Solution partnerPCS works with approximately 100 software and system house partners from all over Europe. They offer security solutions based on INTUS products and addressing all areas of production data collection and security technology.
Identical - authentic - verified?
When talking about access control you inevitably come across three terms: identification, verification and authentication.
Although these terms are generally defined in very different ways, the following definition has become generally accepted in the security market:
Identification is the process of determining the identity of a person from a group of practically any size. For this purpose, the data of this person is compared with all data in the system (1:n comparison). In a face recognition system, for example, all facial features stored in a database can be compared with the currently recorded face.
During verification or validation, a specific feature on a data medium is compared with a feature of the person (1:1 comparison). The classic example is the fingerprint, which is stored on an access card and compared with the finger placed on the fingerprint terminal.
Authentication (Greek: authentikós: genuine, vouched for) is the process of establishing a person's identity beyond doubt. The system establishes that it is the person himself, and not just that person's card.