322 Companies

Access all companies

Find technology partners quickly.

Spotfolio tracks over one million companies in technology industries.

There are 322 companies in the field of Biometrics on spotfolio that produce or deliver products, that utilize or research technologies or that are otherwise engaged in topics such as Biometric, Authentication, Fingerprint, Data, Biometric-Authentication, Recognition, Technology, Security, User .

Start-ups (45)

Early-stage companies (110)

Established companies (142)

The majority of these companies is located in the following countries.

United States (133)

United Kingdom (27)

Canada (17)

Israel (14)

Example Companies

Find companies in your area

Mobbeel

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

for mobile devices and digital environments, that verifies the smartphone user identity using one or more of their unique biometric features and the standard ...

particularities of your digital onboarding processes. Easily integrable, with a fluid user experience and completely modular so you can integrate it your way. EASILY ...

particularities of your digital onboarding processes. Easily integrable, with a fluid user experience and where each client can choose the functionality that is better ...

application captures an image without manual user intervention in both web and mobile environments achieving the same user experience in all channels. Thus, the ...

ID documents, driver’s licenses, passports… any document that identifies a user is susceptible of being scanned and validated by MobbScan. In addition, its ...

ID documents, driver’s licenses, passports… any document that identifies a user is susceptible of being scanned and validated by MobbScan. In addition, its

for mobile devices and digital environments, that verifies the smartphone user identity using one or more of their unique biometric features and the standard ...

for mobile devices and digital environments, that verifies the smartphone user identity using one or more of their unique biometric features and the standard ...

the best one (or the best combination) depends on several factors: type of user and cultural environment, security level required for the application and ...

the best one (or the best combination) depends on several factors: type of user and cultural environment, security level required for the application and ...

based on user photos or videos or Among the implemented measures we have non-collaborative measures that do not require any action on the user part such ...

such us image quality analysis and also collaborative measures which require user interaction like smile detection or 3D face reconstruction. WE ACCOMPLISH

Mobiltron, Inc

early-stage

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

resolution and user-generated data attribution in data-driven applications Technology implicit authentication for identity resolution and user-generated data ...

to address the issue of user-generated data attribution with high level of confidence, and without having to sacrifice the user experience. Using MIA they ...

easily incorporate our patent pending technology, and be confident about the user-generated data it gets. If you are interested to learn more please contact

Authomate

early-stage

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

an application, system or website will log in the user seamlessly, eliminating the need to enter user names, passwords and one time codes. Authomate offers ...

system or website will log in the user seamlessly and without end user friction, eliminating the need to enter user names, passwords and one time codes ...

codes. Strong security with user convenience Geo-location, time and calendar based control Access coordination with employees, partners, vendors, and customers ...

An easy to use smartphone app and secure cloud service Auditing at the user and mobile device level Business level foundational solution that scales ...

theft Easy administrative control for user approvals and access Authomate’s StrongPass solution simplifies the user experience while increasing security ...

leveraging multiple unique factors from a user and their smartphone, including biometrics and location. Once the user verifies their identity with StrongPass

mobile phone network with no need for the user to remember any passwords. One scan of the webpage/client the user will be authenticated instantly. Authomate ...

resides on the user’s smart phone. All the user credentials are stored securely on the phone and once the user decides to use the StrongPass App for authentication ...

the need for login/password, it shows an icon in the address bar that the user can use to initiate the Authomate Personal supported authentication. Authomate ...

and plays a key role in communicating the user credentials to the browser extension. How It Works - The user goes to the login page of the website they ...

toolbar. - The user clicks on the Authomate icon in the browser toolbar. - The browser extension presents the QRCode to the user. - The user logs into the ...

- The user scans the QRCode using the StrongPass app. - If the credentials are not in the StrongPass app secure database, the app prompts the user to provide

SensiPass Ltd. SensiPass Ltd. and SensiPass Inc.

early-stage

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Authentication The National Institute of Standards and Technology categorizes user authentication methods as three factors: secrets (something you know), biometrics ...

customers. Sensipass Access Control 1. User scans locking mechanism for ID using Sensipass equipped scanner 2. User authenticates the (un)locking transaction ...

result can be sent directly to the scanner device and unlocked by autenticated user locally on scanner SensiPass Features ⇛ Benefits Feature SensiPass products ...

highly entropic secret, or knowledge factor, the secret interaction with a user-prescribed object. SensiPass combines all 3 authentication factors into a ...

our patented product line for 3factor authentication designed for securing user access to immersive environments, and can eliminate the need for peripheral ...

peripheral devices, a weak link, in the authentication process. Assured User Onboarding: SensiPass can overcome security risks associated with independent scanning

multifactor identity. Innovating in the knowledge factor or “secret” in user authentication, users register a secret interaction with their own biometric

Invixium Invixium Inc.

early-stage

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Cloud. ➢ User can skip fingerprint enrollment while enrolling a user. ➢ Auto-Sync feature added and can be configured from Settings app >> User Sync. Enterprise ...

information shown in General Info app. ➢ Capturing user profile picture using TITAN camera while enrolling/editing user. ➢ Toggle ON/OFF Telnet server for Titan ...

Enrollment After enrolling face of 5000 users, Invixium recommends to transfer user records from TITAN to IXM WEB. In case of a Low-quality face, TITAN will ...

depict the enrolled face quality and face type Invixium recommends saving user with face type “Live”. INVIXIUM P/N XAD-00E-163-01G Copyright © 2019 ...

within the frame corners, which will turn green upon correct positioning. The user should look straight at the camera when enrolling their face. Avoid looking ...

devices may allow enrolling a LOW-quality fingerprint. INVIXIUM recommends user to moisten finger and re-enroll to get a good quality fingerprint image.

(ACP) software. The automatic (one or two-way) synchronization ensures any user enrolled in IXM WEB is automatically transferred to the ACP software and ...

synchronize the data if it observes any mismatch in user details. Reduced System Administration User/cardholder data is automatically transferred between ...

Data Data mismatch is greatly reduced as no manual work is involved. All user/cardholder data is automatically transferred from one system to the other ...

and capabilities to the system for user enrollment and device management. IXM Link allows for synchronization of the user/cardholder data between the database

Use detailed technology terms.

Only spotfolio allows for searching with detailed technology terms, as we provide you with all topics that technology companies talk about.

Use Cases

Register now

Why Technology Scouting?

Technology scouting is the basis for your innovation management, identifies new technological developments as early as possible and protects you from disruptive business models.

Identify technology partners

Boost your market research

Look beyond major players

Build long and short lists

Collect technology leaders, providers, start ups and potential new partners in lists via simple tagging to take further steps with your team.