Vlatacom Annual Catalogue 2010

March 24, 2018 | Author: bizon2000 | Category: Public Key Cryptography, Key (Cryptography), Identity Document, Authentication, Cryptography


Comments



Description

Vlatacom / Annual catalogue 2010 TABLE OF CONTENTS ABOUT US................................................................................................................... 4 ACTIVITIES .................................................................................................................. 8 SYSTEMS INTEGRATION OF DIFFERING IT SYSTEMS INTO E-GOVERNMENT SOLUTIONS .............. 14 PUBLIC KEY INFRASTRUCTURES ................................................................................. 18 VIDPS – BIOMETRIC DOCUMENT ISSUING SYSTEM ..................................................... 22 AFIS ........................................................................................................................... 26 ELECTRONIC BORDER CONTROL ................................................................................. 30 PASSENGER PROCESSING SYSTEM FOR BORDER CROSSINGS .................................... 32 ENGINEERING IN TELECOMMUNICATIONS ................................................................. 34 WIMAX BROADBAND WIRELESS DATA TRANSMISSION SYSTEM.................................. 36 TETRA DIGITAL RADIO SYSTEMS .................................................................................. 36 SCADA SYSTEMS ......................................................................................................... 40 TRAFFIC CONTROL SYSTEM ......................................................................................... 42 AUTOMATIC VEHICLE LOCATION SYSTEM (AVL/GPS).................................................... 46 AUTOMATIC NUMBER PLATE RECOGNITION (ANPR) SYSTEM ...................................... 48 VEHICLE LOGGING USING CONTACTLESS CHIPS ........................................................ 49 VLATACOM SELF SERVICE PASS SOLUTION (VSSPS) ................................................... 50 PRODUCTS MOBILE TETRA BASE-STATIONS ................................................................................... 54 MOBILE BIOMETRIC STATION ..................................................................................... 56 BIOMETRIC KIOSK ...................................................................................................... 58 PORTABLE BIOMETRIC WORKSTATION ........................................................................ 60 PORTABLE BIOMETRIC ENROLLMENT WORKSTATION ................................................. 62 VDR-1 AND VDR-C ID DOCUMENT READERS .............................................................. 64 VDR–H HANDHELD ..................................................................................................... 66 HANDHELD AUTHENICATOR – PORTABLE FINGERPRINT AUTHENTICATOR ................... 67 PATENTS, AWARDS, FAIRS PATENTS ..................................................................................................................... 70 AWARDS..................................................................................................................... 72 FAIRS AND CONFERENCES .......................................................................................... 75 2 3 Vlatacom / Annual catalogue 2010 About us Vlatacom d.o.o. is a private company, founded in Belgrade in 1997. The same year Vlatacom became distributor for the Motorola company, CGISS Sector (Commercial, Government and Industrial Solutions Sector), for the territory of Serbia and Montenegro. As of 2002 the company has been extending its business to the field of IT and communication technologies integration, as well as software and electronic device development. Vlatacom’s team of top professionals has developed the following high-technology hardware and software products for local and foreign clients: a) System for issuing biometric ID and travel documents, b) Border crossing passenger control and registration system, c) Identity verification system, d) System for traffic control in urban environments, e) Automatic Vehicle Location system (AVL), f) Solution for integration of e-Government systems, and many others. 4 5 Vlatacom / Annual catalogue 2010 All projects completed by Vlatacom are turnkey, and always include training for clients in the use and maintenance of the system once online. Vlatacom’s policy is to prepare clients for independent management and maintenance of our systems. Vlatacom’s success is the result of continuous investment into research and development, as well as our policy of ongoing advanced staff training through the study of professional literature and attendance of seminars, conferences, special courses and post-graduate studies. Vlatacom’s business, development and production processes are in line with the ISO-9001 quality standard. We were certified according to the ISO-9001: 2000 standard in 2006, and in 2009 were recertified for conformance with the ISO-9001: 2008 standard. Our solutions are used in Serbia by the Ministry of the Interior, the Serbian Army, as well as by public companies Serbian Post and Belgrade Water Supply. Our automatic travel document processing and passenger registration solutions are used on international crossings in Serbia, Nigeria and Moldavia. Various ministries and agencies in Angola, Botswana, Nigeria, Iraq and Slovakia have also implemented our solutions. In Norway, the system we designed for automatic acquisition of text and biometric data (acquired during application for personal ID or travel documents) is used as part of the solution delivered to them by Motorola. We are constantly working on the promotion of our products through attendance at exhibitions and conferences, as well as through the activities of our branch offices and distributors. We plan to increase our share of foreign markets in the future. 6 7 E-Government Systems: Vlatacom has valuable knowledge and experience in the integration of the different information systems used by government institutions. Data Terminals and Document Readers: Vlatacom specialises in the development of handheld (portable). mean Vlatacom has the know-how to integrate complex ICT systems. Biometric Document Production Systems: integration and adaptation of systems for issuing and verifying biometric documents. Vlatacom excels in carrying out complex projects in the following areas: Public Key Infrastructure (PKI) for encrypted IT and communication networks: systems for secured communication control of information access rights and long-distance verification of document content and issuer. desktop and stationary devices for the reading of machine-readable text. 9 8 9 . Vlatacom integrates biometric technologies from the world’s leading companies in this field using our own software and hardware and develops turnkey solutions for identification. our constant training of employees and our knowledge and experience in working with a variety of systems.Vlatacom / Annual catalogue 2010 Activites The numerous projects in which Vlatacom has participated. acquisition of document holder biometric data and its automatic comparison with data received from the document. They are integrated in order to create a safe and efficient platform for e-Government services to function. encrypted and biometric data. authentication and access control. 3 and 802. driving through red lights etc. Biometric Identification Systems: design. Special-Purpose Digital Radio Systems (TETRA and APCO-25): installation. maintenance and expansion of digital trunked systems and microwave radio links for quick transmission of digital data. with data throughput up to 1000 Mb/s. registration expiry. GIS and AVL: development of quick and reliable geographic information systems and creation of large-scale databases enabling various locationbased services. regional. which enable more rapid flow of vehicles through urban environments. using the latest software and databases. oil and telecommunications industries) and smaller public enterprises at the state. SCADA (SCADA – Supervisory Control and Data Acquisition): remote control of complex industrial processes for large public companies (the power. These private mobile radio networks are developed for police and other government bodies. WiMax Broadband Wireless Communication Systems: design. digitised images and speech.Vlatacom / Annual catalogue 2010 Traffic Surveillance and Control: integrated systems for video surveillance and centralised traffic management through control of traffic signalling devices and variable message signs. installation. installation. water supply. Number Plate Recognition: these systems enable automatic registration of traffic violations such as speeding. maintenance and expansion of civilian and police systems for the identification of persons based on a photograph of the face. maintenance and expansion of secured systems according to standards IEC 802. 10 11 .11e (WiMax). such as Automated Vehicle Location and fleet management. or on iris and hand and finger prints. municipal or town level. Vlatacom / Annual catalogue 2010 Systems 12 13 . but it cannot be misused to falsify a signature. Internet technology is the most commonly used. an e-Government portal. In a broader sense. The recipient of the digitally signed document can verify the signature and open the content using the sender’s public key. government agencies and local services. e-Government includes all electronic transactions conducted by local or national government. Accordingly. In practice. Digital signatures are an improved and secure replacement for signatures on paper. so that electronic government services can be made available to the entire population of the country. as well as the authenticity of the signed content. A range of different services enabling at least partially automated remote transactions between the public and state agencies is called e-Government or electronic administration. since the private key is hidden in the chip. This is achieved by allocating digital certificates along with pairs of cryptographic keys to individuals and employees in state institutions simultaneously with the issue of ID cards to citizens and official ID cards to government employees. for example filled-in forms. where they can find all the information they need. 14 15 . The telecommunication networks used for conducting such transactions must by their nature be digital and public. The public key of the sender is needed in order to decipher his or her messages and verify his or her identity. as well as by use of a digital signature which is verified for validity. This is made possible using cryptographic protection of message contents. Transmitted information must be protected from third parties. which is produced in a pair together with the private key.Vlatacom / Annual catalogue 2010 INTEGRATION OF DIFFERENT IT SYSTEMS INTO E-GOVERNMENT SOLUTIONS New technologies present new opportunities for interaction with state agencies at the local and republic level on the part of individuals and companies. ID cards and employee cards contain a chip bearing a private key. and can also open and fill in forms as necessary. as well as fixed and mobile telephony. citizens have access to a government site. A digital signature represents a result of the mathematical operation performed between the private key and part of the document being signed. Using the Internet. this service also involves all transactions between ministries. which ensure the identity and intent of a remote signatory. and the identity and authorisation of transaction participants must be determined. to collect citizens’ personal details etc. a “one stop shop” which citizens. 16 17 . The user identification management system enables access to specific data and applications for those persons who have permission to do so.Vlatacom / Annual catalogue 2010 Vlatacom provides a solution whereby different government information centres can be connected via one unique portal. For example. All citizens and employees must use their ID cards to authenticate their access to the portal. carry out vehicle registration and find information on and register for various services. Government employees can use the portal to access applications that they use at their place of work. companies and government employees can access using personal and official ID cards equipped with a chip. Secure communication and authentication is enabled by the Public Key Infrastructure – PKI. All communication within the system is encrypted. office workers can use it to process ID card applications. view their tax and medical records. marriage and citizenship certificates. Vlatacom’s centralised service solution includes: • User identification management using digital certificates • Verification of digital signature (authentication and authorisation) • Encryption of data transmission • Automatic workflows for forwarding requests to different services • Electronic forms • Interconnection of different databases Citizens can access the e-Government portal to order copies of birth. customs officers can access applications for collection of customs duties. that the message was not altered from the moment it was digitally signed. The recipient uses his or her private key to decrypt the message. The digital certificate. Since the digital signature of a message depends on the private key used to produce it. It identifies the individual or entity which is to receive a key pair. contains the public key and serves as evidence that the individual identified in the certificate holds the corresponding private key. The recipient of the message can decrypt the digital signature using the sender’s public key. revokes keys when a private key may have been lost. Public key infrastructures are based on the principles of public key cryptography. an individual who wants to send a message uses the public key of the recipient to encrypt the message. The recipient then subjects the message to the same mathematical function to produce a second summary of the message. the system of public key cryptography reduces the ability of the sender to deny that a message was sent by him.Vlatacom / Annual catalogue 2010 PUBLIC KEY INFRASTRUCTURES Public key infrastructures support the use of applications that encrypt data and those that use digital signatures. issues keys. Public key cryptography can also be used to create digital signatures. one of which is kept private. the other made public. stolen or otherwise made public. A public/private key pair is a set of two numbers. which has been digitally signed by the Certification Authority. This is then attached to the message and encrypted using the sender’s private key. 18 19 . The electronic document or record which links the key pair to an individual or entity is a digital certificate issued by a Certification Authority. and provides notice regarding key pairs which have been revoked.e. then the recipient is assured of both the sender’s identity and the integrity of the message. The sender therefore knows that only the intended recipient can read the message. For example. i. It is possible for an individual to generate his or her own keys instead of a Certification Authority. Encryption of information in such a system is performed by using two mathematically related keys. A Certification Authority is a third party trusted to associate a public and private key pair with a particular individual or entity. If the digital signature can be decrypted and the two summaries are identical. The private key cannot be determined from the public key. A digital signature is created by the use of a mathematical function which produces a value which is dependent on the content of a message. more efficient. This system of trust. form a public key infrastructure. providing verification of the originator’s identity and faster. A public key infrastructure provides security services for electronic communications and the electronic exchange of information between parties. encryption of data or adding a digital signature is a simple process. usually carried out automatically by using the appropriate software. including those who do not have a previously established relationship. The public key infrastructure comprises comprehensive security technologies and policies. and • Encryption to protect critical emails and other data in a user-focused manner. PKI features: • User authentication stronger than traditional “passwords on servers” mechanisms. From the user point of view. formed of several Certification Authorities and their users. 20 21 .Vlatacom / Annual catalogue 2010 Two or more Certification Authorities can be linked together by cross-certification. paper-free business processes. using cryptography and relevant standards to provide fundamental improvements in computing infrastructure. • Digital signing of email and other documents. date and authorised person is recorded and stored within the system in order to enable inspection of the entire document history and accompanying processes at any time. The user can carry out different functions within the system depending on the rights allocated him or her. ARCHITECTURE AND FUNCTIONALITY OF VIDPS SYSTEM The system consists of the following modules: 1. quality control and final issuing of the document to its owner. It includes acquisition of demographic and biometric data from individuals.Vlatacom / Annual catalogue 2010 VIDPS – BIOMETRIC DOCUMENT ISSUING SYSTEM VIDPS (Vlatacom Integrated Document Production System) is a modular. time. It consists of: • Terminal for data acquisition: • TVlatacom kiosk • TOperator’s computer • Local server The kiosk comprises hardware components for the acquisition of biometric data: • Camera. provides adaptable working processes for the verification. controls. Data acquisition station 2. supervises and secures the entire process of acquisition of demographic and biometric data. authentification and validation of data. server or workstation within the system must have a valid certificate issued by the Certification Authority which confirms the identity of a person or computer. physical production of documents. Each user. which manages. The system is secured with the latest in data protection and access control technology. The system can be used for simultaneous production of different types of documents. distributed system for the production of electronic biometric identification documents. Other system elements The data acquisition station serves to collect demographic and biometric data. PURPOSE AND USE OF VIDPS SYSTEM VIDPS is a system for the production of electronic biometric documents. for taking facial image 22 23 . Personalisation server 4. its verification by authorised personnel. The system also provides access control whereby the system administrator defines different user groups with clearly defined access rights. System backend 3. Protection of the system is based on PKI and SSL standards. carries out quality control and issues finished documents to their owners. Every action. as well as all other data necessary for the functioning of the system The personalisation server has the following three functions: . The system can be used for parallel production of all biometric documents such as passports. used for communication between external systems and the CA in order to achieve a higher level of security and relieve the load on and isolate the certification body. The Certification Authority is a trustworthy body that issues certificates. for collection of fingerprints • Signature scanner. enables searching according to various criteria and provides services necessary for the functioning of other parts of the system • A workflow server which enables easy configuration of different procedures used during various document approval and production workflows. • Application storage. etc. controlling flow of resources in the system such as electronic cards. It consists of three parts: • A central server which stores the acquired data in the database. The acquired data is sent to the central server through the local server. holograms. Other parts of the system: • Document issue station. CA Entities & OCSP Responder database database database database Enrollment site Issuing Station Central Backend Site DPM PMP ID Personalization Server database database QA 24 25 . • A database which stores acquired biometric and demographic. It can be easily and quickly adapted to different sets of data necessary for different document types. etc. The system backend stores and processes data collected from all stations. This is where the data is verified through adaptive working circuits that could contain verifications of various stop lists.Personalisation of data and physical document production . Any person or computer that is to use or comprise an integral part of the system is required to possess a valid certificate issued by the CA which confirms their identity. where the document is issued to the owner after his or her identity is confirmed by fingerprint. • System user management system. It is very simple to add new local servers and stations for data acquisition to the existing system. handles their life-cycle and cancels certificates if necessary. The local server receives and stores the data from all terminals within one station. OCSP Responder (Online Certificate Status Protocol Responder). for collecting signatures The kiosk is controlled remotely from the operator’s workstation. identity cards.Preparation for document production during which data is organised into the form necessary for the production of the particular type of document (the system can be used for simultaneous production of several different document types) . driving licenses. External Systems: Certification Authority (CA). which controls the access rights of every system user.Control of quality and validity of finished documents. central to the PKI system. chips.Vlatacom / Annual catalogue 2010 • Finger scanner. . • Live checking of ID documents. palmprints. etc. processing and storage of fingerprints. New database records are added in line with NIST standards. forensic (criminal). It is used for the creation of new biometric databases.Vlatacom / Annual catalogue 2010 AFIS AFIS (Automated Fingerprint Identification System) – the system for automatic recognition of fingerprints is designed to provide the core of the e-Government system. facial image as well as of descriptive data about the person. up to ten facial images and up to seven images of personal traits – tattoos. • Assistance to police and other government agencies in solving crimes using collected biometric evidence – fingerprints. Vlatacom’s AFIS system supports the following operations by default: • Live data acquisition. etc. or both. identification. Vlatacom’s AFIS system presents a complete solution for collection. and verification in law enforcement and in identity management applications. • Verification of passports or visas (documents issued in line with ICAO standards). as well as to update existing ones.e. This system primarily enables: • Reliable identification – matching of biometric data with criminal records already in the central database. • Production of new ID documents.civilian. palmprints and other biometric data. photographic images and descriptive data. • Verification of person’s identity without an ID document. the collection and processing of a variety of biometric data of a person. Latent presents special type of forensic record. Civilian data usually comprises prints of both index fingers (rolled and flat prints). The system can be designed to process single or multiple record types . • Identification of persons without an appropriate identification document • Prevention of multiple identities by comparison with the entire central database 26 27 . scars. Vlatacom’s AFIS delivers a comprehensive solution for enrollment. i. The criminal or forensic record contains prints of all ten fingers. palmprints. and comprises of images of prints taken from the scene of crime. These biometric data include fingerprints. • Vlatacom verification kiosk or Vlatacom mobile devices .for biometric verification of identity • Scanning station – for acquisitin of biometric data from scanned papers in 500 or 1000 ppi resolution. • Live station – for live acquisition of biometric data from criminals • Latent station – for processing of latents • System backend APPLICATIONS: • Criminal booking • Forensic identification • Biometric travel document programs • Border Control systems • National e-document systems 28 29 .for acquisition of biometric data from citizens in rural areas.Vlatacom / Annual catalogue 2010 • Identification of criminals on the basis of latents found during criminal processing. • Exchange of data to support interoperability among ANSI/INCITS and other ISO compliant systems AFIS SYSTEM COMPONENTS: • Vlatacom Enrollment workstation – for live acquisitin of biometric data from citizens • Mobile enrollment units and Vlatacom mobile biometric stations or Vlatacom biometric suitcases . . oil terminals. and reaction to the potential threat. unmanned aerial vehicles and aerostats. aerostat Infantry and mobile patrols Fixed and mobile surveillance units 30 31 . Vehicles of all sizes and types. mobile and foot patrols. running. Flying and hovering helicopters. It is designed so that local reconnaissance stations constantly scan the territory. several regional and local centres. 365 days a year. 3. With the introduction of this system the number of staff needed for border control is significantly reduced. Different sources of information a correlated in order to take the optimal decision. alarming of the appropriate services.Vlatacom / Annual catalogue 2010 SYSTEM ARCHITECTURE Such a system of border control prevents: ELECTRONIC BORDER CONTROL The electronic border control system is used for the monitoring and management of state borders.Analysis involves the use of various sensors to verify the alarm and initiate a decision. The efficiency and reliability of border control has been significantly enhanced over the former approach. When the radar detects a suspicious subject. . Light planes and aerial vehicles. Everything is done automatically. factories etc. TERRORISM HUMAN TRAFFICKING ILLEGAL IMMIGRATION ARMS TRAFFICKING DRUG SMUGGLING GOODS TRAFFICKING National control center Regional centers Local centers COMINT UAV. as is the possibility of human error and abuse.Alarm means generating an alarm on the basis of a variety of data which enables appropriate and prompt intervention. turns in that direction. The system is based on the principle of DAAR (Detection. Analysis. stadiums. which has a zoom capability of up to 40 times. unmanned. Men crawling. 4.Reaction to the alarm is faster due to better coordination and response control. The system allows early detection of potential illegal crossings. military facilities.Detection involves multi-dimensional scanning of land. airports. their analysis. The system is designed to work under all weather conditions and in all types of terrain. Boats and ships. swimming. air and water. 5. . power plants. 24 hours a day. 2. Sensors detect moving targets: 1. fixed and mobile surveillance units. the camera. diving. Alarm and Reaction): . walking. Besides border control this system can also be used for the securing of special facilities such as prisons. The system consists of a national control centre. that is the average duration of their stay within the borders of the transit country. ministries. . This network can feed into an appropriate database containing: . information about passengers or a driver from the civilian or criminal database of the Ministry of the Interior. a computer running image processing software. Beside a command and control centre the system also includes border control points. vehicles with expired registration. based on automatically identified number plates. personae non gratae. databases on missing persons. The high-resolution camera cap- tures the number plates.Information on average transit speed of passengers through the country. while the video surveillance camera photographs the vehicle. an electronic document reader and a camera for video surveillance. This solution provides better border controls. etc. which does much to facilitate prompt and efficient police action in the event of criminal activity. together with the exact time of vehicle passage. Vlatacom’s improved system for recording of passengers and vehicles at border crossings is a number plate recognition system. which consists of a high-resolution camera for recording vehicles. government agencies. The command and control centre is connected to a database containing information on stolen vehicles. The connection of all border crossings into one network ensures up-to-date information on passengers and vehicles at any time. vehicles responsible for traffic violations with the possibility of issuing fines at the control point or border crossing. . can recognise the following: Stolen vehicles.Time of entry of passengers and vehicles into and exit from the country. . Such a database can also be used by other security services.Data on the vehicle itself (matching the number plate taken from the software of the ANPR camera with registration card data from the database of the Ministry of the Interior).Vlatacom / Annual catalogue 2010 PASSENGER PROCESSING SYSTEM FOR BORDER CROSSINGS This solution provides for installation and operation of equipment for monitoring and recognition of number plates.Matching passport data with vehicle number plate. with additional verification and matching of acquired data with that stored during the previous crossing. The border police officer verifies the identity of passengers and their permission to enter the country using Vlatacom’s electronic document reader. This makes it easier to discover attempts to illegally import and export vehicles and also to find and locate stolen. as well as to the civilian database. and can easily be upgraded by the integration of additional equipment with existing solutions. Vlatacom’s system has been designed to be stable and adaptable. as well as connection of all border crossings into one unified information network. and the computer immediately recognises letters and numbers and sends them to the command and control centre. .Information on the flow of vehicles across the border. other vehicle technical data. etc. 32 33 . making it easy to add functions in line with changes in a country’s laws and regulations and the needs of traffic control at border crossings. Each control unit can be integrated with other police systems and databases and the system. unregistered or in some other way suspicious vehicles. Upon the next border crossing this procedure is repeated. This information is sent to the command and control centre and is stored together with other information on the vehicle. a higher level of national security and a reduction in crime. Computer networks . Harris Stratex and NICE. installs and maintains systems based on its own technologies. and together with Motorola we have worked in Norway. and also in their distribution. Botswana and Angola. Vlatacom installs and maintains Motorola’s telecommunication systems in Iraq. The Vlatacom team is comprised of trained and certified engineers and technicians. As well as in Serbia.SCADA control and surveillance systems . Vlatacom offers maintenance services for first and second level telecommunication and IT systems. installation and system maintenance for: • Radio mobile networks • Wireless access networks • Transmission systems • Computer networks • Control and surveillance systems We have many years of experience in the design and installation of: . as well as systems from its partners. Our engineering team comprises a dozen experienced engineers. We have established very successful cooperation with Motorola in the development of new products and systems. Motorola. Service is offered 24x7 with a reaction time tailored to the individual needs of our clients.Broadband wireless access networks Vlatacom designs. Vlatacom possesses so called “big“ license for building of telecommunication networks and systems of international and national importance (1150E3). design.Automated vehicle location (AVL) systems . installation and maintenance. 34 35 .Digital mobile systems (TETRA) .Conventional radio-relay connected mobile systems . as well as a team of technicians with considerable experience in the installation of various systems.Vlatacom / Annual catalogue 2010 ENGINEERING IN TELECOMMUNICATIONS We provide new technological solutions. licenced for the design and installation of telecommunication systems. who provide preventive and intervention maintenance services for complete systems. so that user and base-stations from different manufacturers can be used within the system. such as data-transfer or connection to the fixed-line telephone network. Links can connect distances of up to 200km in one hop and work even when there is no lineof-sight between end points. Link throughput can range from 17Mb/s to 300Mb/s.Flexibility in choosing participants in radio communication . Major plane. Different user groups can be created within the TETRA system such that each isolated group can act as an independent network capitalising on all the advantages of the system as a whole. installs and maintains wireless link systems for fast data transfer.Vlatacom / Annual catalogue 2010 WIMAX BROADBAND WIRELESS DATA TRANSMISSION SYSTEM Vlatacom designs. ship or railway accidents involving rescue teams from various countries have shown that an interconnecting radio system technology is needed. Remote diagnostics of all devices in the system enable constant monitoring of the functioning of the entire network.Privacy 36 37 . The most frequently used microwave links are those from Motorola or Ceragon. TETRA DIGITAL RADIO SYSTEMS APPLICATION OF THE TETRA NETWORK TETRA has been designed for use by European organisations and public services for unified communication.Autonomy . since many methods of data encryption can be used.Flexibility in priority allocation . which besides their exceptional reliability and small delay time offer a high level of security. The European Telecommunication Standardization Institute – the ETSI – has supported the standardisation of such a technology. Such independent user groups have the following features: . 3 seconds.Group calls . • TETRA calls are much cheaper than those in GSM systems because in TETRA conversations there is less occupation of the line as compared to GSM. • If TETRA is used for data transfer between the user and the system (for example. without a reduction in the quality of voice transfer. • TETRA satisfies certain needs of organisations. for automatic vehicle positioning) the price of transfer is significantly lower.Definition of communication priority levels . TETRA offers the possibility of working outside the coverage zone. companies and institutions which GSM networks cannot (such as group calls. and provides a system participant capacity which is 3-4 times greater than in previous systems. • Unlike GSM. TETRA is based on a digital technology which enables data transfer (for example.Emergency calls . This trait is especially important in cases when the TETRA network is being used for surveillance and management of automatic remote systems. 38 39 . The increase in capacity is achieved by dividing one frequency between 3 or 4 system users. • A TETRA network is characterised by a very short connection establishment time of around 0.Text messaging facitlity .Interconnection with PBX and public fixed-line and cellular telephony . presence of a dispatcher and closed communications). while reliability and delivery time is more favourable than in the case of GSM networks.Communication outside the covered zone – Direct Mode operation . • The building of TETRA networks is cheaper than building GSM networks since TETRA base-stations have a greater coverage zone than GSM base-stations.Individual calls .Packet data transfer . which can be vitally important when the need arises for visits to zones not covered by the signal or when the network infrastructure malfunctions. One of the main advantages of digital technology over analogue is the significantly higher resistance to noise and interference.Efficient use of frequency resources ADVANTAGES OF TETRA NETWORK Unlike analogue radio networks.Encrypted speech and data transfer . which is around twenty times faster than the connection time in GSM networks.Vlatacom / Annual catalogue 2010 TETRA FUNCTIONS AND APPLICATIONS . computer databases or positions from GPS location units) in conjunction with the transfer of voice traffic. • the oil industry. 40 41 . Radio or GSM/CSD/GPRS/EDGE). which can be analogue or digital. • telecommunication systems. most commonly the WizCon and WonderWare SCADA applications. an important component is the software for visual presentation of the system state (the GUI – Graphical User Interface). • A module for sending command signals (analogue or digital).Vlatacom / Annual catalogue 2010 Server 1 Server 2 SCADA Workstations SCADA SYSTEMS Ethernet SCADA (Supervisory Control and Data Acquisition) systems are used for remote surveillance and management processes in: • electrical energy production and distribution plants. The system registers events with a resolution of 1ms and is able to react both to normal and unexpected events in the system in just a few milliseconds. RS-485. • water production and distribution systems and many other applications. Within the centre. Moscad FEP Self-Healing Multi Drop FO Ring FEP FEP FO Modem Radio FO Modem To Raw Water The RTU units have: • A local processor unit which controls the local process. RS-232. • A module for connection of incoming signals. • A communication component (Ethernet. MCP-T Port 1 Port 1 Port 2 Rs485 MCP-T Display wall These systems are comprised of a control centre and remote terminal units (RTU) which are directly connected to sensors and actuators in the facilities. The control centre collects and processes data. analyses it and manages the process through commands sent to the remote units. implemented via IP cameras of the latest generation. Center for remote surveillance and management Components of the centre for surveillance and management are: • Equipment and software for traffic surveillance (central servers. video walls. connected into one centre. The traffic infrastructure consists of: • Traffic light systems • Radar vehicle speed monitoring • Variable traffic signs • Uninterruptable power supply systems (on-site at intersections) 2. etc. Traffic infrastructure 2. Communication network 1. operator’s workstations.) • Databases • Communication equipment and database • Equipment and software for control of information displays 42 43 . Traffic infrastructure Traffic infrastructure refers to road markings and upright traffic signs and signals. Centre for remote control and traffic management 4.Vlatacom / Annual catalogue 2010 TRAFFIC CONTROL SYSTEM Management of traffic lights and traffic signs System Elements 1. as well as subsystems for traffic surveillance. of which there can be many hundreds. Video surveillance system 3. 3. Video surveillance system A system of functional traffic video surveillance. remote control and notification. ) • Equipment providing constant power supply (UPS systems) 4. which serve for global traffic management and provide information on: • Recommended directions • Traffic jams • Roadworks in progress • Vicinity of parking zones • Maximum allowed speed The Vlatacom system for remote control and management enables: General traffic control and management – traffic redirection. • General increase in safety – identification of suspicious vehicles. Communication network The communication systems used are based on broadband wireless technologies and are implemented in point-to-point or point-to-multipoint radio networks configurations. congestion recognition. movement detection. • Creation of a multipurpose monitoring and safety centre. etc. elimination of congestion. • Creation of a high-capacity modern communication system 44 45 . dynamic notification. encouragement of safe driving. counting vehicles. “green wave” synchronisation. • Law enforcement – reduction of the number of accidents. adoption of better laws. alarm activation. surveillance of important facilities and their surroundings. higher system throughput.Vlatacom / Annual catalogue 2010 • Equipment and software for video surveillance (vehicle detection. The remote control system also includes VMS information displays of varying dimensions. traffic flow control. • Interconnection of traffic signals – creation of connected corridors. • Increase in police efficiency – enables redistribution and more efficient use of police resources • Long-term budget savings • Coordination of city public services – public transport and others. collection of data and evidence. Actions that can be carried out. Reports – based on the contents of the system database. including immobilisation of the vehicle. This possibility is provided for devices which do not provide GPRS connectivity. This position is displayed on a map. all with a single command. There is also the option to install autonomous functions to be executed at critical moments regardless of communication with the control centre or readiness of the operator at the communication centre. Alarming and notification – the GPS device in the vehicle can be programmed to send an alarm or notification to the centre whenever certain conditions are met. etc. The primary communication method is via the GSM network.). State – information on the status of internal sensors in the vehicle is available through a set of digital connections to the GPS device. operator activities. These records can be downloaded by the control centre at the request of the operator or automatically. the operator can establish whether the engine is running or whether the panic button is on. In this event the operator or the GPS device can carry out a number of pre-defined activities. 46 47 . alarms and notifications. Information on speed and direction can also be received. depending on the devices connected to the digital outputs are. This receiver has a GSM modem used for communication with the control centre and a microprocessor for processing and storage of data. Generating local log in vehicle – just as the GPS device can be programmed to send alarms and notifications. Sending commands to the vehicle – an operator with appropriate authority can execute any activity on the vehicle by using the digital outputs on the GPS device. Depending on their needs the user can order any number of geographic maps of various regions and to different scales. TETRA network. locking the doors. immobilisation of the vehicle’s engine. That information can be stored in the GPS device inside the vehicle. it can also be programmed to register time. SYSTEM FUNCTIONS: Positioning – the centre can send an inquiry to each vehicle and establish the current and last valid position. Tracking – a route which the vehicle must take in a certain time period can be defined. With additional equipment it is possible to leverage the user’s existing communication infrastructure (such as radio network. etc. so that if the vehicle leaves the planned route the system can detect this. position and status in the local memory of the in-vehicle device. The system includes a fully-equipped control centre. time interval. The system can determine the region. for later review. Each vehicle is equipped with a GPS receiver. using GPRS and SMS.Vlatacom / Annual catalogue 2010 AUTOMATIC VEHICLE LOCATION SYSTEM (AVL/GPS) The Automatic Vehicle Location System (AVL) enables tracking of the current position of a vehicle.. activating the horn. For example. the state of the vehicle and its movement history. for example. maximum speed or a combination of all these. as pre-defined. various reports are available on the status and use of the vehicle. The computer acquires data from the sensor through the communication network (TETRA) and sends a request to the centre which immediately sends back information on whether the vehicle has been stolen. The camera at the control point captures a high resolution picture. etc.. When a suspicious vehicle is recognised and flagged in the centre the entire system is notified and it is possible to recognise and detect the passage of that vehicle anywhere in the system. is being searched for. unregistered or in some other way suspicious vehicles (vehicles on a blacklist). The system operates according to the following concept: High resolution cameras capture the number plates of vehicles at the control points. etc. or the vehicle does not have valid number plates. depending on the needs of the client and architecture of the existing system. Mobile control center Registreted vehicle database Control server database Mobile control center Fixed control point TETRA Fixed control point Mobile control center Fixed control point VEHICLE LOGGING USING CONTACTLESS CHIPS The system for recording the passage of vehicles via radio chips is based on sensors which detect and read a contactless chip built into the vehicle. which consists of a high-resolution camera and a computer running image-processing software. The control points are equipped with a number plate recognition system. The connection between the control point and the unified control centre is achieved via a wireless network (a TETRA network) or existing optical network. This system can also be used for control of access by vehicles to zones with limited access rights (city areas closed to traffic such as congestion zones. speeding. In this way it is possible to instantly detect and locate stolen. movement in a prohibited direction. In the event that the information about the colour or type of the vehicle does not match the information from the database. This system provides additional control of vehicle passage and access to zones with limited access rights. from which it is possible to separate letters and numbers.Vlatacom / Annual catalogue 2010 AUTOMATIC NUMBER PLATE RECOGNITION (ANPR) SYSTEM This modern system is used for the recording of vehicles passing by a particular location where the control set is installed. The system can also be used for the detection of traffic violations – passing through red lights. The data on number plates and the captured vehicle image is recorded in the local database and compared with information from the central vehicle database. The mobile ANPR system is an efficient solution for quick detection of a large number of vehicles. The international abbreviation ANPR refers to Automated Number Plate Recognition. private and public parking lots. The system consists of checkpoints (fixed and mobile) that include several sensors and a computer for gathering of data. whether moving or parked. and if necessary the nearest police station is notified. It is possible to read the chip even at speeds in excess of 120km/h. especially in combination with the number plate recognition system. the nearest police patrol is notified at once.). 48 49 . etc. The control points can be fixed (with one or more ANPR and surveillance cameras per point) or mobile (installed in a patrol vehicle) with one or more cameras on the roof of the vehicle. and sends them to the command-control centre. yellow lanes in urban areas. The contactless radio chip is placed on the windshield or in another suitable location within the vehicle and contains basic vehicle information. An additional optional feature of this system is pattern recognition – recognition of a vehicle of interest or group of such vehicles at any location in the system. users and visitors at the airports and stadiums. contains ticket recording.Ticket issuing – where every ticket contains data of the visitor. At the moment the solution with controlled access improves general safety of all participants. In this way. every visitor is identified and in the case of the incident. VSSPS is a solution suitable for the airports – by using VTSS. as well as efficient procedure of passport and security control through e-gate is made possible. supporters groups are controlled. VSSPS includes systems which perform: • Controlled selling of tickets– buying tickets is done in two steps: . 50 51 . Vlatacom Club ID Pass (VCIDP) 2. safety is significantly improved. as well as prevention from terrorist attacks. enjoyment in the game and sportily supporting is not diminished.Reservation of the tickets – tickets are paid and voucher with the code is issued . users and travelers. taking facial image of the visitor. VSSPS solutions for the stadiums is designed with the goal to prevent disturbances and violent behavior of the supporters. and at the same time presents simple and efficient solution acceptable to visitors. Vlatacom Ticket Selling System (VTSS) 3. issuing boarding tickets and baggage tags.Vlatacom / Annual catalogue 2010 VLATACOM SELF SERVICE PASS SOLUTION (VSSPS) Vlatacom Self Service Pass Solution (VSSPS) presents solution for fast. Vlatacom Ticket Issuing System (VTIS) 4. Vlatacom Entry Control System (VECS). secure and efficient service for passengers. VSSPS is performed through the following four systems: 1. VTIS and VECS systems. • Entrance record – using e-gate. verification of the fingerprint of the visitor. security control (metal detector). By implementing this solution. it is made easier for the visitors to buy tickets. possibility of storing data of the visitors in the database. buying plane tickets. safer passenger control during arrivals and departures is enabled. and in all this. perpetrators are more easily found. Vlatacom / Annual catalogue 2010 Products 52 53 . The portable base-station is equipped with all the equipment necessary for independent operation. The four-level pneumatic telescopic mast is placed on the trailer towbar. a microwave link and batteries which provide at least four hours of equipment operation during a power failure. fuel tanks. during large public gatherings and events. generator. cables. trailer or other suitable vehicle. protecting the telecommunications equipment from damage. The equipment consists of a TETRA base-station. The work space is thermally insulated and equipped with air-conditioning. so it is installed in a shock-absorption rack. Portable TETRA – trailer The portable base-station is also made by installing an MTS2 (Motorola TETRA Station) base-station with two base radios into a trailer featuring a specially-constructed upgrade for that purpose.3m. The telecommunications equipment is not transport-grade. The freight section of the van is divided into work and storage space. antennas. 54 55 . The second section is the storage area which contains the equipment necessary for the functioning of the telecommunications equipment. and in all those situations when it is necessary to temporarily enhance. The rack absorbs vibrations created while driving. locally or as part of the system. The trailer upgrade is divided in two sections. The mobile base-station is created by installing a MTS2 (Motorola TETRA station) base-station with two base radios into a van. The omnidirectional TETRA antenna is installed on the mast while the external antenna link unit is placed on the pillar on the side of the trailer. tools.Vlatacom / Annual catalogue 2010 MOBILE TETRA BASE-STATIONS Portable TETRA base-station – van The mobile TETRA base-station is a broadcasting device that can be used in emergency situations. cable reel and electrical cable. The trailer is adapted for use with a four-wheel drive vehicle (a Land Rover Defender). etc. regardless of available infrastructure – a generator. providing there is a connection of E1 capacity (2 Mb/s) to the central site of the system. The first section is the operations section. improve or expand the capacities of the existing fixed TETRA infrastructure in a particular area. and reaches a full height of 7. The vehicle is adapted and equipped with all the equipment necessary for independent functioning of the basestation. a power supply. equipped with air-conditioning and in which the telecommunications equipment is installed in the shock-absorbtion rack. All other additional equipment is stored in the storage area: extendable mast. remote villages and rural areas which do not possess a telecommunications infrastructure The mobile acquisition station is a front end which includes all the necessary hardware and software components for the recording of demographic data. facial images and signatures. software and hardware of large security systems. In practice. Power for the biometric equipment is supplied from the alternator of the vehicle itself (there is no external power source). the document can be authenticated and the data automatically transferred to the digital registration form. This allows the administrative capacities of the country to be brought closer to users and for the government to efficiently serve its citizens. The mobile acquisition station can communicate directly with the back-end system using a satellite connection or other means of communication.000 km without refuelling. If the client brings the identification document he currently possesses with him. the mobile acquisition station is a four-wheel drive vehicle with incorporated biometric equipment. The solution is easily integrated with the workflows. The vehicle is equipped with air-conditioning and can cover up to 1. the portable station can verify fingerprints and/or facial images during the recording of data or handover of documents in the final phase of issuing. fingerprints.Vlatacom / Annual catalogue 2010 MOBILE BIOMETRIC STATION The mobile biometric acquisition station is an autonomous station primarily designed for registration and issuing of identification documents to populations living in difficult-toreach regions. while other languages are available upon request. which provides additional verification of identity. 56 57 . Optionally. as well as for printing of biometric documents. The standard form of the system offers a graphical user interface in English. All biometric information is validated in accordance with ICAO recommendations. iris scanner. presence of hair. beard. It can also be user-controlled or controlled by the operator. 58 59 . The captured data is kept in formats which comply with ISO/IEC 19794 standards. security passes. By combining different devices a biometric kiosk could function as: • a biometric enrollment station and/or • a biometric identity verification station. The kiosk also includes a UPS device which provides continued operation in case of power failure. • a signature pad. A PC. Facial. • a fingerprint scanner. barcode). ID cards and driving licenses. documents. • a document reader (for passports. health insurance cards. The kiosk can be fixed to the floor or freestanding. fingerprint scanner. etc. The kiosk can also be delivered in a generic form with installed document reader. and functions regardless of skin colour. Only authorised personnel who have been biometrically identified and whose activity is recorded in the central system have access to the data. eye and fingerprint images of the document holder are captured and compared to those stored in the memory of the ID document (on contact or contactless chip) or printed on the document (original photo.Vlatacom / Annual catalogue 2010 BIOMETRIC KIOSK The biometric kiosk is a unique workstation which represents the entry point of every biometric system. The kiosk is constructed so as to satisfy the ergonomic needs and requirements of end users. touch screen monitor are installed in the kiosk.) The kiosk is also used for biometric verification of the identity of the ID document holder. The biometric enrollment kiosk is used in the process of application for identity cards. etc. Such a kiosk can be used for both data enrollment and identity verification. Vlatacom has developed this multi-purpose kiosk in order to enable efficient acquisition and verification of biometric data in the various systems that require it. The complete biometric solution can be integrated with all biometric security systems. children. as well as a microphone and speakers enabling communication between the user and the operator. The private and biometric data of document holders is fully protected. accommodating handicapped persons. The biometric verification kiosk consists of: • a digital camera. etc. The kiosk is also used for verification of the authenticity of the document through analysis of the document itself. signature pad and digital camera. The biometric enrollment kiosk consists of: • a digital camera. The kiosk enables enrollment of the biometric and demographic data necessary for the issue of new electronic personal documents such as passports. • a fingerprint scanner. ID cards. polling stations. etc. fingerprints and signatures. passports. Collected data is stored on a hard drive in the form of digitally signed and encrypted XML documents. The station is comprised of a document reader. ease of transport. fingerprints. entrance gates at major sporting events. short start-up time (only three minutes) and easy integration into large systems. such as personal ID cards. etc. flexibility. The workstation is also used for biometric identity verification by comparing the fingerprints and/or facial images of the client. The program offers excellent operating speed and reliability. a portable PC and the software which controls all these devices and performs the acquisition of demographic data. during the issue of documents to citizens. reliability. medical cards. Owing to the installed program modules for quality control of scanned facial images. visas. it is not possible to accept applications with poor-quality pictures. The workstation is intended for collecting data: a) from people in small settlements where the installation of stationary workstations is not cost-effective b) from people with health problems who cannot come to the office to apply for personal and travel documents c) from VIPs. signature scanner. The main advantages of this solution are its robustness. driving licences. facial images and signatures.Vlatacom / Annual catalogue 2010 PORTABLE BIOMETRIC WORKSTATION The portable biometric workstation is an efficient solution for the acquisition of biometric and demographic data in the process of applications by members of the public for personal and travel identification documents. Such verification is necessary at border crossings. fingerprint scanner. 60 61 . digital camera for taking facial images. or transmitted on-line via secure wireless communication channels. signature pad. The main advantages of this solution are its robustness. driving licences. facial images and signatures. without verification functions. lamps for apropriate lighting that contribute better picture quality. visas. such as personal ID cards. The station is comprised of a slap fingerprint scanner. digital camera for taking facial images. Owing to the installed program modules for quality control of scanned facial images. fingerprints and signatures. short startup time (only three minutes) and easy integration into large systems. reliability. This workstation offers more cost effective solution for applications that require only enrollment. Collected data is stored on a hard drive in the form of digitally signed and encrypted XML documents. medical cards. it is not possible to accept applications with poor-quality pictures. 62 63 . a portable PC and the software which controls all these devices and performs the acquisition of demographic data. or transmitted on-line via secure wireless communication channels. fingerprints. ease of transport. etc. flexibility.Vlatacom / Annual catalogue 2010 PORTABLE BIOMETRIC ENROLLMENT WORKSTATION The portable biometric enrollment workstation is an efficient solution for the acquisition of biometric and demographic data in the process of applications by members of the public for personal and travel identification documents. The program offers excellent operating speed and reliability. passports. ) received from MRZ. for verification of visual security elements on the document. while the VDR-C has all the functions of the previous model. etc. Clients can also obtain a library of functions. but is much smaller and faster. The scanning process begins automatically when the document is placed on the scanning surface. VDR-C Device These devices permit scanning and reading of travel documents and electronic ID cards in line with ICAO (International Civil Aviation Organization) recommendations and the ISO 7501 standard. The VDR-1 also offers reading of ID cards with contact chip. 2D bar code and contact/ contactless smart card and display of verification results. the checking of the security features of the document and the archiving of the data. Both devices were entirely developed by Vlatacom. • Display of data read from machine-readable zones (MRZ). validity date. 2D barcodes and contact/contactless smart card. boarding cards etc. as mentioned above. Model 1 and Compact model) are desktop devices for the scanning and reading of passports. giving them the opportunity to integrate our software into other business applications. The device and accompanying software provide this through the automatic reading of data from the document. Scanning is carried out under white (ordinary).Vlatacom / Annual catalogue 2010 VDR-1 AND VDR-C ID DOCUMENT READERS The VDR-1 and VDR-C (Vlatacom Document Reader. • Comparison of data (name. • Automatic archiving of data and user-friendly graphic interface for conducting searches of database. 64 65 . This software enables the following data processing after acquisition from the VDR device: • Display of photographs received from the three light sources. As soon as scanning is over. Vlatacom is constantly working on designing devices which fully satisfy the demands of document verification. • Easy-to-use zooming. the operator can visually verify encrypted elements on the screen. as well as reading of other identification documents. ultraviolet and infrared light. machine-readable ID cards. visas. • Document validity check immediately upon verification of digitally signed data from 2D barcode and contact/contactless smart card. VDR software enables simple device handling. • 12 hours’ operating autonomy at full load. Vlatacom’s application performs the following functions: • Retrieval of information stored in Machine Readable Zone (MRZ) and on the chip embedded in ID documents • Display of retrieved data • Fingerprint capture at a resolution of 500 dpi • Automatic detection of document type • Matching of live-scanned fingerprints and authentication with the data stored on the document • Cryptographic protection using Security Access Module (SAM) cards • Upload/download of data to or from a desktop computer • Standalone and wireless network operation modes • Using a Wi-Fi. With the help of this technology the verification of identity and travel documents can be quickly and reliably carried out on buses and trains. Vlatacom’s VDR significantly increases the security and efficiency at check points. This device can be used as standalone or linked by the wireless connection to the country border entry control system. VDR HANDHELD Vlatacom’s ID verification portfolio includes a handheld station for inspecting machinereadable ID cards. and for biometric verification of their holders.Vlatacom / Annual catalogue 2010 HANDHELD AUTHENTICATOR – PORTABLE FINGERPRINT AUTHENTICATOR HANDHELD AUTHENTICATOR • Intended for biometric verification of document bearer identity. • Compares actual fingerprints with fingerprint written in 2D bar code on the card. high reliability of verification.0 interface it can exchange data with other computers • Option of communication through TETRA or GRPS systems • Option of communication via WiMAX wireless internet The advantage of this system becomes even more obvious in situations when many ID document holders have to be checked in a small amount of time. passports and visas. • Easy and simple to use. 66 67 . Ethernet and USB 2. Identity checks can be performed by border police officers even before the passengers arrive to the checkpoint. These devices can also be used for verifying the identity of persons with machine readable IDs at traffic stops and routine checks. the operator and the cardholder get the matching result . Once the fingerprint capture is completed. gate etc.“match” or “no match” through audio and visual signals. The device can be powered by a Li-ion battery supply. with no slots for inserting the card. Authentication process can be used on the following documents: . it has a general purpose output port with two galvanic isolated signals . Vlatacom’s Authenticator has a great value in solutions where authentication and fingerprint recognition have to be done quickly and easily with a mobile device that is simple to operate. convenient for health care.Health cards The light-weighted compact device scans the subject’s finger using a quality fingerprint scanner operating at 500 dpi resolution. The battery autonomy is 12 hours under heavy usage.Vlatacom / Annual catalogue 2010 BIOMETRIC AUTHENTICATOR Vlatacom Biometric Authenticator is a portable device for matching a “live scanned” fingerprint with the one in form of a 2D barcode printed on identification card. the process goes to the next phase. In addition. 68 69 . Authenticator automatically detects the card and scans the barcode. The operator needs only to place the card on top of the scanner window to trigger the authentication process. which is “live” scanning of the cardholder’s finger.a door lock. The Authenticator is intended for indoor use. Authenticator communicates with the environment over USB interface. high reliability of verification • Can be held in a hand • Easy and simple to use The authentication process lasts a couple of seconds and is performed in two steps. After a successful barcode information retrieval. USB or A/C connectors. elections • Compares the actual fingerprint with the one stored in 2D bar code on the card • 12 hours’ operating autonomy at full load. • Performs biometric verification of the ID card bearer. It is initiated by putting a card or badge with the barcode on the embedded scanner window.ID cards . It is user-friendly and fast operating.Voting cards . Vlatacom / Annual catalogue 2010 QUALITY POLICY AWARDS PATENTS FAIRS AND CONFERENCES 70 71 . o.o. according to ISO 9001:2008 requirements. while complying to legal and normative requirements. 4. is to supply services in design. quality always” 72 73 . fulfilling the requests and expectations of the Customer. VISION Its Mission and Vision VLATACOM achieves by consistently applying the following principles: 1. We make our decisions on the basis of information analysis. 6. 3. development. 2. We focus on our Customers and strive to increase their satisfaction with our products and services. implementation and integration of products in the areas of Communication. Our slogan is: “Customer first. 7. We plan and constantly implement and verify processes in our quality management system. We empower our employees to develop and commit their creative skills for their own and for the company benefit.Vlatacom / Annual catalogue 2010 POLICY OF QUALITY The mission of VLATACOM d. We develop mutual beneficial relationships with our partners in order to create added value for the parties and for the Customers. 5. We assign to our management the main responsibility in realizing our vision through systematic approach to leadership processes. production. We continuously improve our quality management system and processes. MISSION VLATACOM’s vision are products and services recognizable by their quality and competitiveness on the world market. Biometric and Information Technologies. 2009 MORPHOTRAK For dedication and commitment in improving safety with MorphoTrak s proven identification technology October 2009 RECOGNITION OF OUTSTANDING PERFORMANCE OF PRESIDENT AND CEO OF MOTOROLA Mr. 2004.Vlatacom / Annual catalogue 2010 AWARDS THE DIAMOND EYE AWARD for Quality Commitment and Exellence Rome. October 11. MOTOROLA AWARD FOR OUTSTANDING PERFORMANCE For Years 2003 and 2004 for successful implementation of AFIS-FIIS and Dimetra IP project in the Ministry of Interior of Serbia 74 .Spain.The Union of ICT Societies of Serbia 75 For a project in management sector: System for control of passengers on border crossings Belgrade. 2007 NEW MILLENIUM AWARD Internationa Europe Award for Quality Madrid . 2009 REPUBLIC OF SERBIA MINISTRY OF INTERIOR Recognition Duke Jakov Stevanovic Nenadovic for extended assistance and outstanding cooperation in the field of security January 2005 INTERNATIONAL RECOGNITION JISA . Mike Zafirovski. Italy. 2009/0253 Reg.Biometric Enrollment Kiosk – Manual for assembly (device) BEK . No.Vlatacom Library of Software Modules CAS – Software for Central Alarm System server client CAS – CSS facility software BEK .2008/0075 P .Vlatacom / Annual catalogue 2010 PATENTS No 1 2 3 4 5 Reg. 6 P .2005/0718 8 9 3 4 5 Rb 1 Biometric Enrollment Kiosk Photo Booth VDR-H Handheld full-page document reader P .Biometric Enrollment Kiosk – Manual for electrical assembly Reg. No.2007/0074 MP . D-18/2007 10 11 12 13 14 Registration of Copyright Works AVL Server for Automatic Vehicle Location AVL Client and Tools for Automatic Vehicle Location AVL Web Server for the Automatic Vehicle Location system ID acquisition application for the acquisition of biometric and demographic data ID verification application for the verification of identification documents and personal identity MobVid application for mobile devices for verification of identification documents and personal identity VDR-1 firmware VDR-1 SDK VDR-1 Demo application Vlib .2005/0717 7 P . No. A-349/05 A-350/05 A-351/05 A-352/05 A-353/05 A-354/05 A-355/05 A-356/05 A-357/05 A-358/05 A-405/05 A-406/05 A-72/07 A-73/07 No 1 Patent Registrations VDR1 ID Document Reader (Travel and ID document reader) ADEMCO-MOSCAD Interface (Alarm system to RTU controller interface) 2 Design Registration Biometric Enrollment Kiosk 76 77 . Canada 1-3rd October 2007 eID and Border Control Roundtable Forum Dubai.com VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATA Finances and Executive Management: web page: Resources: Predrag Stanković ANNUALwww.O. UAE 26th March 2007 5th Government Discussion Forum on Electronic ID Documents Kuala Lumpur. Italy 27-28th November 2007 CARTES 2007 Paris. Austria 6-7th July 2006 CARD-EX 2006 Cairo. Canada > Stand 4&5 21-23rd September 2009 ICAO Regional Seminar on MRTDs Biometrics and Security Standards Abuja. Canada 6-8th September 2006 GLOBAL SECURITY FORUM Vienna.com EDITION 377 11 99 VLATACOM ANNUAL EDI VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANN e-mail: [email protected] / Annual catalogue 2010 FAIRS AND CONFERENCES CARTES 2009 Paris. Poland 17th November 2006 CARTES 2006 Paris. France 13-15th November 2007 3rd ICAO Symposium and Exhibition on MRTDS Biometrics and Security Standards Montreal. Nigeria 6-8th April 2009 CARTES 2008 Paris.com Fax: +381 11 377 11 99 VLATA VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION ANNUALFax: +381 11VLATACOM ANNUAL [email protected] VLATACOM ANNUAL EDI VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANN EDITION VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATA ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDI VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANN EDITION VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATA ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDI VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION 79 . Ukraine 10-13th October 2006.O. Egypt 6-8th May 2006 CARTES 2005 Paris. VLATACOM ANNUAL EDITION VLATACOM ANNUALSales: EDITION VLATA Marketing and President: ANNUALDunavska 7. France 15-17th November 2005 78 EDITION VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATA ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDI VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANN EDITION VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATA ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDI VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANN EDITIONCONTACT INFORMATION VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATA ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDI VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANN EDITIONVLATACOM D. France 7-9th November 2006 SMART eGOVERNMENT 2006 Belgrade.com ANNUAL EDITION VLATACOM ANNUAL EDITIONtanja@vlatacom. Canada > Stand 35 6-8th October 2008 Security Document World and Identity Loop London. ePassports and e-ID Roundtable Forum Warsaw.com ANNUAL EDITION VLATACOM ANNUAL [email protected]. France > Stand 4 S 088 4-6th November 2008 4th ICAO Symposium on ICAO MRTDs Biometrics and Security Standards Montreal. Malaysia 6-8th December 2006 ID World 2006 Milan.com VLATACOM ANNUAL EDI VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANN EDITION VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATA Technical Sector: ANNUAL EDITION VLATACOM ANNUAL EDITIONLogistics: VLATACOM ANNUAL EDI Trajko Ciprovski Dr Aleksej Makarov Head of Logistics Chief Technical Officer VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANN Phone: +381 11 377 11 00 Phone: +381 11 377 11 08 EDITION VLATACOM ANNUAL EDITION377 11 99 Fax: +381 11 377 11 99 VLATA Fax: +381 11 VLATACOM ANNUAL EDITION aleksej@vlatacom. Italy 29-30rd November 2006 Regional Border Control.com EDITION VLATACOM ANNUAL EDITIONHumanNikolić ANNUAL EDI VLATACOM Tanja Chief executive officer VLATACOM ANNUAL EDITION VLATACOM ANNUAL EDITION VLATACOM ANN Chief Financial Officer Phone: +381 11 377 11 00 Fax: +381 11 VLATACOM ANNUAL 377 11 00 EDITION VLATACOM ANNUAL EDITION377 11 99 Phone: +381 11EDITION VLATA Fax: +381 11 377 11 99 pedja@vlatacom. Zemun EDITION VLATACOM ANNUAL EDITIONToma Nikolić ANNUAL EDI VLATACOM Vladimir Cizelj 11080 Belgrade Phone: +381 11 377 VLATACOM ANNUAL EDITION VLATACOM11 11 00 Chief Marketing Officer 11 44 ANN ANNUAL EDITION VLATACOM Serbia Fax: +381 11 377 99 Phone: +381 11 377 EDITIONPhone: +381 11 377 11 00 vladimir@vlatacom. UK 22-23rd April 2008 ID World 2007 Milan. 2nd ICAO Symposium Montreal. Serbia 25-26th October 2006 CARDEX AND IT SECURITY 2006 Kiev. France > Stand 4 M 056 17-19th November 2009 5th ICAO Symposium Montreal. Vlatacom / Annual catalogue 2010 80 .
Copyright © 2024 DOKUMEN.SITE Inc.