COMPUTER SOFTWARE USED BIOMETRIC

Brand Owner (click to sort) Address Description
BIOMEGA Global Rainmakers, Inc. P.O. Box 8279 Caguas 00726 Puerto Rico Computer software used in biometric acquisition and recognition devices that is comprised of complex control algorithms capable of performing a matching of the biometric data;BI OMEGA; BIOMETRIC OMEGA;
BIOTAG EYELOCK 355 LEXINGTON AVENUE, 12TH FLOOR New York NY 10017 Computer software used in biometric acquisition and recognition devices that is comprised of complex control algorithms capable of performing a matching of the biometric data; Computer software for use in matching biometric data; computer software used in the field of identity management; Computer software featuring electronic data processing tags used for access control and identity management; Computer software for tracking and tagging individuals; Computer software for performing electronic identification; Computer software for use in surveillance; Computer software for use in access management;BIO TAG;
BIOTAG EYELOCK 355 LEXINGTON AVENUE, 12TH FLOOR New York NY 10017 Computer software used in biometric acquisition and recognition devices that is comprised of complex control algorithms capable of performing a matching of the biometric data; Computer software for use in matching biometric data; Computer software for performing electronic identification; Computer software for use in surveillance;BIO TAG;
IDENTIFICATION IN ANONYMITY EYELOCK 355 LEXINGTON AVENUE, 12TH FLOOR New York NY 10017 Computer software used in biometric identification devices that allow an individual to be identified without a name or other identifying characteristic being used in the process and featuring use of the individual's biometric data in a one to many mode;IDENTIFICATION;
LIVE-ID Cogent Systems, Inc. 209 Fair Oaks Ave. South Pasadena CA 91030 Computer software used for biometric identification and verification;LIVE-IDENTIFICATION;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for authentication in a computer system includes registering a biometric template in the computer system, thereafter, verifying the authenticity of the registered biometric template and then comparing the biometric template with a biometric image of a user if the biometric template is authentic. If the user's biometric image matches the biometric template, the computer system will continue to boot.