SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Gradiant’s identity verification and forensics solutions on display at Identity Week London 2019

10 Jun 2019

Gradiant’s identity verification and forensics solutions on display at Identity Week London 2019
Contact company
Contact Gradiant
icon Add as a preferred source Download PDF version
Related Links
  • Gradiant to showcase Valida forensic analysis tool to prevent fraud and digital onboarding at CES 2019
  • How biometrics, integration and cloud tops the list of access control trends in 2019
  • What are the new buzzwords in the security market?

From June 11th to 13th Gradiant has an important appointment in London. For a few days, the city is becoming the capital of identity recognition technologies to transact in a seamless, yet secure manner. Identity Week is the largest technology fair focused on the concept of identity in Europe and this year brings together more than 3,000 international industry actors in three world-class events: Digital:ID, Planet Biometrics and Security Document Week.

Forensic and face recognition solutions

In this international scenario, Gradiant is showing forensic technologies and face recognition solutions at booth D28 (Digital: EXPO, ExCel London) to automate digital onboarding and Know Your Customer (KYC) processes in a reliable way, as well as prevent document fraud on Internet.
Providing security when we need access to personal data is fundamental in order to incorporate technology into the day-to-day activities we carry out in the actual digital society.

Facial recognition is positioned as one of the most reliable techniques to incorporate into user registration processes

Facial recognition is positioned as one of the most reliable techniques to incorporate into user registration processes, both to register new customers and to provide secure access to personal data in digital onboarding processes (electronic identification of the customer that allows the remote goods and services contract). Most of the time, these processes require to verify that the ID document - ID, passport or driver's license - registered in the system matches with the user's identity in an unmistakable way; but it is also important to incorporate other techniques that collect more information about the client and analyse possible manipulations carried out in the identity document, in order to ensure secure remote client's discharge.

Valida by Gradiant forensic tool

“In London we are going to show Valida, our forensic tool to detect manipulations in digital documents. In January we received our second selection to present this solution at the CES in Las Vegas and we continue to show it at MWC in Barcelona and RSA in San Francisco,” explains Daniel Ramos, International Business Development Manager at Gradiant. "Now it's time to bring Valida to the UK, to Identity Week, where the world's leading document security vendors come together.”

Valida by Gradiant’s main goal is to evaluate the authenticity of digital documents to prevent fraud in online user verification, digital on boarding and Know Your Customer (KYC) processes. This technology developed by Gradiant, in collaboration with atlanTTic research center of Universidade de Vigo, allows companies to offer an extra level of security in this operations, as it automatically analyses any type of identity document (and other PDF and JPEG files such as payroll, invoices, receipts, etc.) to detect possible spoofing attacks and forgeries in the data present in these files.

faceIDNN facial recognition technology

Gradiant is also showing in London faceIDNN to verify user’s identity by comparing the face with the photograph in his/her ID

In addition to forgery detection technology for digital documents, Gradiant is also showing in London faceIDNN to verify user’s identity by comparing the face with the photograph in his/her ID, driver’s license or passport. Using both images, techniques developed by Gradiant verify in real time if they belong to the same person.

The company’s experience in facial recognition has allowed to develop techniques for anti-spoofing attacks, as well as guaranteeing verification despite significant appearance changes have happened against the photo in the ID card, or if the person has aged. faceIDNN has been co-funded by Xunta de Galicia (Galician Regional Government) by Ignicia Programme (IN8555A IGNICIA Proba de Concepto)

Biometric technologies

In order to complement this verification, Gradiant has developed biometrics of signature, voice and video (liveness detection) to be incorporated in the processes of digital onboarding as a second authentication factor, in order to prove the customer is who he claims to be. “Our solution focuses on taking advantage of digital onboarding process in order to collect other types of information that provide us with a higher level of security in their verification, such as their signature, voice or video," says Ramos. "We have these three biometric technologies and we can implement them together or separately.”

More and more businesses are born 100% digital and more traditional ones are joining the digitised world. Some of these businesses need to verify the identity of their customers remotely and ensure. This is the case of banks, which currently can register new customers without them physically going to bank offices.

Biometric verification solutions

These entities have a legal obligation to know the identity of their customers as required by the 4th European Anti-Money Laundering Directive

In addition, these entities have a legal obligation to know the identity of their customers as required by the 4th European Anti-Money Laundering Directive, in order to comply with the Know Your Customer (KYC) and Anti-Money Laundering (AML) requirements. This European directive aims to prevent problems such as corruption, illegal financing, and money laundering, among others, to combat illegal transactions in the digital environment.

Gradiant's biometric verification solutions are a complete choice to ensure security through face, signature or voice customer identification and to prevent fraud in digital files. These solutions can also be effective in sectors such as gambling (to identify if users are old enough to access these services), sharing economies (where there is a digital transaction between at least two people), dating, telcos, insurance, e-commerce and hotels.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Biometrics
  • Electronic security systems
  • Hotel security
  • Security access systems
  • Facial recognition systems
  • Electronic access control
  • Identity management
  • Cyber security
  • Corporate Security
  • Data Security
  • Cloud security
  • Related links
  • Identity Week 2019
  • Biometric Access control systems & kits
  • Biometric Access control software
  • Standalone / Networked Access control systems & kits
  • Face Recognition Software Access control software
  • ID Badging Software License Access control software
  • Related categories
  • Access control systems & kits
  • Access control software
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Events news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec