What is BIS™?

The Biometric Identification System - BIS™ is a modular and easy to use system that securely enrolls and identifies people using biometrics. Scalable and customizable BIS™ provides the ability to choose a biometric technology (e.g. fingerprint, face, iris, signature, vein, among others), and provides a multi-biometric system (i.e. to identify users using a combination of different biometric methods), over a versatile infrastructure (land, mobile units, handheld terminals, etc.).

All of this runs on the robust BII™ architecture, which allows collected information to be shared across multiple applications.

Why do I need it?

BIS™ makes it easy to enroll and identify enrolled users using biometrics to verify their identity. It provides a higher level of security by ensuring people are who they claim to be and are therefore entitled to whatever information, product, or service they are rightfully entitled to.

How does it work?

BIS™ provides a set of functions that allow easy enrollment, identification, and extensive collection of biographical information of users:
  • Enroll multiple types of biometrics (optional) via a variety of devices from different manufacturers
  • Take a high quality picture that can be also used to identify a user via facial recognition (optional)
  • Allow easy collection of extensive biographical information for operators
  • Maintain a strict log of data that has been entered in the system including enrolled users, and users that have been already identified at other enrollment centers
  • Keep detailed information of administrators performing verification of users and controlling access to system data via a multi-tiered access scheme
  • Provide detailed reports and activity logs of system users and administration staff to prevent abuse of the system
  • Flexible deployment on desktops, mobile systems, or hand held terminals devices for remote deployments
  • Easily customizable, fault-tolerant, price-affordable that implies low development and implementation costs and requires little or no experience in biometrics. It is also advantageous for its robust performance and supreme high speed (hundreds of thousands of matches per second)
  • Support for multi-biometrics: fingerprint, facial, iris recognition etc.
  • One-to-one (1:1), one-to-many (1:N), Short List (N:M) identification modes
  • Ability to convert any input data such as paper, single and ten-print optical scanners, and ink it into the required formats
  • Can be deployed as a regular client or a web application as required
  • Compliance with the international standards; Complies with ISO/IEC 19794-4 standard for fingerprint images
  • Can capture at multiple fingerprint image resolutions (such at 500 ppi, dependent on hardware used)
  • De-Duplication: – The ability to compare newly enrolled people against existing users to ensure that fraudulent enrollments get into the system
  • Document or Image Storage: – BIS™ can store additional images into database, such as birth certificates and other government issued identifications that can be used in verifying the identity of enrolled users

Who uses it?

BIS™ is used by corporations, governments, and other entities which need a robust, secure system to enroll and identify users. BIS™ is a customizable system which can be adapted for any organization's needs.

The Enrollment screen is where all data on the user is entered in the system. The operator will capture all the information in a customizable form and then enroll the user's fingerprints and take several photos. Enrollment generally includes both demographic and biometric information including identification characteristics, a picture, name, address and identification documents (by default the system will use fingerprints, but the biometric method can be customized according to customer requirements). Enrollment can be configured in a way that it will not let the operator save information until a set of activities are completed, such as high resolution fingerprints, minimum number of fingerprints captured, specific mandatory fields, high resolution pictures taken, immediate duplication search within the local database, and near real time duplication search for the entire database, etc.


After enrolling the user, BIS™ makes it easy to confirm their identity. BIS™ uses a variety of methods to identify and verify the identity of someone.

There are two types of searches that can be performed.

  1. Verification Search (1:1): An operator can enter biographical information for the user in order to locate the specific record.
  2. Identification search (1:N, 2:N, 4:N or 10:N): This method will take a fingerprint and compare it to all other fingerprints in order to find a matching record. In order to minimize the amount of records the search is required to go through, the operator can also enter some combination of a biographical plus biometric trait.

Out of the two the short list search is the most efficient and utilizes less server resources.


While BIS™ makes it very easy to enroll new users, there is always the possibility for people to try and take advantage of a system through the easiest way: Through Operators.

In order to ensure fraudulent data is not in the system, BIS™ runs has two methods of checking newly entered information is both unique and genuine. Both of these searches are run nightly to check new records crated during the day.

  1. Biometric Duplication Search: This search method takes each of the enrolled biometrics and compares them against all of the previously enrolled records in the database
  2. Biographic Information Search: The second search takes the biographical information collected during enrollment and performs a comparison against text entered in other records

 In the Investigations area, results from both of these searches are displayed, and combined to allow investigators to remove fraudulent records as well as identify individuals who are perpetuating the fraud.


BIS™ provides a comprehensive report generation mechanism. The operator can generate a report for all registered users, verified users, and duplicate users (fraud attempts) by many other parameters including fingerprint quality, address parameters, etc.

Administration / Dashboard

BII™ keeps a detailed audit log of all activity that happens on the system and can be accessed from the main BII™ system management module.  This centralized management system also allows administrators to centrally configure all BII™-based applications.