![]() The Bastille is the most advanced, secure data-sharing system for law enforcement agencies and industrial security. The Bastille provides both public and private agencies with capabilities including: * Secure encrypted data safely transmitted over the Internet
and connections to multiple sites. The Bastille combines a Department of Defense standard secure database for law enforcement services with large hosting capabilities. Secure data communications ensure that only authorized users have access to the data center's information and applications. Additional technologies secure the Bastille data center, including fire walls, and encryption. PKI-based digital certificates and biometrics also authenticate access to the Bastille secure data center. The Bastille Product Family includes FaceTrac, a facial identification biometric technology. Facial recognition biometrics identifies suspects by face matrix/nodal points and matches them against suspects' portraits recorded in Bastille database. Markets The Bastille is a browser-based subscription service for law enforcement agencies. It provides an extremely secure, private network for sharing vital information between local, regional and national law enforcement or security agencies. The Bastille combines the speed of modern telecommunications technology and the latest in encrypted data transmission with an easy-to-use web browser format. In the click of a mouse or a few key strokes, officers can search or post information in: * Criminal Activity, Gang Watch, and Drug Watch Databases Every PC that subscribes to The Bastille becomes a single point of access for a wealth of law enforcement data and communication features. Doing more legwork in cyberspace means your officers can cover more territory faster. The Bastille saves valuable, often critical time by helping officers to: * Gather intelligence.
The combination of FaceTrac biometric technology with the Bastille secure database gives the Gaming Industry not only the ability to identify suspects in a crowd but also the capability to communication with other law enforcement agencies nationwide. FaceTrac uses a digital camera to focus on individuals who approach any security-sensitive entry point. FaceTrac captures a person's image, submits, and stores the portrait in the The Bastille database. Finally, the FaceTrac matches and compares the captured image against previously submitted images using the Bastille's secure database. FaceTrac returns mated images despite altered characteristics such as facial hair, accessories, and age. The Bastille uses the familiar Netscape Navigator Web browser to provide secure access to criminal investigative information, including photos, maps, reports, emails, news groups, and other information to enhance existing surveillance techniques. The vast amount of information in the database will help you track suspicious activity, crime suspects, gang members and missing people. Incident reports can be customized to reflect the content of forms currently in use by your surveillance team. With little or no training, your team can take advantage of Internet technology to increase their surveillance and security efficiency. The Bastille combines the speed of modern telecommunications technology and the latest in encrypted data transmission with an easy to use web browser format. Any authorized member of the department can search databases, post alert bulletins, exchange real-time information and files with other agencies, and keep up to date on departmental and law enforcement news. Sophisticated data encryption and smart card reader hardware included with the service ensure that information is accessible only with the proper security clearance. The Bastille uses familiar web browser technology to make it easy to search, upload and download information, graphics and photos. In addition, the Bastille secure, private network gives security officers a secure forum to communicate with individuals, specific groups or entire agencies through: * Information Broadcasts FaceTrac biometric technology allows users to identify suspects by face matrix/nodal points and it identifies them against Bastille database. This technology combined with voice pattern identification technology of VoicePass allows GRAPHCO TECHNOLOGIES to release fusion algorithms as required by DARPA for government applications. A multi-layered approach to security solutions ensures that the information and transmissions from the Bastille are accessible by authorized personnel only. Smart Card technology combined with a Virtual Private Network and state-of-the-art firewalls make sure that only registered users can access the system. Cutting -edge encryption methods protect your transmissions and multiple safeguards secure the physical location of the hardware from unauthorized access. Law enforcement agents can search the Bastille data center by facial characteristics, names, aliases, M.O.s, even demographics and locations on a map. Agents can search using "fuzzy text logic" to find matches based on associated items such as common misspellings, synonyms, or recognized law enforcement terms. The "eclectic search option allows authorities to combine searches in creative ways, to suit hunches and instincts. |
VoicePass is a voice pattern recognition biometric technology. Used for secure identification, it operates by comparing a person's actual speech to their stored voice pattern. The technology compresses the stored voiceprint and therefore uses a uniquely small amount of memory. VoicePass is unparalleled because it is text independent and therefore does not rely on a particular phrase or password.
VoicePass Security, Authorized Entry and Time and Attendance Applications, VoicePass brings a unique and user-friendly biometric to authorized entry solutions for the growing Industrial, Commercial, and Residential security markets. With Graphco's small VoicePass Access Terminal (VPAT), a very cost effective new family of solutions is offered for identity verification and authorization, e.g., to open a door, or to enable an auto ignition. Smart database and network tools manage authorizations in multi-site solutions, and in time and attendance applications. In addition to being text-independent, VoicePass is among the few biometrics that can be ported to Smart Cards. Through the use of compression algorithms, Graphco achieves an impressively small memory requirement for the voice file, and can thus port and store the voiceprint on both memory and processor Smart Cards. VoicePass has applications for secure log-ons and authorized access to sensitive files and networks. The familiar password-protected, single-sign-on user authentication process allows users within well defined populations to authenticate their identity in order to access LAN resources in one step. Because users can forget their passwords, the password-protected single sign-on process all too often consumes IT time and resources. The password-protected secure entry process also compromises security because users write down, share, or lose their passwords. Biometric technology facilitates secure entry single-sign-on without the necessity of remembering and updating passwords. VoicePass authenticates a user's identity by creating a template of that individual's voice pattern, and comparing the template to live speech. Because VoicePass is text independent, a speaker can say anything when ready to validate his or her identity to gain access to resources. Likewise, instead of password protected methods, ID authentication to the network can take place through a biometric system. Combined with PKI (public-key infrastructure) encryption, VoicePass Speaker Recognition system can eliminate the multiple levels of authentication currently necessary to carry out consumer or business-to-business transactions on the Internet.
|
Home | About | News | Secure Database Services | Secure Communications Employment | Contact Graphco | Partnerships |