Neurotechnology, a provider of deep learning-based solutions and high-precision biometric identification technologies, has announced the release of their new Face Verification system. Face Verification 13.0 is designed for the integration of high-quality face capture, secure facial authentication and robust face liveness detection into mobile and web applications.

It includes a small-footprint version of Neurotechnology’s latest facial recognition algorithm – which ranked among the top results in the NIST FRVT 1:1 evaluation – making it ideal for digital identity onboarding, payment, banking, telecommunications and other face recognition uses on personal devices.

New Face Verification system

The new Face Verification system has the ability to very accurately verify the identity of people wearing medical masks, as proven in the Face Mask Effects benchmark by NIST.

The new presentation attack detection (PAD) algorithm has further achieved Level 1 certification by iBeta laboratory, in compliance with the requirements of the ISO/IEC 30107-3 standard, proving its robust resilience against spoof attacks, including photos, videos and 3D paper masks.

Face Verification 13.0

Face Verification 13.0 also includes functionality that enables developers to easily automate any required updates of the recognition algorithm directly within the final user application. This ensures older data formats are compatible with Face Verification 13.0 algorithms for optimal accuracy.

An application developed with Face Verification SDK can allow the end user to upgrade the old face data stored in his mobile to the new format in a secure and seamless way.

Advanced biometric technology

One of our fundamental goals is to keep our technology ahead of customer needs in the biometric sector"

One of our fundamental goals is to keep our technology ahead of customer needs in the biometric sector, so we are continually expanding the capabilities of our solutions,” said Antonello Mincone, Business Development Director for Neurotechnology.

Antonello Mincone adds, “While the secure identity market offers a few seemingly similar products, our technology is differentiated by its superior reliability – due to our long experience in the field – and by its versatility in a wide range of applications.

Interoperable with other Neurotechnology products

Face Verification 13.0 is easily interoperable with other Neurotechnology products for face recognition. For a complete digital ID management experience, Face Verification includes optional functionality for conducting duplicate identity checks during the enrollment phase through MegaMatcher ABIS.

Face Verification is also compatible with MegaMatcher On Card from Neurotechnology to grant an extra layer of security during verification through the use of contactless smart cards. And compatibility with VeriLook SDK enables secure and private authentication within offline self-service kiosks.

Available for purchase from Neurotechnology

Face Verification 13.0 and the entire Neurotechnology biometric product line can be purchased from Neurotechnology and through distributors worldwide. A demo application of the web service is available at faceverification.online. An Android demo, a trial version of the SDK and a trial version of the web service are also available.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...