FaceKey Security Access Control Blog http://www.facekey.com/page705288 en-us Tue, 15 Jul 2014 20:17:00 +0000 Tue, 15 Jul 2014 20:17:00 +0000 http://blogs.law.harvard.edu/tech/rss Annette Starkweather <info@facekey.com> info@facekey.com Biometrics Is Not New! http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/07/15/biometrics-is-not-new- <h3 class="style45750">Biometrics Is Not New!</h3><br> <div class="style45759"><span class="style45759">Drawings made by cave men show a palm print identifier.&nbsp; The Chinese used palm and footprints five hundred years ago.&nbsp; Skull measurements and lengths of fingers were used as early as the 19 th century to identify criminals.&nbsp; Some say that the fingerprint or face is different for each person. <br><br> These ancient uses required a lot of time to find a possible match.&nbsp; Today, FaceKey systems can search through thousands of fingerprints or faces in seconds to find a match, i.e. credential.&nbsp; This credential cannot be copied or transferred to another person ensuring that only the authorized person gains access.&nbsp; Cards, PINs and passwords are easily transferred. <br><br> FaceKey’s physical access control products utilize fingerprint and face recognition for identification in four ways: (1) fingerprint recognition only; (2) face recognition only; (3) fingerprint plus face recognition; and (4) a biometric plus a card reader of choice.&nbsp; Generally speaking the more identifiers used the higher the level of security and the slower the process.&nbsp; <br><br> So which biometric product to use for the job at hand.&nbsp; &nbsp;&nbsp;Some issues to discuss is the number of users as different products have different capacities and different prices and you don’t want to overbuy.&nbsp; Will the product be outside?&nbsp; And do users have soiled hands, carry things or have clean hands such as in surgery suites which would indicate the need for face recognition.&nbsp; <br><br> All biometrics are not created equal!&nbsp; Biometrics can provide more physical security, more certainty about the “who”, more privacy, cost savings and on and on.&nbsp; Whether the application is for one door or a multinational installation, the most important consideration is whether or not the product is right for the application.&nbsp; Customers and integrators should beware of selecting a biometric product based on cost alone. &nbsp;FaceKey has replaced many biometric readers that failed.<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette H. Starkweather on 15th July, 2014 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/07/15/biometrics-is-not-new-#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/07/15/biometrics-is-not-new-#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/07/15/biometrics-is-not-new-">Permalink</a><br>Tags: <a href="/index.html?Action=BlogArchive&Blog=4d9637cab02bd198f02f558b&TagID=4e61508d18dd43925af28593" title="32 more posts in Face Recognition Access Control">Face Recognition Access Control</a>, <a href="/index.html?Action=BlogArchive&Blog=4d9637cab02bd198f02f558b&TagID=4e61508d57a145f0ec4007b0" title="30 more posts in Face Recognition Systems">Face Recognition Systems</a>, <a href="/index.html?Action=BlogArchive&Blog=4d9637cab02bd198f02f558b&TagID=4e61508d7f3b541a3bf20fa6" title="31 more posts in Face Recognition Time Clocks">Face Recognition Time Clocks</a>, <a href="/index.html?Action=BlogArchive&Blog=4d9637cab02bd198f02f558b&TagID=4e614fabb5ad1de2150b7354" title="31 more posts in Building Security Systems">Building Security Systems</a>, <a href="/index.html?Action=BlogArchive&Blog=4d9637cab02bd198f02f558b&TagID=4d95f48183121ab6bf107642" title="40 more posts in Biometric Access Control">Biometric Access Control</a>, <a href="/index.html?Action=BlogArchive&Blog=4d9637cab02bd198f02f558b&TagID=50918719e9fef35ab3627ef5" title="13 more posts in Biometric Authentication">Biometric Authentication</a>, <a href="/index.html?Action=BlogArchive&Blog=4d9637cab02bd198f02f558b&TagID=4d95f481cc6975f6790a0324" title="39 more posts in Facekey Security Access Control">Facekey Security Access Control</a>, <a href="/index.html?Action=BlogArchive&Blog=4d9637cab02bd198f02f558b&TagID=4dd57b75d086573ff43b08a2" title="29 more posts in Time and Attendance">Time and Attendance</a>, <a href="/index.html?Action=BlogArchive&Blog=4d9637cab02bd198f02f558b&TagID=4e614fabba9e204b3e21a1c8" title="30 more posts in Security Systems">Security Systems</a>, <a href="/index.html?Action=BlogArchive&Blog=4d9637cab02bd198f02f558b&TagID=4d95f4816c73d80b73e4ea65" title="38 more posts in Fingerprint Access Control">Fingerprint Access Control</a></span></p> Tue, 15 Jul 2014 20:17:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/07/15/biometrics-is-not-new- Face Recognition Access ControlFace Recognition SystemsFace Recognition Time ClocksBuilding Security SystemsBiometric Access ControlBiometric AuthenticationFacekey Security Access ControlTime and AttendanceSecurity SystemsFingerprint Access Control Our 2014 Catalog has a New Face http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/06/13/our-2014-catalog-has-a-new-face <h3 class="style45750">Our 2014 Catalog has a New Face</h3><br> <div class="style45759"><span class="style45758">The 2014 catalog has a new format. &nbsp;A drawing on page 3 shows the entire security access control system and how it is used. &nbsp;Beginning on page 5 there is a photo of each &nbsp;product and its features. Click on the photo of the product for a detailed data sheet. On the home page, click the button above on your right for a quick download.<br><br>Was the new format helpful? &nbsp;We would like to have your comments and any suggestions to make the catalog more helpful. For additional information, give FaceKey a call at 210-826-8811 or email to info@facekey.com.<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette H. Starkweather on 13th June, 2014 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/06/13/our-2014-catalog-has-a-new-face#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/06/13/our-2014-catalog-has-a-new-face#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/06/13/our-2014-catalog-has-a-new-face">Permalink</a><br>Tags: </span></p> Fri, 13 Jun 2014 15:34:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/06/13/our-2014-catalog-has-a-new-face FaceKey Biometric Access Control Reduces Customer Costs and Increases Integrator Profits http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/05/06/facekey-biometric-access-control-reduces-customer-costs-and-increases-integrator-profits <h3 class="style45750">FaceKey Biometric Access Control Reduces Customer Costs and Increases Integrator Profits</h3><br> <div class="style45759"><span class="style45759">Cost and the level of security access control are always of key importance to customers.&nbsp; FaceKey’s biometric access control products offer integrators a new solution:&nbsp; a higher level of security and cost savings for customers and larger profit margins for integrators.&nbsp; The design of the system reduces costs for both the customer and the integrator.&nbsp;<br><br>The biometric access control promises true security and cost savings to the customer:&nbsp;<br><br></span><span class="style45759">· &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A higher level of security which cards cannot provide, <br>· &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; No cards to manage, <br>· &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Saves time on installation, <br>· &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Less cabling is required;&nbsp; maximizes the usage of the corporate network, and <br>· &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In house management if desired.<br><br> Typical savings to the integrator are about 25%: &nbsp;&nbsp;<br><br></span><span class="style45759">· &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;Reduced installation costs, products are Ethernet based (TCP/IP) removing the need for multiple wires..&nbsp;<br>· &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Saves hours, reduction of a major cost,&nbsp;<br>· &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Saves training time. Training is usually completed in less than four hours, and <br>· &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Saves setup time.&nbsp;&nbsp;&nbsp;<br><br> FaceKey’s training and customer service provides best in the world support.&nbsp;&nbsp;You get real answers by talking to a real person, not a contracted call service center or automated phone system. <br><br> · &nbsp; &nbsp; &nbsp; &nbsp; Saves time on training, usually 2 to 3 hours at FaceKey’s office or via Go-To Meeting.<br><br></span><span class="style45759">Training and customer support does not stop after the initial training class: FaceKey supports its software and hardware for one full year without addition cost. &nbsp;<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette H. Starkweather on 6th May, 2014 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/05/06/facekey-biometric-access-control-reduces-customer-costs-and-increases-integrator-profits#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/05/06/facekey-biometric-access-control-reduces-customer-costs-and-increases-integrator-profits#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/05/06/facekey-biometric-access-control-reduces-customer-costs-and-increases-integrator-profits">Permalink</a><br>Tags: </span></p> Tue, 06 May 2014 20:25:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/05/06/facekey-biometric-access-control-reduces-customer-costs-and-increases-integrator-profits United Security Alliance, Tampa, FL likes FaceKey's Biometric Products http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/04/16/united-security-alliance--tampa--fl-likes-facekey-s-biometric-products <h3 class="style45750">United Security Alliance, Tampa, FL likes FaceKey's Biometric Products</h3><br> <div class="style45759"><div style="margin-left: 0px; margin-right: 0px; margin-bottom: 0px; margin-top: 0px; width: 229px; text-align: left;"><img id="tb_53c5d79ed9341407721cd21a_im_28700081" src="http://www.facekey.com/images/229/0/usa-traning-3-26-14-sized.jpg" style="border:0;display:block;width:229px;height:253px;"></div><br><span class="style45753">Under the vision and direction of President Terry Ottinger, United Security Alliance (usasolutions.com) has created comprehensive turnkey programs nationwide that have withstood the test of time since 1985.&nbsp;&nbsp;Based in Tampa, FL, Terry is a believer in training for personnel, using the best technology, to provide&nbsp; a turnkey solution that includes design, installation, service, and support. <b>&nbsp;</b><br><br></span><h3 class="style45752"><b>Why Terry likes Biometrics for Access Control and Time &amp; Attendance<br></b><br></h3><span class="style45753">“Biometrics are without question, the most secure solution for access control and the most accurate for time and attendance .&nbsp; Unlike traditional card-based systems, biometrics (fingers and faces) cannot be shared, duplicated, lost, stolen, or left somewhere else. This relieves the burden of card management which often plagues management and human resources, which is both costly and time consuming.”<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette H. Starkweather on 16th April, 2014 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/04/16/united-security-alliance--tampa--fl-likes-facekey-s-biometric-products#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/04/16/united-security-alliance--tampa--fl-likes-facekey-s-biometric-products#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/04/16/united-security-alliance--tampa--fl-likes-facekey-s-biometric-products">Permalink</a><br>Tags: </span></p> Wed, 16 Apr 2014 20:35:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/04/16/united-security-alliance--tampa--fl-likes-facekey-s-biometric-products Biometrics: Knowing "WHO" Matters http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/02/03/biometrics---knowing--who--matters <h3 class="style45750">Biometrics: Knowing "WHO" Matters</h3><br> <div class="style45759"><span class="style45759">Biometric technologies increase security, reduce risk and make us safer because knowing “who” matters if you are really serious about safety and security.&nbsp;<br><br>Commonly thought to be new technology, biometrics was used as early as 30,000 years ago, when authors of paintings on cave walls left their signature handprints to identify themselves.&nbsp; In 1891 &nbsp;fingerprints of criminals in Argentina were&nbsp;collected and are thought to be t he earliest cataloging of fingerprints. &nbsp; The common thread from 30,000 years ago to today is that it matters who I am. With today’s large and growing population, our relationships and transactions are no longer limited to the people in our village as in ancient times.&nbsp; And as terrific as our brain is, we cannot always remember names and faces.&nbsp;<br><br>The objective of an access control system is to manage where authorized people are granted access. &nbsp; Using your typical access control card access system, entry is granted if the card or credential as presented has the right number. &nbsp; Any person can be holding the card as the system does not care. &nbsp;&nbsp; Card manufacturers’ solution to this issue of inability to authenticate the identity of the user has been to produce new cards with more options that are more expensive but do not and cannot authenticate the identity of the holder of the card. &nbsp; &nbsp; &nbsp;&nbsp;&nbsp;<br><br>Management is still dependent upon the honesty and integrity of the person that holds the card.&nbsp; More bells and whistles for this credential are not a cure. Is the future of the security systems integrator going to be as a vendor that sells and installs sub quality systems, i.e. card reader systems, that will not and cannot authenticate the “who” of the card holder. &nbsp;<br>For more information about how biometrics can save you money, and increase safety and security, <a href="http://www.facekey.com/download/Biometrics is a Win Win for both the Customer and the Security Integrator.pdf">click here</a>.<br><br></span><span class="style45758"><br><center><br></center><br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette H. Starkweather on 3rd February, 2014 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/02/03/biometrics---knowing--who--matters#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/02/03/biometrics---knowing--who--matters#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/02/03/biometrics---knowing--who--matters">Permalink</a><br>Tags: </span></p> Mon, 03 Feb 2014 15:18:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2014/02/03/biometrics---knowing--who--matters Who Says Biometrics don't Work Outdoors http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/12/10/who-says-biometrics-don-t-work-outdoors <h3 class="style45750">Who Says Biometrics don't Work Outdoors</h3><br> <div class="style45759"><span class="style45759"><div style="margin-left: 0px; margin-right: 0px; margin-bottom: 0px; margin-top: 0px; width: 98px;; text-align: left;"><img id="tb_53c5d79e1de9c51480c5ca06_im_27936097" src="http://www.facekey.com/images/93/0/roy-using-fk-product.jpg" style="border:0;display:block;width:93px;height:124px;"></div>Who says that biometrics doesn’t work outdoors.&nbsp; During a recent visit to Dallas, FaceKey visited with an early customer to check out the performance of its EntryGuard Access Control unit. <br><br> Roy Marin with Wunderlich-Malec Systems Inc., was happy to show us how the product still works despite the severe weather in the Dallas area.&nbsp; This product installed in February 2004 has been out in the elements without cover or protection for almost 9 years.&nbsp; During these 9 years, Roy has not reenrolled his fingerprint nor have any repairs been made to the unit. <br><br> FaceKey prides itself on building products that provide the ultimate in identification of authorized persons, are cost effective and reliable.&nbsp;&nbsp;<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by A H Starkweather on 10th December, 2013 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/12/10/who-says-biometrics-don-t-work-outdoors#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/12/10/who-says-biometrics-don-t-work-outdoors#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/12/10/who-says-biometrics-don-t-work-outdoors">Permalink</a><br>Tags: </span></p> Tue, 10 Dec 2013 22:49:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/12/10/who-says-biometrics-don-t-work-outdoors Customer Service Makes the Difference http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/10/18/customer-service-makes-the-difference- <h3 class="style45750">Customer Service Makes the Difference </h3><br> <div class="style45759"><span class="style45759"><div style="margin-left: 0px; margin-right: 0px; margin-bottom: 0px; margin-top: 0px; width: 145px;;cursor: pointer; z-index: 5; text-align: left;"><div style="position: relative;"><img src="/resources/magnifying-glass-24x24.png" style="position: absolute; width: 24px; right: 4px; bottom: 4px;"><img id="tb_53c5d79e230f8e2f50c7155d_im_27488982" onclick="$.facebox.settings.displayCloseAtTop = true; $.facebox({image:'http://www.facekey.com/images/0/0/michael-long-1-10-11-13-sm.jpg'});" src="http://www.facekey.com/images/140/0/michael-long-1-10-11-13-sm.jpg" style="border:0;display:block;width:140px;height:142px;"></div><br style="clear: left;"><wg:caption><span style="background-color:transparent;font-family:Arial,sans-serif;font-size:12px;color:#333333;font-weight:normal;text-decoration:none;font-style:normal;text-align:left;padding:0px 0px 0px 0px;margin:0px 0px 0px 0px;line-height:1.1em;">Michael Long likes FaceKey face recognition and support. </span></wg:caption></div><br>FaceKey is doing what it takes to make a difference for every customer. &nbsp; That difference, customer service, for large and small customers will truly change the benefits you receive from the FaceKey products. &nbsp; To be a great success, a system requires not just the best technologies and products, but also the best of service and support.&nbsp;<br> <br> No more call centers. &nbsp; A real live person will take your call or talk to your integrator during planning or installation and when something happens. &nbsp; A person that knows your system very well. &nbsp; Just this week a new customer noted: “While we had a small project (two units) we were made to feel as if we had a really large project in terms of the attention we received. &nbsp; They were always there with the right answer each and every time they were needed.”&nbsp;<br> <br> FaceKey’s dedicated team wants to make sure that our biometric systems using fingerprints and/or faces for identification provide the level of security promised and relieves you of the worries and inconveniences common to a typical system and their related costs.&nbsp;<br> <br> FaceKey manufactures three security products: &nbsp; access control, time and attendance and muster systems. &nbsp; The products use biometrics, i.e. faces or fingerprints for ultimate identification.</span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 18th October, 2013 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/10/18/customer-service-makes-the-difference-#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/10/18/customer-service-makes-the-difference-#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/10/18/customer-service-makes-the-difference-">Permalink</a><br>Tags: </span></p> Fri, 18 Oct 2013 14:32:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/10/18/customer-service-makes-the-difference- Homrighaus on the Future of Security http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/02/18/homrighaus-on-the-future-of-security <h3 class="style45750">Homrighaus on the Future of Security</h3><br> <div class="style45759"><span class="style45750"><div style="margin-left: 0px; margin-right: 5px; margin-bottom: 5px; margin-top: 0px; width: 125px;; float: left;"><a href="http://youtu.be/lfJ-mJIk0rg" target="_blank"><img id="tb_53c5d79ecd6d77209ccdb26c_im_26677750" src="http://www.facekey.com/images/120/0/henry.jpg" style="border:0;display:block;width:120px;height:167px;"></a></div><a href="http://youtu.be/lfJ-mJIk0rg" target="_blank"> </a><a href="http://www.professionalsecurityconsulting.com/company-bio/" target="_blank">Henry Homrighaus</a>, the security industry's premier spokesman, reference and futurist, was recently interviewed by FaceKey Biometric's YouTube channel.<br><br> Mr. Homrighaus speaks about the state of security in the world today. &nbsp;He discusses the threats posed by current technologies designed to&nbsp;infiltrate&nbsp;our secure environments, the 'ultimate credential', and the only logical solution to those threats.<br><br> Please&nbsp;<a href="http://youtu.be/lfJ-mJIk0rg" target="_blank">click here</a>&nbsp;to see the summary video of Mr. Homrighaus' comments.<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 18th February, 2013 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/02/18/homrighaus-on-the-future-of-security#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/02/18/homrighaus-on-the-future-of-security#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/02/18/homrighaus-on-the-future-of-security">Permalink</a><br>Tags: </span></p> Mon, 18 Feb 2013 06:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2013/02/18/homrighaus-on-the-future-of-security Hotel Locks Completely Vulnerable http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/12/17/hotel-locks-completely-vulnerable <h3 class="style45750">Hotel Locks Completely Vulnerable</h3><br> <div class="style45759"><span class="style45750"><div style="margin-left: 20px; margin-right: 5px; margin-bottom: 3px; margin-top: 3px; width: 125px;; float: right;"><img id="tb_53c5d79e8e402edfabdf6163_im_26537550" src="http://www.facekey.com/images/120/0/hotel-lock.jpg" style="border:0;display:block;width:120px;height:115px;"></div>When you lock your hotel door, you assume both you and your belongings are safe, but thieves have developed a simple device that can unlock hotel doors in potentially millions of rooms. NBC's Jeff Rossen investigates.<br><br></span><span class="style45750">This is a very real crisis...worldwide.&nbsp;&nbsp;<br> <a href="http://todaynews.today.com/_news/2012/12/06/15703318-rossen-reports-new-device-lets-crooks-crack-many-hotel-locks" target="_blank">Click here</a> to read the story in its entirety.<br><br></span><span class="style45756">What do you think?<br> <a href="mailto:info@facekey.com">Email us</a> and let us know your thoughts...<br><br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 17th December, 2012 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/12/17/hotel-locks-completely-vulnerable#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/12/17/hotel-locks-completely-vulnerable#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/12/17/hotel-locks-completely-vulnerable">Permalink</a><br>Tags: </span></p> Mon, 17 Dec 2012 06:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/12/17/hotel-locks-completely-vulnerable FaceKey and Choice Partners Helps the Harris County DoE http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/10/30/facekey-and-choice-partners-helps-the-harris-county-doe <h3 class="style45750">FaceKey and Choice Partners Helps the Harris County DoE</h3><br> <div class="style45759"><h1 class="style45751"><div style="margin-left: 20px; margin-right: 20px; margin-bottom: 20px; margin-top: 0px; width: 125px;; float: left;"><img id="tb_53c5d79e9d3d40b3b9aeaa67_im_26424073" src="http://www.facekey.com/images/120/0/cp-logo-ach.png" style="border:0;display:block;width:120px;height:125px;"></div>Harris County Department of Education decided to make purchasing even easier for its members.&nbsp; Combining all contract procurement services for facilities, food, supplies and services the newly formed CHOICE PARTNERS will make it easier for client members to access the contracts they need.&nbsp; Of course, FaceKey is an important vendor member, and offers its products and services to the former Choice Facility Partners, the HCDE Purchasing Cooperative and the Gulf Coast Food Co-op.<br><br></h1><h1 class="style45751"><div style="margin-left: 20px; margin-right: 20px; margin-bottom: 20px; margin-top: 10px; width: 101px;; float: right;"><img id="tb_53c5d79eba3154889e89625f_im_26424074" src="http://www.facekey.com/images/96/0/felix-little.png" style="border:0;display:block;width:96px;height:96px;"></div>This past Friday, CHOICE PARTNERS had a vendor fair for its members.&nbsp; Members were there to see the latest in everything from pencils to school buses, form software to professional services...and EVERYTHING in between!&nbsp;&nbsp;<a href="mailto:ylevitov@facekey.com">Yevgeny </a>and <a href="mailto:astarkweather@facekey.com">Annette&nbsp;</a>manned the booth, and in addition to making new contacts, had a great time at the western-themed event.&nbsp; They had a chance to visit with some old friends and customers, and gave away an leather iPad case, emblazened with&nbsp;the FaceKey 'Felix' mascot (see at right).<br><br></h1><h1 class="style45751"><div style="margin-left: 20px; margin-right: 20px; margin-bottom: 20px; margin-top: 20px; width: 123px;; float: left;"><img id="tb_53c5d79fba08b71fbc246e8b_im_26424076" src="http://www.facekey.com/images/118/0/hcde.png" style="border:0;display:block;width:118px;height:98px;"></div>The Harris County initiative essentially connects schools, universities, municipalities, counties, and other agencies, and allows them to simplify their procurement procedures by using contracts available through Choice Partners.&nbsp; Contracts are awarded based on quality, quantity, reputation and references, pricing, ability to work with governmental agenices,and other factors.&nbsp; The HCDE has been in existence for 120+ years and is a governmental entity with taxing authority.&nbsp; HCDE's mission is to ensure school success, improve systems and to save time and money.<br><br></h1><h1 class="style45751"><center><div style="margin-left: 0px; margin-right: 0px; margin-bottom: 10px; margin-top: 10px; width: 400px;; text-align: center;"><img id="tb_53c5d79f1e695b8d4f23a8c4_im_26424078" src="http://www.facekey.com/images/395/0/memo0007-2.jpg" style="border:0;display:block;width:395px;height:296px;"></div></center><center><strong>FaceKey is proud to be a Choice Partners&nbsp;Awarded Contract Holder.</strong></center><br></h1></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 30th October, 2012 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/10/30/facekey-and-choice-partners-helps-the-harris-county-doe#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/10/30/facekey-and-choice-partners-helps-the-harris-county-doe#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/10/30/facekey-and-choice-partners-helps-the-harris-county-doe">Permalink</a><br>Tags: </span></p> Tue, 30 Oct 2012 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/10/30/facekey-and-choice-partners-helps-the-harris-county-doe FaceKey Marketplace Creates Geekdom Check-in http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/09/25/facekey-marketplace-creates-geekdom-check-in <h3 class="style45750">FaceKey Marketplace Creates Geekdom Check-in</h3><br> <div class="style45759"><span class="style45754"><strong>FaceKey Marketplace Creates Geekdom Check-in</strong><br><br></span><span class="style45757">Thanks to a summer internship by <a href="http://web.trinity.edu/" target="_blank">Trinity University</a> student <a href="https://www.facebook.com/ralph.minderhoud" target="_blank">Ralph Minderhoud</a>, FaceKey Corporation created a unique and convenient method for <a href="http://www.geekdom.com" target="_blank">Geekdom</a> members to check in and let other members know they are present.&nbsp; By utlizing FaceKey's FKFP-Pro facial recognition and fingerprint scan device coupled with the FaceKey Marketplace application, Geekdom members simply walk up to the device, present their credentials (their face) and <strong>BEEP</strong>, they appear on the Geekdom check-in board!<br><br></span><span class="style45757"><div style="margin-left: 0px; margin-right: 0px; margin-bottom: 0px; margin-top: 0px; width: 110px;; float: right;"><img id="tb_53c5d79ff66fc5c9407ed58e_im_26335263" src="http://www.facekey.com/images/105/0/img-20120919-124653.jpg" style="border:0;display:block;width:105px;height:140px;"></div>"Geekdom's mission is to provide an environment for like-minded people to explore ideas in entrepreneurship, technology, leadership, and creativity.&nbsp; It is critical that members have access to each other, and the check-in board is a big part of our collaborative effort."&nbsp; says <a href="http://www.linkedin.com/in/nicklongo" target="_blank">Nick Longo</a>, Director of Geekdom.<br><br></span><span class="style45757">"The previous check in method was cumbersome." says Geekdom Events Coordinator, <a href="http://www.facebook.com/jeremykoester" target="_blank">Jeremy Koester</a>.&nbsp; "Members had to log in to their profile page or to their Foursquare account, and most were not doing that.&nbsp; Now all we do is walk by the device and we're checked in."<br><br></span><span class="style45757"><div style="margin-left: 0px; margin-right: 0px; margin-bottom: 0px; margin-top: 0px; width: 170px;; float: left;"><img id="tb_53c5d79feb09a24833149342_im_26328666" src="http://www.facekey.com/images/165/0/geekdomcheckin.jpg" style="border:0;display:block;width:165px;height:124px;"><br style="clear: left;"><wg:caption><span style="background-color:transparent;font-family:Arial,sans-serif;font-size:12px;color:#333333;font-weight:normal;text-decoration:none;font-style:normal;text-align:left;padding:0px 0px 0px 0px;margin:0px 0px 0px 0px;line-height:1.1em;">Geekdom members discuss the new FaceKey check-in device</span></wg:caption></div>The same FaceKey technology is being beta-tested by coffee shops and retailers to allow business owners to know who is in their establishment in real-time.&nbsp; This helps them create a better customer service experience, and provide analytical business reports for the creation of deals and customer coupons. Customers voluntarily enroll, and benefit by enhanced customer service (the clerks know their name and recognize their picture/face) and allow them&nbsp; to post check-ins to Foursquare, Facebook or Twitter.<br><br></span><span class="style45757">"In the past year, we have built visitor systems, muster systems, and mobile biometric information readers.&nbsp; The FaceKey Marketplace effort gives us a platform to build new applications for biometric technologies, but always from the perspective of personal security, and with a 'trusted community' approach." says Yevgeny Levitov, President of FaceKey Corporation.&nbsp; "We are very excited that the developers' and coders' communities see the merit of our products.&nbsp; We are very&nbsp;proud of our Geekdom collaboration."<br><br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 25th September, 2012 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/09/25/facekey-marketplace-creates-geekdom-check-in#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/09/25/facekey-marketplace-creates-geekdom-check-in#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/09/25/facekey-marketplace-creates-geekdom-check-in">Permalink</a><br>Tags: </span></p> Tue, 25 Sep 2012 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/09/25/facekey-marketplace-creates-geekdom-check-in ASIS 2012 Philadelphia shows a lot of love to FaceKey http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/09/21/asis-2012-philadelphia-shows-a-lot-of-love-to-facekey <h3 class="style45750">ASIS 2012 Philadelphia shows a lot of love to FaceKey</h3><br> <div class="style45759"><span class="style45750"><strong>ASIS 2012 was very exciting!</strong><br><br> <a href="mailto:ylevitov@facekey.com">Yevgeny Levitov</a> and <a href="mailto:jmschechter@facekey.com">Joshua Schechter </a>attended the show as representatives of <a href="http://www.facekey.com/" target="_blank">FaceKey Corporation</a>.&nbsp; The city of Philadelphia was hopping with all the security industry people in town, and the Pennsylvania Convention Center was PACKED!<br><br> All the usual suspects were exhibiting this year, and the emphasis appeared to be on video and video analytics.&nbsp; Everything appears to be going more and more towards IP-based systems, which is great news for <a href="http://www.facekey.com/" target="_blank">FaceKey</a>, as all FaceKey products are network addressable right out of the box.<br><br></span><span class="style45750"><div style="margin-left: 10px; margin-right: 0px; margin-bottom: 0px; margin-top: 0px; width: 326px;; float: right;"><img id="tb_53c5d79f68aa0f5b9e326654_im_26328670" src="http://www.facekey.com/images/321/0/p1030514.jpg" style="border:0;display:block;width:321px;height:241px;"><br style="clear: left;"><wg:caption><span style="background-color:transparent;font-family:Arial,sans-serif;font-size:12px;color:#333333;font-weight:normal;text-decoration:none;font-style:normal;text-align:left;padding:0px 0px 0px 0px;margin:0px 0px 0px 0px;line-height:1.1em;">Richard Goldsobel of Continental Access Systems</span></wg:caption></div>A HUGE thank you to our dear friend and constant supporter <a href="mailto:rgoldsobel@cicaccess.com">Richard Goldsobel </a>from <a href="http://www.cicaccess.com/" target="_blank">Continental Access</a>. Richard was nice enough to make sure that our best-selling&nbsp;facial recognition scanner, the FKFP, was featured prominently as a peripheral device on one of the Continental panel displays.&nbsp; He also arranged an early morning meeting with his access control team to get familiar with the <a href="#" target="_blank">FaceKey product line</a>. We are extremely excited about the opportunity to integrate our products into&nbsp;NAPCO's Continental Access systems.<br><br></span><span class="style45750">Yevgeny and Josh enjoyed meeting up with their customers, resellers,&nbsp;old friends, and industry contacts.&nbsp; It was a hugely successful vist to the city of brotherly love...<br><br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 21st September, 2012 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/09/21/asis-2012-philadelphia-shows-a-lot-of-love-to-facekey#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/09/21/asis-2012-philadelphia-shows-a-lot-of-love-to-facekey#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/09/21/asis-2012-philadelphia-shows-a-lot-of-love-to-facekey">Permalink</a><br>Tags: </span></p> Fri, 21 Sep 2012 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/09/21/asis-2012-philadelphia-shows-a-lot-of-love-to-facekey FaceKey President Responds to Security System News Article http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/08/16/facekey-president-responds-to-security-system-news-article <h3 class="style45750">FaceKey President Responds to Security System News Article</h3><br> <div class="style45759"><span class="style45748"><strong>Dr. Yevgeny Levitov, PhD., responds to a Security System News Article</strong><br><br></span><span class="style45750"><strong>Dr. Yevgeny Levitov, PhD., responded today to an article published in the Security System News publication titled "<a href="http://www.facekey.com/download/Page_21_SSN_7-2012__issue_7_.pdf" target="_blank">Corrections gradually embraces innovative access control</a>".&nbsp; To read the original article, please </strong><a href="http://www.facekey.com/download/Page_21_SSN_7-2012__issue_7_.pdf" target="_blank"><strong>click here</strong></a><strong>, or </strong><a href="http://ssn.epubxp.com/i/71376" target="_blank"><strong>click here</strong></a><strong> for the SSN Digital Edition, page 21.<br><br> Dr. Levitov's response is printed below:</strong><br><br></span><span class="style45757"><em><strong>Response to "Corrections gradually embraces innovative access control" July 2012, Security Systems News</strong></em><br><hr> Your article contained so many inaccuracies it is simply embarrassing.<br><br> Firstly, barring surgical alteration, fingerprints remain the same with non-critical age changes.&nbsp; With an appropriate biometric algorithm deployed, accuracy rates in the 0.00001 FPP range are easily achieved. Reliable, accurate IP-based fingerprint scanners utilizing HD camera - NOT minutiae point analysis&nbsp; - can actually be LESS expensive (as a system) than HID card systems, AND can actually save the end-user money by having NO consumables (cards, lanyards, etc.) and no 'buddy' or theft punching.&nbsp; Greg Hudson of Genesis Concepts and Consultants says: “…whoever we put into the system is the person gaining access to our facility.&nbsp; With keys, PINs and cards, we suffered losses, piggy-backing and duplication, so we lost accuracy.&nbsp; Our fingerprint system has had 100% accuracy”.<br><br> Suggesting that iris and vein scanning would be more reliable than fingerprinting is another example of misinformation. There is no comprehensive report on how shooting a laser in one's iris repeatedly over&nbsp;&nbsp; years is safe.&nbsp; Daily, veins constrict and fluctuate due to diet. And facial recognition?&nbsp; There is no mention of this highly reliable technology for industrial applications, as readers plummet to the $1500 and below price?<br><br> The contributors to this article seem focused on what they can sell and service at the highest possible price and do not seem concerned about customer needs.&nbsp; Our industry is changing, and we need to start understanding, embracing and specifying accurate technologies, and the appropriate applications of those technologies if we are truly going to serve our customers in the future.<br><br> Respectfully, <br><br> <br>Yevgeny B. Levitov<br>President, FaceKey Corporation<br><a href="http://www.facekey.com/" target="">www.facekey.com</a><br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 16th August, 2012 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/08/16/facekey-president-responds-to-security-system-news-article#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/08/16/facekey-president-responds-to-security-system-news-article#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/08/16/facekey-president-responds-to-security-system-news-article">Permalink</a><br>Tags: </span></p> Thu, 16 Aug 2012 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/08/16/facekey-president-responds-to-security-system-news-article Opposing Views on Biometrics http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/07/25/opposing-views-on-biometrics <h3 class="style45750">Opposing Views on Biometrics</h3><br> <div class="style45759"><span class="style45750"><center> <strong>What is your opinion about biometrics?&nbsp;&nbsp;</strong><br><br> </center><center></center><br><br></span><h1 class="style45751"><center><a href="http://www.usatoday.com/tech/news/surveillance/2010-09-27-biometrics27_ST_N.htm" target="_blank"><strong>DAY CARE CENTERS TURN TO BIOMETRICS</strong></a></center><center><br><br><center></center><center><a href="http://www.usatoday.com/tech/news/surveillance/2010-09-27-biometrics27_ST_N.htm" target="_blank"><strong>REPORT QUESTIONS BIOMETRIC TECHNOLOGIES</strong></a></center></center><br><br></h1><h1 class="style45751"><center><strong>Read these two opposing viewpoints</strong></center><center><strong>then share your thoughts on our</strong></center><center><a href="http://www.facebook.com/FaceKeyCorp" target="_blank"><strong>facebook page</strong></a><strong>!</strong></center><br></h1></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 25th July, 2012 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/07/25/opposing-views-on-biometrics#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/07/25/opposing-views-on-biometrics#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/07/25/opposing-views-on-biometrics">Permalink</a><br>Tags: </span></p> Wed, 25 Jul 2012 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/07/25/opposing-views-on-biometrics "You can't change your fingerprint and you can't change your face" http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/07/19/-you-can-t-change-your-fingerprint-and-you-can-t-change-your-face- <h3 class="style45750">"You can't change your fingerprint and you can't change your face"</h3><br> <div class="style45759"><span class="style45753"><strong><em>"You can't change your fingerprint and you can't change your face".</em></strong><br></span><span class="style45759">&nbsp;<br><br> That is the statement made by Democratic Senator <a href="http://en.wikipedia.org/wiki/Al_franken" target="_blank">Al Franken </a>of Minnesota, chairman of the Judiciary Subcommittee on Privacy, Technology and the Law. Read<a href="http://www.nextgov.com/big-data/2012/07/fbi-track-book-faces-scars-tattoos-2014/56876/" target="_blank"> this article </a>to see what the FBI is doing, and how the technology that FaceKey employs in its facial recognition scanning device (FKFP) is being deployed. FaceKey's President, <a href="http://www.linkedin.com/in/yevgenylevitov" target="_blank">Yevgeny Levitov</a>, stated that the facial recognition systems described in this article are: "exactly the right approach to the problem. Infrared is the most cost effective and accurate way to capture the data the FBI is looking for. Combining traditional facial recognition with infrared technologies will reduce false positives and have highest accuracy at lowest cost".<br><br></span><span class="style45759">According to Stanley Derr, President of SED Technology, LLC, infrared facial recognition technology is considered very reliable because factors such as environmental conditions or a subject’s clogged arteries or spider vein removal won’t change that pattern. Cosmetic surgery or scarring, “may shrink your blood vessels, but it does not do away with them,” he said. “To really change the major blood vessels in your face you have to go deep enough that you have a real chance of killing the person.”<br><br> On a similar note, FaceKey is charting new territory with its FaceKey Biometric API that is due to be released this fall. It will allow small business, industry and government to use FaceKey's patented algorithms, and build custom applications around their highly accurate infrared facial recognition technology. Bookmark and check back <a href="http://www.facekey.com/biometrics-developers-facekey" target="_blank">here</a> often for updates on our development.<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 19th July, 2012 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/07/19/-you-can-t-change-your-fingerprint-and-you-can-t-change-your-face-#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/07/19/-you-can-t-change-your-fingerprint-and-you-can-t-change-your-face-#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/07/19/-you-can-t-change-your-fingerprint-and-you-can-t-change-your-face-">Permalink</a><br>Tags: </span></p> Thu, 19 Jul 2012 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/07/19/-you-can-t-change-your-fingerprint-and-you-can-t-change-your-face- Evidence Rooms http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/06/29/evidence-rooms <h3 class="style45750">Evidence Rooms</h3><br> <div class="style45759"><span class="style45758"><strong>FaceKey Biometrics</strong><strong><br>Protects Evidence for Trial<br></strong> <div align="right"></div>The purpose of evidence rooms is to catalog and protect the evidence collected from crime scenes and ensure that the evidence will not be contaminated for future court proceedings. The chain of custody is key to a successful outcome of any court trial. Law enforcement must be able to show that access to the evidence room is controlled to protect the chain of custody. Today, police department’s evidence rooms are generally secured with a simple lock and key, a proximity card, and/or a PIN code. These systems of security can easily be compromised by theft, copying, sharing or loss.<br><br> Biometric technology can provide law enforcement with the highest accountability possible. Biometric access ensures that only authorized personnel can gain access to evidence rooms. Records and reports form an accurate and accountable audit trail of access, egress and amount of time an individual spent in the evidence room. A biometric access control system will protect law enforcement personnel rom fraudulent claims of tampering with the evidence, and the chain of custody is strengthened when cases go to trial.<br><br> George Little, a 14 year veteran evidence room custodian and current Director of the Institute for Criminal Justice Studies at Texas State University, cited this recent problem as just one example of the shortcomings of the current evidence room model: <br><br> <a href="http://gritsforbreakfast.blogspot.com/2010/04/500-guns-missing-from-tx-police.html" target=""><strong><em>GUNS MISSING FROM TEXAS POLICE</em></strong></a><em> </em><br><br> Mr. Little stated that new safeguards must be put in place to stop the tampering of evidence rooms. He suggested that biometric access control can tie into a video surveillance system and complete a 100% accountable, reliable and accurate chain of custody model.<br><br> <center>Thank you to the following individuals for their contributions to this document:<br><br> Lieutenant Robert Guilbault<br>Los Angeles County Sheriff’s Department<br><br> George Little<br> Director, Institute for Criminal Justice Studies<br> Texas State University</center><br><br> FaceKey Corporation of San Antonio, TX, a Texas corporation, is the developer of a new generation of access control, time and attendance and muster products. These products utilize the newest biometric technologies (face recognition or fingerprint recognition) and the best of the traditional card-based technologies. All the products are designed to be compatible with the existing computer networks common in business today. The open architecture ensures that the system is easily scalable; easily customized so that new modules and features can be added; and that the system can be quickly and easily installed. FaceKey Corporation technologies featuring face recognition are based upon landmark patents.<br></span><br></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starweather on 29th June, 2012 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/06/29/evidence-rooms#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/06/29/evidence-rooms#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/06/29/evidence-rooms">Permalink</a><br>Tags: </span></p> Fri, 29 Jun 2012 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/06/29/evidence-rooms FaceKey Device featured in 'Man on a Ledge' http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/05/29/facekey-device-featured-in--man-on-a-ledge- <h3 class="style45750">FaceKey Device featured in 'Man on a Ledge'</h3><br> <div class="style45759"><span class="style45748"><strong><em>FaceKey Device featured in 'Man on a Ledge'</em><br></strong><br></span><span class="style45750"><br><br> Summit Entertainment, LLC did their homework.&nbsp; <br><br> When they wanted a biometric device for their movie <strong>'Man on a Ledge'</strong>, they wanted a device that would really work, and was not just a mock up, or faked version&nbsp;of a security access control device.&nbsp; <strong>FaceKey's Infra-red facial recognition device was a perfect solution</strong>.&nbsp; Movie set lights are bright and can affect the accuracy of 'normal' facial recognition devices that use a standard optical camera.&nbsp; Infra-red technology allows recognition in ANY lighting condition.<br><br></span><div style="margin-left: 10px; margin-right: 0px; margin-bottom: 10px; margin-top: 10px; width: 111px;cursor: pointer; z-index: 5; float: right;"><div style="position: relative;"><img src="/resources/magnifying-glass-24x24.png" style="position: absolute; width: 24px; right: 4px; bottom: 4px;"><img id="tb_53c5d79f1dd33cf82e8aa293_im_26012423" onclick="$.facebox.settings.displayCloseAtTop = true; $.facebox({image:'http://www.facekey.com/images/0/0/moal.jpg'});" src="http://www.facekey.com/images/111/0/moal.jpg" style="border:0;display:block;width:111px;height:87px;"></div><br style="clear: left;"><wg:caption><span style="background-color:transparent;font-family:Arial,sans-serif;font-size:12px;color:#333333;font-weight:normal;text-decoration:none;font-style:normal;text-align:left;padding:0px 0px 0px 0px;margin:0px 0px 0px 0px;line-height:1.1em;">Ed Harris using FaceKey's model FKFP-AC in 'Man on a Ledge'</span></wg:caption></div><br><br><span class="style45748">Please take 38 seconds to see the <strong>Youtube</strong> clip of <strong>Ed Harris</strong> using our product in the movie:&nbsp;&nbsp; <a href="http://youtu.be/eREOVtHa36A" target="">http://youtu.be/eREOVtHa36A</a><br><br></span><span class="style45756">Thank you to Summit Entertainment, LLC. for not only choosing the best biometrics device available for their movie, but also for allowing us to use the clip and showing our awesome products off to the world!<br><br> Call us anytime for information, or <a href="http://www.facekey.com/" target="_blank">visit our website </a>for more information.<br><br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by on 29th May, 2012 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/05/29/facekey-device-featured-in--man-on-a-ledge-#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/05/29/facekey-device-featured-in--man-on-a-ledge-#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/05/29/facekey-device-featured-in--man-on-a-ledge-">Permalink</a><br>Tags: </span></p> Tue, 29 May 2012 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/05/29/facekey-device-featured-in--man-on-a-ledge- Biometrics Applications Institute Seal of Approval awarded to FaceKey! http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/04/19/biometrics-applications-institute-seal-of-approval-awarded-to-facekey- <h3 class="style45750">Biometrics Applications Institute Seal of Approval awarded to FaceKey!</h3><br> <div class="style45759"><center><div style="margin-left: 4px; margin-right: 4px; margin-bottom: 4px; margin-top: 4px; width: 380px; text-align: center;"><a href="http://www.biometricsapplicationsinstitute.org" target="_blank"><img id="tb_53c5d79f866b9afa89057b5e_im_25908909" src="http://www.facekey.com/images/380/0/seal3.gif" style="border:0;display:block;width:380px;height:360px;"></a></div></center><br><br><h1 class="style45751"><center>We are so excited and proud to announce that</center><center></center><center><strong><a href="http://www.facekey.com/">FaceKey Corporation</a></strong></center><strong></strong><center><br>&nbsp;was awarded the</center><center><br>&nbsp;<strong>BIOMETRICS APPLICATIONS INSTITUTE</strong></center><center><strong>&nbsp;Seal of Approval</strong></center><center><em></em><br>&nbsp;on&nbsp;our line of fingerprint and facial recognition scanners<br> based on the proper and unique use of biometric technologies.</center><br><br></h1><span class="style45758">The goals of the Biometrics Applications Institute are: <ul><em>• To gain a broad-spectrum understanding of the applications of biometric technologies.<br>• To discuss the advantages and disadvantages of the applications of biometric technologies. <br>• To analyze and review the applications of biometric technologies. <br>• To present a BAI Seal of Approval for the proper and/or unique use of biometric technologies.</em></ul><br><br></span><span class="style45759"><strong> At FaceKey, we’ve provided superior business security and access control solutions since 1999. Headquartered in San Antonio, our company has pioneered and patented a family of biometric products and solutions that utilize face recognition or fingerprints for identification. From small businesses to global enterprises, FaceKey’s family of products have a proven record with employee time and attendance tracking as well as asset protection and crisis management.<br><br></strong> <strong>FaceKey security systems include access control, time and attendance and</strong> <strong>muster stations.</strong><br> Security, safety, cost efficiency and crisis management are as important for FaceKey as they are for your business. So, we design and build products that work so well we use them for our own company. That means you can count on security solutions that provide for a safe workplace, efficient business operations and a viable emergency <br>evacuation plan.<br><br> <strong>Biometric access control solutions that deliver what they promise.</strong><br> Early in the evolution of biometric security—and before FaceKey’s time—there were numerous challenges to<br>overcome: flaws in technology, installation difficulties—in short, growing pains. Today, FaceKey brings you a wide<br>variety of proven fingerprint and face recognition solutions that are easy to install and ready for immediate use.<br><br> <strong>Ideal biometric products for both your present and future security needs.</strong><br> All FaceKey products operate on common networks employing common industry protocols. With a suite of core software and shared databases, all units can operate in a mix/match fashion. Installation costs are significantly reduced and training is minimal. With this fully integrated system, new features and applications can be easily added to already installed security devices.<br><br> <strong>There’s nothing we like better than saving our customers time and money.</strong><br> From the beginning, FaceKey products enhance your company’s safety, security and efficiency. Then, as <br>your needs grow, your FaceKey solutions can grow along with you. Your initial investment remains protected—<br>so you won’t have to start over to expand your company’s employee time and attendance, access control, or <br>muster station.<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by ahstarkweather on 19th April, 2012 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/04/19/biometrics-applications-institute-seal-of-approval-awarded-to-facekey-#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/04/19/biometrics-applications-institute-seal-of-approval-awarded-to-facekey-#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/04/19/biometrics-applications-institute-seal-of-approval-awarded-to-facekey-">Permalink</a><br>Tags: </span></p> Thu, 19 Apr 2012 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/04/19/biometrics-applications-institute-seal-of-approval-awarded-to-facekey- FaceKey: On our way to Las Vegas ISC 2012 http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/03/27/facekey---on-our-way-to-las-vegas-isc-2012 <h3 class="style45750">FaceKey: On our way to Las Vegas ISC 2012</h3><br> <div class="style45759"><span class="style45759">It is that time of year again and we are&nbsp;totally charged&nbsp;to be on our way to Las Vegas.&nbsp; <br><br> This year's International Security Conference (ICS 2012) promises to be a great show.&nbsp; On our agenda is a series of meetings with some key industry players.&nbsp; We are really excited to meet up with other companies that are interested in integrating our unique algorithms into their legacy systems.&nbsp; We are constantly looking for time and attendance&nbsp;firms and access control companies to learn about our products and our high accuracy devices.<br><br> If you need us while we are out of the office call my cell phone: 210-573-7552.&nbsp; We are staying at the Tuscany Casino...<br><br> We will send back a report with all the cool stuff we see out there in Vegas!<br><br> <a href="http://www.facekey.com/index.html?Action=Commerce.Product&amp;ID=0" onclick="window.open('http://www.facekey.com/index.html?Action=Commerce.Product&amp;ID=0','','toolbar=no,resizable=yes,width=400,height=600,scrollbars=yes');return false;">http://wb.gs/?lnum=25851069</a><br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by A H Starkweather on 27th March, 2012 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/03/27/facekey---on-our-way-to-las-vegas-isc-2012#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/03/27/facekey---on-our-way-to-las-vegas-isc-2012#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/03/27/facekey---on-our-way-to-las-vegas-isc-2012">Permalink</a><br>Tags: </span></p> Tue, 27 Mar 2012 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2012/03/27/facekey---on-our-way-to-las-vegas-isc-2012 FaceKey Products Will Protect Evidence for Law Enforcement http://www.facekey.com/facekey-security-access <h3 class="style45750">FaceKey Products Will Protect Evidence for Law Enforcement</h3><br> <div class="style45759"><span class="style45760">FaceKey recognizes that law enforcement has&nbsp;issues providing security and safety &nbsp;for evidence&nbsp;collected at crime scenes.&nbsp;Evidence has been known to be missing when&nbsp;there is&nbsp;a trial. A recent Google search turned up more than 300 million responses to the query about evidence.&nbsp;&nbsp;To help out law enforment,&nbsp;FaceKey's new product,&nbsp;EVIDENCE LOCKER, will help ensure that evidence is availabe for the trial and strengthen the chain of custody so that when the evidence is presented at the&nbsp;trial, it will be permissable. As the cost of criminal trials grow, no law enforcement agency wants to admit they cannot protect the evidence&nbsp;and have&nbsp;a pristine chain of custody report. In addition to the lost tax dollars, the criminal case may be lost and criminals go free.&nbsp; The EVIDENCE LOCKER is available now. &nbsp;<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette H. Starkweather on 16th November, 2011 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/facekey-security-access#comments">Comments</a> | <a href="http://www.facekey.com/facekey-security-access#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/facekey-security-access">Permalink</a><br>Tags: </span></p> Wed, 16 Nov 2011 06:00:00 +0000 http://www.facekey.com/facekey-security-access FaceKey Complies with GREEN Directive, RoHS http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/11/01/facekey-complies-with-green-directive <h3 class="style45750">FaceKey Complies with GREEN Directive, RoHS</h3><br> <div class="style45759"><span class="style45760">FaceKey wants its customers to know that its products&nbsp;meet the green directive which is often referred to as the lead-free directive, RoHS.&nbsp;Our&nbsp;product line restricts the use of the six hazardous substances noted in the directive commonly referred to as the Restriction of Hazardous Substances Directive or RoHS. The purpose of RoHS is to solve the problem of toxic e-waste. &nbsp; Product information is available at <a href="http://www.facekey.com/building-access-control" target="">www.facekey.com/building-access-control</a>. <br><br> FaceKey sees a trend to "Green" lead free products that minimize toxic waste.&nbsp; We are committed to producing the safest products&nbsp;possible to protect users and property.&nbsp; And, we think it makes business sense. &nbsp;We want to do our part to not only reduce use of energy and materials, but also reduce hazardous waste to protect our water, other resources and have cleaner air . If you wish additional information about RoHS give us a call at 210-826-8811 or email <a href="&#109&#97&#105&#108&#116&#111&#58&#105&#110&#102&#111&#64&#102&#97&#99&#101&#107&#101&#121&#46&#99&#111&#109">info@facekey.com</a></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette H. Starkweather on 1st November, 2011 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/11/01/facekey-complies-with-green-directive#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/11/01/facekey-complies-with-green-directive#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/11/01/facekey-complies-with-green-directive">Permalink</a><br>Tags: </span></p> Tue, 01 Nov 2011 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/11/01/facekey-complies-with-green-directive FaceKey Products are "GREEN" http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/10/24/facekey-to-exhibit-at-techconnexus-event--december-1--2011 <h3 class="style45750">FaceKey Products are "GREEN"</h3><br> <div class="style45759"><span class="style45760">What does it take to be "GREEN"? &nbsp;Depending upon whom you talk to about the issue of GREEN, you could get a different list of what it takes to be considered GREEN. Like others, we have our own idea on the issue. Our major focus is on how FaceKey can build products that help our customers be good stewards of energy and materials, i.e. be "GREEN". &nbsp;And, why do we think our products are GREEN? <br><br> FaceKey's believes it is a good steward because: (a) Its products uses faces or fingerprints for identification and does not require cards which cannot provide ID, but require energy and materials to manufacture and eventually land in garbage dumps. (b) When not in use, the FaceKey products go to sleep and do not use energy; and, when the units are in use they have minimal power usage. (c) The access control units can retrofit existing third party systems with a minimum of replacement parts and materials. (d) The systems operate on the common network to reduce cabling runs.<br><br></span><span class="style45759">Clearly there is&nbsp;a trend to "GREEN" products that minimize the use of energy and materials.&nbsp; GREEN is the future and has big rewards for all of us, not only will&nbsp;there be a&nbsp;reduction in the&nbsp;use of energy and materials and other waste, society can expect to reap health benefits from cleaner water and cleaner air.&nbsp;<br> <br>For additional information about the FaceKey products, take a look at <a href="http://www.facekey.com/building-access-control" target=""> http://www.facekey.com/building-access-control</a>.<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette H. Starkweather on 27th October, 2011 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/10/24/facekey-to-exhibit-at-techconnexus-event--december-1--2011#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/10/24/facekey-to-exhibit-at-techconnexus-event--december-1--2011#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/10/24/facekey-to-exhibit-at-techconnexus-event--december-1--2011">Permalink</a><br>Tags: </span></p> Thu, 27 Oct 2011 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/10/24/facekey-to-exhibit-at-techconnexus-event--december-1--2011 SECURITY REP GROUP'S John Caglione sells FaceKey products to customers in Haiti http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/08/10/security-rep-group-s-john-caglione-sells-facekey-products-into-hairi <h3 class="style45750">SECURITY REP GROUP'S John Caglione sells FaceKey products to customers in Haiti</h3><br> <div class="style45759"><span class="style45760">John Cag is&nbsp;a well know and respected security guru&nbsp;with a long history of working with integrators in Haiti.&nbsp; As Haiti recovers and rebuilds its infrastructure, John believed that FaceKey's&nbsp;family of security access control and &nbsp;time and attendance systems&nbsp;were best&nbsp;suited to the job.&nbsp; The products which utilize face and/or fingerprint recognition in place of the common&nbsp;card&nbsp;were price competitive.&nbsp; <br><br> Because&nbsp;our family of security access control and time and attendance systems run on the network thus reducing installation and training&nbsp;costs and can be managed in house,&nbsp;we believe&nbsp;we are the best solution available today.&nbsp;&nbsp;&nbsp;FaceKey is looking forward to working with John Cag as he continues serves his customers in Haiti and Florida.<br><br> For more information see the&nbsp;home page.<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette H. Starkweather on 10th August, 2011 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/08/10/security-rep-group-s-john-caglione-sells-facekey-products-into-hairi#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/08/10/security-rep-group-s-john-caglione-sells-facekey-products-into-hairi#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/08/10/security-rep-group-s-john-caglione-sells-facekey-products-into-hairi">Permalink</a><br>Tags: </span></p> Wed, 10 Aug 2011 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/08/10/security-rep-group-s-john-caglione-sells-facekey-products-into-hairi Who's Calling for Support http://www.facekey.com/page717167 <h3 class="style45750">Who's Calling for Support</h3><br> <div class="style45759"><span class="style45760">A quick review of FaceKey’s calls for support proved our suspicions correct. &nbsp; The typical caller for support has forgotten how to perform a procedure and doesn’t want to look it up in the manual. &nbsp; Or, the person calling hasn’t attended a training class. &nbsp; With this information in hand, FaceKey is looking at some new techniques which will improve our training and certification program. &nbsp; <br><br>So what’s in it for the customer: &nbsp; The reduced cost of installation and use of the system. &nbsp; <STRONG>Time is money.</STRONG><br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette H. Starkweather on 21st June, 2011 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/page717167#comments">Comments</a> | <a href="http://www.facekey.com/page717167#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/page717167">Permalink</a><br>Tags: </span></p> Tue, 21 Jun 2011 05:00:00 +0000 http://www.facekey.com/page717167 NIX Pharmacy and Other Sensitive Areas Protected by Fingerprint Access Control to Reduce Rekeying Expense http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/05/19/nix-pharmacy-and-other-sensitive-areas-protected-by-fingerprint-access-control <h3 class="style45750">NIX Pharmacy and Other Sensitive Areas Protected by Fingerprint Access Control to Reduce Rekeying Expense</h3><br> <div class="style45759"><span class="style45760">Today, FaceKey completed the training on how to enroll fingerprintswith Nix Hospital in San Antonio.&nbsp;It is a fact of life that while it is quick and easy to enroll a person's fingerprint, the enrollment needs to done carefully.&nbsp;&nbsp;Everyone enrolled at this point&nbsp;is able to use the system easily with one touch of their fingerprint.&nbsp; A little time and attention to enrollment can really pay off.&nbsp; And, speaking of paying off, NIX&nbsp;noted that&nbsp;last year, the&nbsp;Hospital had incurred a $68,000 expense for rekeying.&nbsp;&nbsp;&nbsp;The doors where the FaceKey units are installed need never be rekeyed.<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 19th May, 2011 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/05/19/nix-pharmacy-and-other-sensitive-areas-protected-by-fingerprint-access-control#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/05/19/nix-pharmacy-and-other-sensitive-areas-protected-by-fingerprint-access-control#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/05/19/nix-pharmacy-and-other-sensitive-areas-protected-by-fingerprint-access-control">Permalink</a><br>Tags: </span></p> Thu, 19 May 2011 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/05/19/nix-pharmacy-and-other-sensitive-areas-protected-by-fingerprint-access-control FaceKey MusterGuard System Introduced at Offshore Technology Conference http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/29/facekey-musterguard-system-introduced-at-offshore-technology-conference--- <h3 class="style45750">FaceKey MusterGuard System Introduced at Offshore Technology Conference </h3><br> <div class="style45759"><span class="style45760">Marine Rescue Technologies (MRT) will present the FaceKey MusterGuard product at the Offshore Technology Conference at &nbsp; Reliant Center in Houston, TX, next week, May 2 through May 5. &nbsp; The product can be seen at booth number 6201, Monday thru Wednesday between 9:00 AM and 5:30 PM and Thursday 9:00 AM and 2:00 PM.&nbsp;&nbsp;<br><br>The FaceKey biometric based MusterGuard system encompasses an automated Personnel on Board (POB) System and Automated Muster System to&nbsp;provide <A href="http://online.myiwf.com/otc2011/pressrelease.aspx?E=3246373&amp;T=Marine%20Rescue%20Technologies%20Inc.%20introduces%20“MusterGuard”,%20an%20automated%20real%20time%20accounting%20of%20personnel%20during%20emergencies." target=blank>automated real time accounting of personnel during emergencies.</A> &nbsp; The Offshore Technology Conference, is a prestigious event serving industries involved in the development of offshore resources for drilling, exploration, production, and environmental protection.<br><br>Yevgeny B.&nbsp;Levitov, president of FaceKey, will be available for questions.<br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 29th April, 2011 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/29/facekey-musterguard-system-introduced-at-offshore-technology-conference---#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/29/facekey-musterguard-system-introduced-at-offshore-technology-conference---#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/29/facekey-musterguard-system-introduced-at-offshore-technology-conference---">Permalink</a><br>Tags: </span></p> Fri, 29 Apr 2011 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/29/facekey-musterguard-system-introduced-at-offshore-technology-conference--- FaceKey Trains Nix Hospital on New Version of Enrollment Fingerprint Reader http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/27/facekey-trains-nix-hospital-on-new-version-of-enrollment-fingerprint-reader <h3 class="style45750">FaceKey Trains Nix Hospital on New Version of Enrollment Fingerprint Reader</h3><br> <div class="style45759"><span class="style45759"><br>FaceKey&nbsp;provided Nix Hospital in San Antonio with its latest and most sensitive fingeprint enrollment reader for their fingerprint based biometric access control system which is being used to protect certain of its pharmacies and drug cabinets.&nbsp; The new reader solves a few issues that Nix was experiencing with the enrollment process.&nbsp;&nbsp;The new reader is "self teaching" so that employees can quickly learn to use the fingerprint readers.<br><br>FaceKey focuses on training because we believe that training and support is the key the customer needs to fully utilize the system.<br>&nbsp;<br><br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 27th April, 2011 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/27/facekey-trains-nix-hospital-on-new-version-of-enrollment-fingerprint-reader#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/27/facekey-trains-nix-hospital-on-new-version-of-enrollment-fingerprint-reader#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/27/facekey-trains-nix-hospital-on-new-version-of-enrollment-fingerprint-reader">Permalink</a><br>Tags: </span></p> Wed, 27 Apr 2011 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/27/facekey-trains-nix-hospital-on-new-version-of-enrollment-fingerprint-reader http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/27 <h3 class="style45750"></h3><br> <div class="style45759"></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by on 27th April, 2011 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/27#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/27#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/27">Permalink</a><br>Tags: </span></p> Wed, 27 Apr 2011 05:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/27 http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/12 <h3 class="style45750"></h3><br> <div class="style45759"></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by on 12th April, 2011 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/12#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/12#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/12">Permalink</a><br>Tags: </span></p> Tue, 12 Apr 2011 10:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/12 FaceKey Delivers Security and Piece of Mind http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/01/facekey-delivers-security-and-piece-of-mind <h3 class="style45750">FaceKey Delivers Security and Piece of Mind</h3><br> <div class="style45759"><span class="style45759">In 2005 San Antonio Technology Center turned to one of their newest tenants, FaceKey Corporation, to provide their biometric access control which uses fingerprint recognition, for general access into the building and to SATC ’s Co-Location Room. SATC recently up graded to FaceKey’s 3rd generation AC-06 model for their front doors, but is still using FaceKey’s first generation AC -01 on t heir Co - Location Room. The technology is durable and reliable and SATC has no reason to change.&nbsp;&nbsp;<br><br><br>Ms. Cathy D. Hernandez, SATC Building Manager, manages and monitors FaceKey ’s access control system. Ms. Hernandez notes, “The FaceKey system provides the building with a level of security that is greatly appreciated by management and the tenants. &nbsp; In the event we need to know when someone ent ered the building, we alwa s have a record that is easy to retrieve. &nbsp; The support we receive is world class.<br><br><br><a href="http://www.facekey.com/download/Case Study SATC 3-15-2011.pdf">Click here to download the whitepaper</A><br></span></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by Annette Starkweather on 1st April, 2011 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/01/facekey-delivers-security-and-piece-of-mind#comments">Comments</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/01/facekey-delivers-security-and-piece-of-mind#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/01/facekey-delivers-security-and-piece-of-mind">Permalink</a><br>Tags: </span></p> Fri, 01 Apr 2011 10:00:00 +0000 http://www.facekey.com/blogs/facekey-security-access-control-blog/2011/04/01/facekey-delivers-security-and-piece-of-mind http://www.facekey.com/page29019106 <h3 class="style45750"></h3><br> <div class="style45759"></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by on 30th November, -0001 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/page29019106#comments">Comments</a> | <a href="http://www.facekey.com/page29019106#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/page29019106">Permalink</a><br>Tags: </span></p> Wed, 30 Nov -001 00:00:00 +0000 http://www.facekey.com/page29019106 http://www.facekey.com/page710817 <h3 class="style45750"></h3><br> <div class="style45759"></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by on 30th November, -0001 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/page710817#comments">Comments</a> | <a href="http://www.facekey.com/page710817#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/page710817">Permalink</a><br>Tags: </span></p> Wed, 30 Nov -001 00:00:00 +0000 http://www.facekey.com/page710817 http://www.facekey.com/page715240 <h3 class="style45750"></h3><br> <div class="style45759"></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by on 30th November, -0001 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/page715240#comments">Comments</a> | <a href="http://www.facekey.com/page715240#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/page715240">Permalink</a><br>Tags: </span></p> Wed, 30 Nov -001 00:00:00 +0000 http://www.facekey.com/page715240 http://www.facekey.com/page26106425 <h3 class="style45750"></h3><br> <div class="style45759"></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by on 30th November, -0001 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/page26106425#comments">Comments</a> | <a href="http://www.facekey.com/page26106425#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/page26106425">Permalink</a><br>Tags: </span></p> Wed, 30 Nov -001 00:00:00 +0000 http://www.facekey.com/page26106425 http://www.facekey.com/page27935970 <h3 class="style45750"></h3><br> <div class="style45759"></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by on 30th November, -0001 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/page27935970#comments">Comments</a> | <a href="http://www.facekey.com/page27935970#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/page27935970">Permalink</a><br>Tags: </span></p> Wed, 30 Nov -001 00:00:00 +0000 http://www.facekey.com/page27935970 http://www.facekey.com/page28358400 <h3 class="style45750"></h3><br> <div class="style45759"></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by on 30th November, -0001 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/page28358400#comments">Comments</a> | <a href="http://www.facekey.com/page28358400#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/page28358400">Permalink</a><br>Tags: </span></p> Wed, 30 Nov -001 00:00:00 +0000 http://www.facekey.com/page28358400 http://www.facekey.com/page29017497 <h3 class="style45750"></h3><br> <div class="style45759"></div> <p style="margin-bottom: 2em; clear: both; border-top: 1px dotted #;"> <span class="style45752" style="display: inline;"> Posted by on 30th November, -0001 | </span><span class="style45758" style="display: inline;"><a href="http://www.facekey.com/page29017497#comments">Comments</a> | <a href="http://www.facekey.com/page29017497#trackbacks">Trackbacks</a> | <a href="http://www.facekey.com/page29017497">Permalink</a><br>Tags: </span></p> Wed, 30 Nov -001 00:00:00 +0000 http://www.facekey.com/page29017497