ABIS API Package

Automated Biometric Identification System for medium and large applications that need to perform the identification process.

REST API

Available in the most popular architecture standard on the market.

Device Independent

Available anywhere, anytime and on any device or operating system. Only an internet connection is required.

Easy to Code

Quickly integrate high performance biometrics into your application. See our Dev Center and Demos.

Package resources

Large-scale biometric identity management

The ABIS Package is used for large-scale biometric identity management with support for fingerprint recognition, facial recognition and other features. The solution has a highly modular architecture, allowing it to be configured and optimized for civil or criminal applications.

Functionalities

Included in all plans

Identity Management

Provides all necessary tools and services for identity management, including person registration, biometric identification (1:N) and verification (1:1).

Biometric Deduplication

Performs the comparison of each new biometric record inserted with the others existing in the database.

Latent Editor

Visual tool that provides ability to analyze the fingerprint image, perform automatic and manual enhancements as well as fingerprint feature points management.

Face and Finger Matching

The solution supports the biometric modalities of fingerprint and face fused or separated (multibiometrics).

Biometric Adjudication

The visual tool that enables easy examination of biometric matching results and manual decision making.

Multibiometrics cloud database

The solution provides a multibiometric database with CRUD (create, read, update and delete) operations for adding, updating and verifying data via API calls.

Demo

Experience BioPass ID through our multiplatform demo applications.

Constant updates

Constant updates of algorithms, API and documentation. Always have the latest technology.

Technical support

Technical support by email, chat or phone. Documentation and source code for example applications.

Security and privacy

Uses standard ports with TLS data transfer. Only models (templates) are stored, images are discarded after processing.

Infrastructure and availability

High availability and high scalability. Exclusive instances for the customer. Storage separate from processing. Parameterization by project.