SlideShare une entreprise Scribd logo
1  sur  21
The Winter 2012 Biometrics Summit
Miami, FL February 27 – March 1, 2012




    Identifying Prisoners And Visitors
                   Using
              Localized AFIS

 Mizan Rahman              Jim Rokosky
  Founder & CEO          Sr. VP, DSI Operations
 M2SYS Technology     Global Tel*Link Corporation
Who are we?
M2SYS Overview

• Biometric R&D company focus on technology innovation
  for rapid biometric adoption
• Winner of 2007 Frost & Sullivan Biometrics Technology
  Innovation of the Year Award
• Winner of 2011 Frost & Sullivan New Product Innovation
  Award
• Primary Markets Served: Public Safety – Law
  Enforcement, Electoral, Healthcare, Banking, Education,
  POS, Childcare, Transportation, Workforce Management,
  Membership Management, Application Security
• Tens of Thousands of Customer Deployments in 100
  Countries Worldwide
GTL Overview – Nationwide Presence
   Leading provider of telecom and technology products and services in the corrections industry
   Provides network based collect and prepaid call processing and digital recording infrastructure
    platforms in conjunction with monitored telecommunications systems
   Serves ~ 1,900 facilities and over 1.1 million inmates in 47 states and over 800 counties
   Holds the State Department of Corrections contract in 33 of 50 states including 14 of 20 largest




                 GTL DOC Customer
                 GTL with no DOC




                                            GTL Confidential and Proprietary                           4
M2SYS & GTL - Synergy

                                     Visitor
                                   Management




                      Biometrics



                                             Inmate
                                           Management




• M2SYS focuses on biometrics and enabling software providers to
  rapidly integrate biometric functionalities
• GTL focuses on providing end-to-end solutions for prisons
What brings us together ?
Statistics from DOJ

• Of the 272,111 persons released from prisons in 15
  States in 1994, an estimated 67.5% were rearrested
  for a felony or serious misdemeanor within 3
  years, 46.9% were reconvicted, and 25.4%
  resentenced to prison for a new crime.
• The 272,111 offenders discharged in 1994 accounted
  for nearly 4,877,000 arrest charges over their
  recorded careers.
• Sex offenders were less likely than non-sex offenders
  to be rearrested for any offense –– 43% of sex
  offenders versus 68% of non-sex offenders.
The Magic Number


                     ~ 40%
Almost 40% of the prison population are repeat offenders. Some of our
clients came up with a perfect euphemism for these offenders – “The
frequent flyers”


• The same criminals are coming back to the jails over and over again
• The same visitors are also coming back over and over again
Releasing the wrong inmate



                                          Releasing officer fails
  Swap badge with       Pretend to be      to prevent because
 someone else being   someone else with   of ethnic diversity or
     released            false badge          sophisticated
                                                execution
Need for localized AFIS

  1     • Prompt identification of
          returning offenders


  2     • Release the right inmate
          not his friend


  3     • Ensure security & prompt
          visitor processing
What drives the successful
         implementation?

• Fully integrated solutions
• Merge both companies           Integrated    Usability
  expertise to understand
  end user culture and deliver
  exactly what is needed not
                                 Versatility   Training
  what we want to sell
Challenges
• Age of users                              • Intuitive design
• Working class                             • User feedback
                                            • Footprint




                  Demography   Ergonomics




                   Weather        Cost

• Cold                                      • Biometric module
• Dry                                         can’t be more
• Wet                                         expensive then
                                              main JMS system
Who is using it?

M2SYS & GTL together deployed our integrated solutions in
  over 100 jails, managing millions of biometric records.



            Country                           Project
  Prominent private correction   70 Jails, centrally connected
  facility
  Dekalb County, Atlanta, GA     3,500 beds – largest jail in the
                                 South
Future…



                                        Adoption


                     Collaboration
                   (cloud biometrics)
                    Regional Data
                       Sharing
More integration
(medication
dispensing, move
ment tracking)
M2SYS’s Strategy
Hybrid Biometric Platform™ (HBP) is an enterprise-ready biometric recognition system that
supports fingerprint, finger vein, palm vein, and iris biometrics. HBP is “plug-and-play” with
any of these biometric modalities, ensuring near 100% read rates for any biometric
technology implementation.
                                                Features/Benefits:
                                                • One integration provides access to an
                                                  enterprise-ready, Hybrid Biometrics™
                                                  system
                                                • Immediately utilize fingerprint, finger
                                                  vein, palm vein, and iris recognition
                                                • Unlike four, separate low-level
                                                  SDKs, Hybrid Biometric Platform™ is
                                                  pre-built, scalable, easily integrated, and
                                                  lowers total cost of ownership
                                                • Ensure 100% read rates, regardless of
                                                  environmental, demographic, or other
                                                  factors that negatively impact some
                                                  forms of biometrics
GTL’s Strategy

                                    Latest Correctional
                                     Applications and Consumer
                                     Payment Technology
                                    Products/Services that
                                     Increase Call Volume and
                                     Improve Satisfaction
                                    Tools that Increase
                                     Efficiency and Effectiveness
                                     of Investigations
                                    Applications that Increase
                                     Efficiency and Effectiveness
                                     for the DOC and Friends
                                     and Families




GTL Confidential and Proprietary                 20
Thank You

(Questions?)

Contenu connexe

Plus de M2SYS Technology

The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsM2SYS Technology
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...M2SYS Technology
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsM2SYS Technology
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareM2SYS Technology
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOM2SYS Technology
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringM2SYS Technology
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...M2SYS Technology
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...M2SYS Technology
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business M2SYS Technology
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionM2SYS Technology
 

Plus de M2SYS Technology (10)

The Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric SolutionsThe Convergence of Public and Private Biometric Solutions
The Convergence of Public and Private Biometric Solutions
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Patient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces CostsPatient Engagement in Healthcare Improves Health and Reduces Costs
Patient Engagement in Healthcare Improves Health and Reduces Costs
 
The Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in HealthcareThe Impact of Duplicate Medical Records and Overlays in Healthcare
The Impact of Duplicate Medical Records and Overlays in Healthcare
 
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIOPodcast Summary - Patient Identity and the Role of Today's Modern CIO
Podcast Summary - Patient Identity and the Role of Today's Modern CIO
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
Understanding the Differences Between 1:1 Verification, 1:Few Segmentation an...
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business Creating a Social Media Policy for Your Business
Creating a Social Media Policy for Your Business
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 

Dernier

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Dernier (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Identifying Prisoners and Visitors using Localized AFIS

  • 1. The Winter 2012 Biometrics Summit Miami, FL February 27 – March 1, 2012 Identifying Prisoners And Visitors Using Localized AFIS Mizan Rahman Jim Rokosky Founder & CEO Sr. VP, DSI Operations M2SYS Technology Global Tel*Link Corporation
  • 3. M2SYS Overview • Biometric R&D company focus on technology innovation for rapid biometric adoption • Winner of 2007 Frost & Sullivan Biometrics Technology Innovation of the Year Award • Winner of 2011 Frost & Sullivan New Product Innovation Award • Primary Markets Served: Public Safety – Law Enforcement, Electoral, Healthcare, Banking, Education, POS, Childcare, Transportation, Workforce Management, Membership Management, Application Security • Tens of Thousands of Customer Deployments in 100 Countries Worldwide
  • 4. GTL Overview – Nationwide Presence  Leading provider of telecom and technology products and services in the corrections industry  Provides network based collect and prepaid call processing and digital recording infrastructure platforms in conjunction with monitored telecommunications systems  Serves ~ 1,900 facilities and over 1.1 million inmates in 47 states and over 800 counties  Holds the State Department of Corrections contract in 33 of 50 states including 14 of 20 largest GTL DOC Customer GTL with no DOC GTL Confidential and Proprietary 4
  • 5.
  • 6. M2SYS & GTL - Synergy Visitor Management Biometrics Inmate Management • M2SYS focuses on biometrics and enabling software providers to rapidly integrate biometric functionalities • GTL focuses on providing end-to-end solutions for prisons
  • 7. What brings us together ?
  • 8. Statistics from DOJ • Of the 272,111 persons released from prisons in 15 States in 1994, an estimated 67.5% were rearrested for a felony or serious misdemeanor within 3 years, 46.9% were reconvicted, and 25.4% resentenced to prison for a new crime. • The 272,111 offenders discharged in 1994 accounted for nearly 4,877,000 arrest charges over their recorded careers. • Sex offenders were less likely than non-sex offenders to be rearrested for any offense –– 43% of sex offenders versus 68% of non-sex offenders.
  • 9. The Magic Number ~ 40% Almost 40% of the prison population are repeat offenders. Some of our clients came up with a perfect euphemism for these offenders – “The frequent flyers” • The same criminals are coming back to the jails over and over again • The same visitors are also coming back over and over again
  • 10. Releasing the wrong inmate Releasing officer fails Swap badge with Pretend to be to prevent because someone else being someone else with of ethnic diversity or released false badge sophisticated execution
  • 11.
  • 12.
  • 13.
  • 14. Need for localized AFIS 1 • Prompt identification of returning offenders 2 • Release the right inmate not his friend 3 • Ensure security & prompt visitor processing
  • 15. What drives the successful implementation? • Fully integrated solutions • Merge both companies Integrated Usability expertise to understand end user culture and deliver exactly what is needed not Versatility Training what we want to sell
  • 16. Challenges • Age of users • Intuitive design • Working class • User feedback • Footprint Demography Ergonomics Weather Cost • Cold • Biometric module • Dry can’t be more • Wet expensive then main JMS system
  • 17. Who is using it? M2SYS & GTL together deployed our integrated solutions in over 100 jails, managing millions of biometric records. Country Project Prominent private correction 70 Jails, centrally connected facility Dekalb County, Atlanta, GA 3,500 beds – largest jail in the South
  • 18. Future… Adoption Collaboration (cloud biometrics) Regional Data Sharing More integration (medication dispensing, move ment tracking)
  • 19. M2SYS’s Strategy Hybrid Biometric Platform™ (HBP) is an enterprise-ready biometric recognition system that supports fingerprint, finger vein, palm vein, and iris biometrics. HBP is “plug-and-play” with any of these biometric modalities, ensuring near 100% read rates for any biometric technology implementation. Features/Benefits: • One integration provides access to an enterprise-ready, Hybrid Biometrics™ system • Immediately utilize fingerprint, finger vein, palm vein, and iris recognition • Unlike four, separate low-level SDKs, Hybrid Biometric Platform™ is pre-built, scalable, easily integrated, and lowers total cost of ownership • Ensure 100% read rates, regardless of environmental, demographic, or other factors that negatively impact some forms of biometrics
  • 20. GTL’s Strategy  Latest Correctional Applications and Consumer Payment Technology  Products/Services that Increase Call Volume and Improve Satisfaction  Tools that Increase Efficiency and Effectiveness of Investigations  Applications that Increase Efficiency and Effectiveness for the DOC and Friends and Families GTL Confidential and Proprietary 20