BIMS set to change identity ­management

Access & Identity Management Handbook 2019 Access Control & Identity Management, Integrated Solutions, Infrastructure

Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has finally received all the accreditations it requires to be used for capturing and confirming identities via a number of modalities.

The BIMS hardware and software was designed and built in South Africa by Ideco (at a cost of over R20 million in R&D), with the support of the Department of Trade and Industry (DTI) as well as the Department of Science and Technology. Now that the system is being taken to market, the DTI has recommended it for use in government departments and has provided a letter of recommendation for potential international customers.

Marius Coetzee.
Marius Coetzee.

BIMS is a portable biometric enrolment solution that is able to run on battery power for up to 12 hours. It can capture six different biometric modalities: fingerprints, palm vein, face, iris, voice and signature. Ideco’s CEO, Marius Coetzee, says that while the device is a complex piece of technology, it was designed to be easy to use while capturing biometric readings that meet international standards:

• Fingerprints are captured by dual LES technology scanners which are FBI Appendix F certified.

• Faces are captured by 5-megapixel cameras that are ICAO compliant.

• Iris capture is according to NIST-recommended image quality.

• Palm vein biometrics uses the near-infrared PalmSecure sensors.

• Voice is captured by an integrated omnidirectional audio recorder.

• Signatures are captured on a digital signature pad that records 4D coordinates (X, Y, pressure and time).

BIMS is also equipped with a range of connectivity options, including Bluetooth, Wi-Fi, 3G, GPS and LAN. When an individual’s biometrics are captured, the resulting templates are compressed and encrypted before being sent to a secure server where they are stored in the cloud. No matter which biometrics the customer may require, the resulting identification templates are secure and only accessible to authorised people.

Each BIMS device is configurable to the needs of each customer. A configuration file on the server is set up for specific tasks, for example to capture people’s fingerprints and facial biometrics. When the device is started, it communicates with the server and downloads the correct configuration file and sets the system up accordingly. This allows companies to use the device for a range of tasks, simply setting up the configuration files specifying what the next job will be.

The system consists of two touchscreens; the operator works on one side while the person submitting their biometrics sits opposite them facing their own screen.

Because BIMS captures biometrics according to accepted international standards, it is ideal for governments looking to capture a range of biometrics for citizen identification. For example, South Africa’s Home Affairs could use a single device to capture fingerprints, faces and even signatures from people applying for passports – from a single device. It can also be used in banking and retail environments to register new accounts and ensure that people are who they claim to be.

Coetzee explains, “The need for secure and authentic identity management has reached crisis proportions globally, with demand for advanced, agile and multi-modal biometric identity management. Until now, no one could deliver six modalities in a single portable device, which can be used in any configuration for multiple levels of identification, as well as integrating into existing enterprise systems quickly and easily.”

For more information contact Ideco Biometric Security Solutions, 086 104 3326, contact@ideco.co.za, www.ideco.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.