalto Avalon Biometrics Document Verification of Travel and ID Documents 354

4. BIOMETRICS TECHNOLOGY 355

4.1 Enabling Biometric Fingerprint Technologies 355
4.1.1 Fingerprint Recognition 356
4.1.2 Fingerprint Technology 357
4.1.3 Fingerprint SDKs 357
4.1.4 Fingerprint Enabling Technology 358
4.1.5 Surface Texture Analysis 359
4.2 Facial Recognition: 359
4.2.1 Facial Recognition SDKs 360
4.2.2 Facial Recognition Uses 360
4.2.3 Face Recognition Biometric System Deployment Considerations 361
4.2.4 Face Recognition Technology 361
4.3 Iris Reading Algorithms 362
4.3.1 Iris Reading Accuracy 364
4.4 Biometrics Impact On Network Operations 365
4.5 Enrollment And Identification 366
4.6 Neural Networks 367
4.7 Security of Biometric ID Systems 367
4.8 Perceptual Computing and Apps Detect Heart Rate 369

5. BIOMETRICS COMPANY DESCRIPTION 370

5.1 Selected Biometric Industry Mergers and Acquisitions 370
5.1.1 Safran Acquisition of L-1 Identity Solutions Formed From A Merger of Visage Technology, Inc. and Identix 370
5.1.2 3M Acquisition of Cogent 370
5.1.3 Amano USA Holdings, Inc. (AUH) acquired ATS 371
5.1.4 Apple Acquired AuthenTec 371
5.1.5 AuthenTec Acquisitions of SafeNet’s Embedded Security Solution Division, UPEK, Inc., PeerSec Networks and Proxure, Inc. 371
5.1.6 Smart Sensor Solutions 371
5.1.7 BIO-Key International / S.I.C. 372
5.1.8 Cross Match has acquired the biometric authentication business of Labcal Technologies 372
5.1.9 Francisco Partners Acquires Cross Match Technologies 372
5.1.10 Gemalto /Avalon Biometrics 372
5.2 3M/Cogent Systems 373
5.2.1 3M Cogent Advanced Technology 375
5.2.2 3M at a Glance (Year-end 2012) 376
5.2.3 3M Business Groups 376
5.2.4 3M Business. 377
5.2.5 3M Revenue 378
5.3 Amano Japan / Accu-Time Systems 381
5.4 Apple / AuthenTec 382
5.4.1 Authentec Revenue Recognition - Smart Sensors 384
5.4.2 Apple 385
5.4.3 Apple Business Strategy 386
5.4.4 Apple Products 387
5.4.5 Apple iPhone 387
5.4.6 Apple Mac Hardware Products 388
5.4.7 Apple iPod 388
5.4.8 Apple iTunes® 389
5.4.9 Apple Mac App Store 390
5.4.10 Apple iCloud 390
5.4.11 Apple Software Products and Computer Technologies 390
5.4.12 Apple Operating System Software iOS 390
5.4.13 Apple Mac OS X 391
5.4.14 Apple TV 391
5.4.15 Apple Third-Largest Mobile Phone Maker 391
5.4.16 Apple Regional Segment Operating Performance 393
5.4.17 Apple Americas 394
5.4.18 Apple Europe 395
5.4.19 Apple Japan 395
5.4.20 Apple Asia-Pacific 396
5.4.21 Apple Retail 396
5.4.22 Apple Revenue 398
5.4.23 Apple Net Sales 399
5.4.24 Apple iPhone Shipments 400
5.4.1 Apple iPad Shipments 401
5.5 Aware 402
5.5.1 Aware Company Overview 403
5.5.2 Aware DSL 404
5.5.3 Aware DSL Revenue 405
5.5.4 Aware’s Strategy 406
5.5.5 Aware Mobile Biometric Solution 406
5.5.6 Aware Revenue 408
5.5.7 Aware Biometrics And Imaging Revenue 408
5.6 BIO-key 409
5.6.1 BIO-key Security Solutions 409
5.6.2 BIO-key Smart Phone Markets 411
5.6.3 BIO-key Business Model 412
5.6.4 BIO-key Identity Management, User Authentication, Privilege Entitlement and Access Control 413
5.6.5 BIO-key Revenue 415
5.7 Cognitec Systems 415
5.8 Communication Intelligence Corporation 416
5.8.1 CIC Customers 416
5.8.2 CIC Business 417
5.8.3 CIC Revenue 417
5.8.4 CIC Core Technologies 418
5.8.5 CIC Products 418
5.8.6 CIC Revenue 419
5.9 Cross Match / Francisco Partners 419
5.9.1 Cross Match SEEK Avenger Handheld 420
5.9.2 Cross Match SEEK Avenger Customers 423
5.9.3 Cross Match Technologies Labcal 423
5.9.4 Labcal India 424
5.9.5 Cross Match Products 424
5.9.6 Cross Match Technologies Labcal 425
5.10 CSC 425
5.10.1 CSC Strategy 426
5.11 DigitalPersona 428
5.11.1 DigitalPersona Target Markets and Customers 428
5.12 eKey 432
5.13 EgisTec 433
5.14 Fingerprint Cards AB 434
5.14.1 Fingerprint Cards Sensor Technology Positioning 436
5.14.2 Fingerprint Cards Revenue 438
5.15 Fujitsu 438
5.15.1 Fujitsu Revenue 439
5.15.2 Fujitsu Technology Solutions Services 440
5.15.3 Fujitsu Personal Computers 444
5.15.4 Fujitsu Development and Production Facilities 445
5.15.5 Fujitsu Corporate Strategy 451
5.15.6 Fujitsu Revenue 452
5.15.7 Fujitsu Interstage 455
5.15.8 Fujitsu Acquires RunMyProcess Cloud Service Provider 456
5.16 Gemalto 457
5.16.1 Gemalto /Avalon Biometrics 458
5.16.2 Avalon Biometrics Solutions 458
5.16.3 Gemalto Avalon Biometrics Border Management 458
5.16.4 Gemalto Avalon Biometrics Document Verification of Travel and ID Documents 459
5.16.5 Gemalto Avalon Biometrics Live and Form-based Enrollment 460
5.16.6 Gemalto Avalon Biometrics Live Enrollment Solutions Mobile Applications 461
5.16.7 Avalon Biometrics 463
5.16.8 Avalon Biometrics SL Ghana Visa and Border Management System 465
5.17 Google 466
5.17.1 Google 2012 Corporate Highlights 466
5.17.2 Google Search 468
5.17.3 Google Revenue 469
5.17.4 Google Second Quarter 2013 Results 469
5.17.5 Google / Motorola 470
5.18 Green Bit 471
5.19 IBM Facial Recognition 473
5.19.1 IBM 473
5.19.2 IBM Strategy 473
5.19.3 IBM PureData System for Transactions 475
5.19.4 IBM Business Partners 475
5.19.5 IBM Messaging Extension for Web Application Pattern 477
5.19.6 IBM PureSystems Partners 477
5.19.7 IBM MobileFirst 477
5.19.8 IBM Business Analytics and Optimization Strategy 478
5.19.9 IBM Growth Market Initiatives 478
5.19.10 IBM Business Analytics and Optimization 479
5.19.11 IBM Strategy 479
5.19.12 IBM Smarter Planet 480
5.19.13 IBM Cloud Computing 482
5.19.14 IBM Business Model 482
5.19.15 IBM Business Revenue Segments And Capabilities 483
5.20 IdentiPHI 491
5.21 Interlink Electronics 491
5.22 Iris ID Systems 492
5.23 IriTech 493
5.24 RDSK / Litronic 495
5.24.1 Litronic Customers 496
5.24.2 Litronic Patents 496
5.25 Mereal Biometrics 497
5.26 Merkatum Biometrics Security and ID 497
5.26.1 Merkatum Target Customers 498
5.27 Motorola Solutions 498
5.27.1 Motorola Solutions Strategy 500
5.27.2 Motorola Solutions Biometric Attachment Mobile Identification Solution 501
5.27.3 Motorola Solutions Revenue 501
5.27.4 Motorola Mobile Biometric Identification Solution 503
5.27.5 Motorola Solutions Mobile Biometric Identification 504
5.28 NitGen and Company 505
5.28.1 Nitgen and Company, Investment of US $38 Million 506
5.28.2 Nitgen Marine Oil Bunkering business 506
5.28.3 Supply of Fingerprint Scanner with the Korean Government's National Electral System 507
5.29 Precise Biometrics 507
5.29.1 Precise Biometrics Customers 507
5.29.2 Precise Biometrics’ Tactivo™ Security Enhancements for Mobile Apps 508
5.30 NEC 509
5.30.1 NEC Business Outline 510
5.30.2 NEC Revenue 511
5.31 Nuance 512
5.31.1 Nuance Voice Biometrics 513
5.32 Safran Morpho 513
5.32.1 Safron Morpho Identification Division 515
5.32.2 Safron Morpho e-Documents Division 517
5.32.3 Safron Morpho e-Documents Payments 517
5.32.4 Safron Morpho e-Documents Identity and Access Management 517
5.32.5 Safron Morpho Global Presence 518
5.32.6 Safron Morpho Detection Division 518
5.32.7 Safron Morpho Revenue 521
5.33 Science Applications International Corporation (SAIC) 522
5.34 SecuGen 523
5.34.1 SecuGen Fingerprint Technology for Android 524
5.34.2 SecuGen Hamster IV Fingerprint Reader STQC Certification for India's UID Project 524
5.35 Siemens AG 525
5.36 SmartMetric 526
5.37 Smiths Detection 527
5.38 Steria 528
5.38.1 Steria Revenue 530
5.39 STMicroelectronics 536
5.40 Suprema538
5.40.1 Suprema FVC Results 539
5.40.2 Suprema Revenue 541
5.41 Symantec 542
5.41.1 Symantec Security in Information-Driven World 542
5.41.2 Symantec Core Business Positioned for Growth 543
5.41.3 Symantec Acquires VeriSign Security Business 544
5.41.4 VeriSign Check Mark Signifying Trust Online 544
5.41.5 Symantec Creating Trusted Interactions Online 545
5.41.6 Symantec Revenue 546
5.42 Tyco Integrated Security 547
5.42.1 Tyco 547
5.42.2 Tyco Regional Revenue 551
5.42.3 Tyco Revenue 553
5.43 UnionCommunity / Virdi 555
5.44 Vision-Box 555
5.44.1 Vision-Box Border Control Biometrics 556
5.44.2 Vision-Box Facial Recognition Technology 556
5.45 Witswell Consulting and Services / Cyber-SIGN 557
5.45.1 Cyber-SIGN Biometric Technology 558
5.46 Zvetco Biometrics 560
5.46.1 Zvetco Biometrics Products 561
5.47 List of Companies Participating in the Biometrics Industry 562



List of Tables and Figures

Table ES-1 35
Types of Biometric Devices 35
Table ES-2 35
Biometric Device Target Markets 35
Table ES-3 37
Biometrics Devices Market Driving Forces 37
Table ES-4 38
Biometrics Devices Market Dynamics 38
Table ES-5 38
Biometrics Devices Market Restraints 38
Figure ES-6 39
Biometric Devices Market Shares, Dollars, Worldwide, 2012 39
Figure ES-7 41
Biometric Devices Market Forecasts Dollars, Worldwide, 41
2013-2019 41
Table ES-8 43
Biometric Market Trends 43
Table ES-9 44
Biometric Technology Market Growth Factors 44
Table 1-1 48
Index of Biometrics Types 48
Table 1-2 53
Biometrics Industry Segments 53
Table 1-4 60
Biometric Store and Forward Systems Functions 60
Table 1-12 83
Cloud System Continuous Deployment Models 83
Table 2-1 85
Types of Biometric Devices 85
Table 2-2 86
Biometric Device Target Markets 86
Table 2-3 88
Biometrics Devices Market Driving Forces 88
Table 2-4 89
Biometrics Devices Market Dynamics 89
Table 2-5 89
Biometrics Devices Market Restraints 89
Figure 2-5 90
Biometric Devices Market Shares, Dollars, Worldwide, 2012 90
Table 2-6 91
Biometrics Market Shares, Dollars, Worldwide, 2012 91
Table 2-7 92
Biometrics Market Shares Participants with Measurable Share, Dollars, Worldwide, 2012 92
Table 2-8 94
NEC Analysis of Biometric Device Market Principal Competitive Factors 94
Table 2-9 95
NEC Analysis of Biometric Device Market Competitive Advantage Factors 95
Figure 2-10 96
Safran Morpho Identity Management 96
Table 2-11 99
Motorola Biometrics Products 99
Figure 2-12 100
Cross Match SEEK® Avenger 100
Figure 2-13 107
Biometric Devices Market Forecasts Dollars, Worldwide, 2013-2019 107
Table 2-14 108
Biometric Device Market Forecasts, Dollars, Shipments, Worldwide, 2013-2019 108
Table 2-15 109
Biometric Market Trends 109
Table 2-16 111
Biometric Technology Market Growth Factors 111
Figure 2-17 112
Biometric Device Market Segments, Dollars, 2012 112
Figure 2-18 113
Biometric Device Market Segments, Dollars, 2019 113
Table 2-19 114
Biometric Devices, Fingerprint, Facial Recognition, Voice and Other, Dollars,
Shipments, Worldwide, 2013-2019 114
Table 2-20 115
Biometric Devices, Fingerprint, Facial Recognition, Voice and Other, Percent,
Shipments, Worldwide, 2013-2019 115
Table 2-21 116
Biometrics Market Segments, Law Enforcement, Government / Documents and
Passports, Healthcare, Electronic Device Protection, Airports / Commercial
Access Control, Dollars, Worldwide, 2013-2019 116
Table 2-22 117
Biometrics Market Segments, Law Enforcement, Government / Documents and
Passports, Healthcare, Electronic Device Protection, Airports / Commercial
Access Control, Percent, Worldwide, 2013-2019 117
Table 2-23 118
Biometrics Devices: Dollars and Units, High End, Mid-Range, and Low End,
Shipments, Worldwide, 2013-2019 118
Table 2-24 119
Biometrics Facial Recognition and Voice Recognition Devices: Dollars and Units,
Shipments, Worldwide, 2013-2019 119
Table 2-25 120
Biometric Devices, Units, Shipments, Worldwide, 2013-2019 120
Table 2-26 121
Biometric Sensors, Units and Dollars, Shipments, Worldwide, 2013-2019 121
Figure 2-27 123
Non-Automated Fingerprint Biometric Market Shares, Dollars, Worldwide, 2012 123
Table 2-28 124
Non-Automated FingerPrint Biometric Identification Systems Market Shares, Dollars,
Worldwide, 2012 124
Table 2-29 125
Non-Automated FingerPrint Biometric Device Market Forecasts, Dollars, 2013-2019 125
Table 2-30 127
Automated FingerPrint Information Systems (AFIS) Biometric Market Segments, Dollars, 2012 127
Table 2-31 129
Biometrics Automated Fingerprint Information Systems (AFIS): Dollars, Shipments,
Worldwide, 2013-2019 129
Table 2-32 130
Biometrics Automated / Non Automated Fingerprint Devices: Dollars and Units,
High End, Mid Range, and Low End, Shipments, Worldwide, 2013-2019 130
Figure 2-33 132
Biometric Facial Recognition Market Shares Dollars, Worldwide, 2012 132
Table 2-34 134
Biometric Facial Recognition Market Shares Dollars, Worldwide, 2012 134
Table 2-35 135
Biometrics Facial Recognition and Voice Recognition Devices: Dollars and Units,
Shipments, Worldwide, 2013-2019 135
Table 2-36 136
Biometrics Market Segments Worldwide, 2013-2019 136
Table 2-37 142
Biometric Devices, Units, Shipments, Worldwide, 2013-2019 142
Table 2-38 143
Biometrics Devices: Dollars and Units, High End, Mid Range, and Low End,
Shipments, Worldwide, 2013-2019 143
Table 2-39 144
Major Airports in the World 144
Table 2-40 146
Biometrics Devices: Dollars and Units, High End, Mid Range, and Low End,
Shipments, Worldwide, 2013-2019 146
Figure 2-41 148
Biometric Sensor Market Shares, Dollars, Worldwide, 2012 148
Table 2-42 149
Biometric Sensor Market Shares Dollars, Worldwide, 2012 149
Figure 2-43 154
Biometric Sensor Market Shipments Forecasts Dollars, Worldwide, 2013-2019 154
Figure 2-44 155
Biometric Sensor Market Shipments Forecasts Dollars, Worldwide, 2013-2019 155
Table 2-45 156
Fingerprint Embedded Security Market Shares Dollars, Worldwide, 2012 156
Table 2-46 157
Biometrics Device and Sensor Market Forecasts 157
Figure 2-47 170
Biometric Equipment Regional Market Segments, 2012 170
Table 2-48 171
Biometric Equipment Regional Market Segments, 2012 171
Table 2-49 172
Biometrics Market Shares, Dollars, Worldwide, 2012 172
Figure 3-1 173
NEC Hybrid Finger Identification 173
Figure 3-2 174
NEC Fingerprint Identification 174
Table 3-3 175
NEC Fingerprint Identification Features 175
Figure 3-4 176
NEC Fingerprint Identification 176
Figure 3-5 177
NEC Minutiae and Related Method Illustrated 177
Figure 3-6 179
NECFingerprint Matching Processor (FMP) 179
Figure 3-7 180
NEC Multi-Biometrics 180
Table 3-8 181
NEC Portable DNA Analyzer Features 181
Table 3-9 182
NEC Portable DNA Analyzer Step by Step Procedures 182
Table 3-10 183
NEC Portable DNA Analyzer Technical Highlights 183
Figure 3-11 184
NEC Portable DNA Analyzer 184
Figure 3-12 186
NEC Portable DNA Analyzer STR by Electrophoresis Analysis / Analysis Program 186
Figure 3-13 187
Safran Morpho Identity Management 187
Table 3-14 188
Safran Morpho Public And Private Sector Security Systems Solutions 188
Figure 3-15 189
Safran Morpho Identity Management 189
Figure 3-16 190
Safron Morpho MorphoCivisâ„¢ 190
Table 3-17 191
Safran Morpho System Aspects 191
Figure 3-18 192
Safron Morpho MorphoPerso 192
Table 3-19 193
MorphoPerso ID Documents Lifecycle Management Flexible Solution 193
Figure 3-20 194
Safron Morpho MorphoCheckâ„¢ 194
Figure 3-21 195
Safron Morpho MorphoRapIDâ„¢ 195
Figure 3-22 196
Safron Morpho MorphoTouchâ„¢ 1200 Series 196
Figure 3-23 197
Safron Morpho Morphotouchâ„¢ 1200 Series Features 197
Figure 3-24 197
Safron Morpho MorphoBIS 197
Table 3-25 198
MorphoBIS, Morpho’s Next Generation AFIS Functions 198
Table 3-26 199
MorphoBIS, Morpho’s next generation AFIS Features 199
Figure 3-27 200
Safron Morpho MetaMorpho 200
Table 28201
MetaMorphoâ„¢ ABIS Store And Management of Fingerprints And Palm Prints In A
Single Database Feratures 201
Figure 3-29 202
Safran Morpho Outdoor MorphoAccess® 500 Series 202
Table 3-30 203
MetaMorpho™ MorphoAccess® (OMA) 500 Series High-Performance
Fingerprint Identification Terminals Features 203
Figure 3-31 205
Safran Morpho Secure Biometric Access 205
Table 3-32 207
Cross Match Technologies Biometrics Offerings: 207
Figure 3-33 208
Cross Match SEEK® II 208
Table 3-34 209
Cross Match SEEK® II Advantages 209
Figure 3-35 209
Cross Match SEEK® Avenger 209
Figure 3-36 211
Cross Match SEEK® Avenger Advantages 211
Figure 3-37 212
Cross Match Guardian® 212
Table 3-38 213
Cross Match Guardian® Advantages 213
Figure 3-39 213
Cross Match Patrol ID / Patrol 213
Table 3-40 214
Cross Match Patrol ID / Patrol Advantages 214
Figure 3-41 215
Cross Match L SCAN® 1000T 215
Table 3-42 216
Cross Match L SCAN® 1000T Advantages 216
Figure 3-43 216
Cross Match Verifier® 300 LC 2.0 216
Table 3-44 217
Cross Match Verifier® 300 LC 2.0 Advantages 217
Table 3-45 218
3M Cogent Systems CAFIS Features 218
Table 3-46 219
3M CAFIS Agency Solutions: 219
Table 3-47 219
3M CAFIS Features 219
Table 3-48 221
3M Cogent Systems Prime Full Function AFIS for Local Law Enforcement Agencies Features: 221
Table 3-49 222
3M Cogent Systems CAFIS Functional Capabilities 222
Table 3-50 223
3M Cogent Systems Multi-Biometric Scale Document Issuance Program Target Markets: 223
Table 3-51 224
3M Cogent Systems Multi-Biometric Enrollment Station (CBES) Key Features: 224
Table 3-52 226
3M Cogent Systems Biometric Enrollment Software Key Features: 226
Table 3-53 228
Motorola Identity Management Features 228
Table 3-54 229
Motorola Multi-Biometric Capture and Verification Peripherals 229
Table 3-55 231
Biometric Identification Solution (BIS) 231
Features 231
Figure 3-56 232
Motorola Mobile Biometric Identification 232
Table 3-57 233
Motorola Mobile Identification Solution Features 233
Table 3-58 234
Motorola Mobile Identification Solution Target Markets 234
Table 3-59 235
Google / Motorola Mobile Identification Solution Applications 235
Table 3-60 237
BIO-key International Biometric Technology Solutions 237
Table 3-61 238
BIO-key Large Scale ID Features 238
Table 3-62 239
BIO-key Large Scale ID Functions 239
Table 3-63 240
BIO-key for End User Systems 240
Table 3-64 241
BioAPI Consortium Standard API 241
Table 3-65 242
BIO-key's SDK Software Development Kit Features 242
Table 5-66 243
BIO-key Authentication Technology Benefits 243
Figure 5-67 243
BIO-key Biometric Tools Offered 243
Table 3-68 247
Precise Biometrics Tactivo Functions 247
Table 3-69 248
Precise Biometrics Tactivo Uses 248
Table 3-70 250
Precise Biometrics Smart Card Product Features 250
Table 3-71 251
Precise Match-on-Card for National ID Features 251
Table 3-72 252
Precise Biometrics U.S. Government Solutions 252
Figure 3-73 254
Precise Enterprise Solutions for Secure Sign-On 254
Figure 3-74 256
Precise Secure Mobile Authentication for Enterprise 256
Table 3-75 257
Precise Biometrics Tactivo Features: 257
Figure 3-76 258
Precise Match-on-Card for Enterprise Solutions 258
Table 3-77 260
Precise Biometrics Security Functions 260
Figure 3-78 261
DigitalPersona Biometrics, Multi-Factor Authentication and Access Management 261
Table 3-79 262
DigitalPersona Biometrics, Multi-Factor Authentication and Access Management Functions 262
Figure 3-80 263
DigitalPersona Pro Enterprise 263
Table 3-81 264
DigitalPersona Biometrics, Multi-Factor Authentication Pro Enterprise Features 264
DigitalPersona, Inc. ikonTouch 700Features 268
Figure 3-82 269
Fujitsu PalmSecureâ„¢ 269
Table 3-83 270
PalmSecureâ„¢ Features 270
Figure 3-84 271
Fujitsu PalmEntryâ„¢ Access Control System 271
Table 3-85 272
Fujitsu PalmEntry Target Mar

View This Report »

Find all the market research you need - instantly, in one place.

+1.2 Million Research Documents & Statistics +200,000 Trusted Public Sources 350 Industries With Global Coverage

24/7 Customer Support

Talk to Amrita

+1 718 303 2019

Purchase Reports From Reputable Market Research Publishers

Global Identity Access Management market 2014 - 2018 [Global Identity and Access Management Market , by Region market, by deployments, End Users verticals , by Components, Authorization), Key player offerings, Drivers, Inhibitors and forecasts to 2018

Global Identity Access Management market 2014 - 2018 [Global Identity and Access Management Market , by Region market, by deployments, End Users verticals , by Components, Authorization), Key player offerings, Drivers, Inhibitors and forecasts to 2018

  • $ 5 200
  • Industry report
  • May 2014
  • by ResearchFox Consulting

Global Identity Access Management market 2014 - 2018 [Global Identity and Access Management (IAM) Market , by Region market, by deployments(On premises , Cloud, Hybrid), End Users verticals , by Compo ...

Global Cyber Security Industry

Global Cyber Security Industry

  • $ 4 950
  • Industry report
  • June 2014
  • by Global Industry Analysts

This report analyzes the worldwide markets for Cyber Security in US$ Million by the following Product Segments: Application Security, Content Security, Endpoint Security, Network Security, Services, and ...

The Global Cybersecurity Market 2014-2024

The Global Cybersecurity Market 2014-2024

  • $ 4 800
  • Industry report
  • September 2014
  • by Strategic Defence Intelligence (SDI)

Summary The Global Cybersecurity Market 2014-2024 report, published by Strategic Defence Intelligence, provides readers with a detailed analysis of both historic and forecast global industry values, factors ...


ReportLinker is an award-winning market research solution that finds, filters and organizes the latest industry data so you get all the market research you need - quickly, in one place.