Access Control
Biometric authentication for secure & convenient access control

Grant access only to people who are actually authorized. Biometric access control enhances enterprise security by regulating physical access while making entry as easy as taking a selfie for authorized personnel.

Benefits of Biometric Access Control

Trusted & Secure
- Multifactor authentication: face + phone + geolocation
- Strong biometrics with liveness detection
- Resistant to identity theft
(e.g. through deepfakes) and prohibited account sharing

Cost Effective
- Multichannel usage with one software
- Eliminates cost and management of key cards or hardware tokens and expensive access terminals
- Works with BYOD or centralized devices

Simple & Convenient
- Eye recognition for users wearing medical or other covers over the mouth and nose
- Multipurpose: can also be used for single sign-on for network access
- 24/7 self-service
Instead of the administrative burden of token/key card management or relying on difficult and easy-to-share passwords, innovative companies may now replace or complement this with their users’ unique features.
How Physical Access Control with Biometrics works
1

Selfie
An employee takes a facial selfie with the camera in the access terminal or through a smartphone. The captured picture is processed as an anonymous, irreversible binary template.
2

Matching
Through the comparison of the biometric templates, our software knows within seconds and with high accuracy whether a person is authorized to enter.
3

Liveness Detection
Identity theft, forgery, and spoofing or deepfake attacks (through photos, masks, video replays, etc.) are prevented thanks to the authentication process by BioID’s patented Liveness Detection.
More Use Cases
BWS offers match-on-server face login for online and mobile services enabling omnichannel services.
User authentication and user presence detection for remote work ensuring session integrity allowing authorized access only.
ID ownership verification as part of Know Your Customer and Anti-Money Laundering regulatory requirements preventing identity frauds.
“Face-to-face” registration and strong user authentication enabling eIDAS compliant digital signatures.