Smart Government

BIOMETRIC

PASSPORT

How did we make

the revolution?

Why our products are unique?

Our products are unrivalled for their innovative approach. These are patented and certified high-tech solutions that address real challenges.

Our road traffic solution is based on equipment from leading European vendors. Thus, we are able to control the situation on the roads in real-time.

Where are we different?

Our products and those of our partners are being improved in various ways, going through the stages of RnD and business development on each side.

After approval, we transfer the product, complete documentation, as well as marketing and sales manuals to our regional centres.

Do you want to make the process

of interaction with citizens more transparent?

Relevance

Passport forgery and the counterfeiting of passports are a gateway to a wide range of illegal activities.

What issues does the product solve?

An international security strategy relies on preventing persons from travelling with a false identity or using documents not issued by the official authorities. As a result, there has been a trend away from less secure machine-readable standard passports toward higher-security electronic passports. These ‘e-passports’ are equipped with a chip containing the biometric data of its owner, giving enhanced protection against counterfeiting and forgery.

Infrastructure is key to functionality

Hardware and software complex for registration and issuance of documents;

Registry of citizens;

Hardware and software complex of personalisation and verification;

ICAO-compliant Public Key Directory;

Operating system NOS, which corresponds to the EAL4 Common Criteria for Information Technology Security Evaluation;

Hardware and software complex for registration and issuance of documents;

Registry of citizens;

Hardware and software complex of personalisation and verification;

ICAO-compliant Public Key Directory;

Operating system NOS, which corresponds to the EAL4 Common Criteria for Information Technology Security Evaluation;

Scopes of

application

Identify a person as a citizen;
Tool to identify access to personal bank accounts;
Tools for obtaining public administrative services via the Internet;
Tools to access government databases for filing tax reports, obtaining statements and certificates;
Tool to access electronic voting system;
Tool for digital signature.

Profit from product

implementation

For governments

The biometric passport and ID system allows for faster and more effective identification of citizens. Such documentation is practically impossible to fake, contributing to an improved security system on a state level. It also simplifies border control and internal and external travel tracking. Biometric IDs also foster more efficient processing and analysis of data.

For people

Biometric IDs provide a unified way to identify citizens for domestic and international operations. It allows people to travel more quickly, as they no longer have to worry about external passports and voting online. Beyond these advantages, it simplifies daily operations, from bank transactions to social security service provisions. It also enhances privacy protection for citizens.

For partners

Partners get a highly reliable, risk-free business for the production or distribution of passports. It also creates a niche for services that support and maintain software and consult employees of the relevant government organisations.

How it works

Order passports

Add citizen place of registration and issue passports

Start citizen services

The consumer is happier!

Start
conversation →

Integrates with existing government services

E-visas and biometric passports are easily integrated into existing government services. Government agencies can easily track the movement of citizens, keep statistics and use the data to ensure the internal security of the country.

What it looks like

Advantages

Innovation

A biometric passport is the next level of government development. This modern technology creates opportunities that were unimaginable before.

Data control

Biometric IDs provide the government with complete digital control over its citizens' data. Thus, they allow effective analytics and add extra services based on the collected data.

Copy-proof

Biometric IDs are protected and verified according to international standards and have certificates from auditing centres. Their chips provide top-level security and cannot be hacked.

Integrability

The technology can be integrated with IT systems in various government departments. It enables authorities to complement existing systems with powerful tools seamlessly.

Security

The software server is located in the state territory, and it is under constant federal control and protection. It is a cloud-based system with in-depth implementation of the world's best security methods, including cryptographic algorithm encryption.

How are we different

from our competitors?

We belong to the state
Give complete control to the state
Do not require local printing
Provide many tools and services

We have a flexible

approach to pricing

The cost of protective elements depends on the order volume, composition and size.
Contact us to get the best price for your products.

A step-by-step product

implementation plan

Estimate time: up to 2 months

Stage 1

Partner Registration

We forge a partnership and sign a contract with the manufacturer. Then, the partner gets access to a personal account with a dashboard at our web-page.

Stage 2

Entering Information Into the System

Our website offers a user-friendly and intuitive interface. The customer goes through a fast and straightforward process of filling in the information about the company. Then, the partner adds products to the system using their personal account.

Stage 3

Order

The manufacturer places an order for a batch of protective elements through a personal account. The order's execution starts after the receipt of the payment. The partner can view the current order's status in the system: payment pending, manufacturing in progress, order shipped, order completed.

Stage 4

Analytics

Once the sales of products with security elements have commenced, the manufacturer can follow the inspection's analytical data using the dashboard.

Stage 5

Support

We provide all-encompassing external technical and consulting support to manufacturers and end users. We also follow up on the partner's queries.

Stage 1

Analysis of the Current Situation in the Partner's Area

We collect data about the prospective market in the partner's operation area. The insights of the analysis are presented in a dashboard report. We also analyse the partner's prospects and opportunities.

Stage 2

Gap Analysis, Implementation Plan, and Budgeting

After analysing all the data, we create a strategic implementation plan and map out the market entry. Taking into account the current situation, we plan a high-level budget for the partner.

Stage 3

Software Deployment

We initiate full deployment on the partner's local servers. We ensure fast and simple software installation and provide easy access to the partner's staff.

Stage 4

Partner Training

We provide the partner with all the necessary information about the work processes. We train the partner to work with and maintain the system and prepare the personnel to provide technical and informational support to end users.

Stage 5

Launch

Together with the partner, we carry out start-up and adjustment works, as well as the further development of the pilot project. We adjust the work of the partner's internal services.

Stage 6

Support

We provide external technical and consulting support to the partner. If need be, we can develop software for different needs together with the partner.

Global

presence

Being a global group means knowing what challenges the world is facing and how to tackle them in different markets.

Being a global group means knowing what challenges the world is facing and how to tackle them in different markets.

Certificates and patents

The NOS operating system meets the requirements of Common Methodology for IT Security Evaluation (CEM) Version 3.1, Common Criteria for IT Security Evaluation (CC) Version 3.1, and is compatible with:

Security Profile of Machine-Readable Travel Document with "ICAO Application", Extended Access Control with PACE (EAC PP), Version 1.3.2, December 5, 2012, BSI-CC-PP-0056-V2-2012-MA-02. Rating Guarantee Level: EAL 4, supplemented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 1

Security Profile of Machine-Readable Travel Document with "ICAO Application" Basic Access Control, Version 1.10, March 25, 2009, BSI-CC-PP-0055-2009. Rating Guarantee Level: EAL 4, supplemented by ALC_DVS.2 2.

Certification of the NOS operating system was handled by a worldwide reputable safety assessment laboratory, T-Systems International GmbH (Germany).

How do we

work with

partners?

B2B and B2G

Our highly qualified team is available for 24/7 communication.

In partnerships, we aim at mutually beneficial cooperation. On our part, we provide complete information and technical support and train our partners on how to sell our products.

We provide the partners with the necessary marketing and technical materials and give them access to various marketing programmes and administrative resources. Our highly qualified team is available 24/7 for any questions.

Who can become our partner?

Our partner can be an IT-company integrator with a positive experience in the B2B sector and B2G with its own sales department.

Contact us, and we will tell you how we can join efforts and change the world for the better!

B2B and B2G

Our highly qualified team is available for 24/7 communication.

In partnerships, we aim at mutually beneficial cooperation. On our part, we provide complete information and technical support and train our partners on how to sell our products.

We provide the partners with the necessary marketing and technical materials and give them access to various marketing programmes and administrative resources. Our highly qualified team is available 24/7 for any questions.

Who can become our partner?

Our partner can be an IT-company integrator with a positive experience in the B2B sector and B2G with its own sales department.

Contact us, and we will tell you how we can join efforts and change the world for the better!

Dive into the world of Personality

Contact us

Our relations with our stakeholders

are based on honesty, transparency

and integrity.

Who are our stakeholders?

Our stakeholders are people or groups that directly or indirectly influence and are influenced by our actions. These are our partners and clients, people with whom we build mutually beneficial relations.

We believe in long-term partnerships with other like-minded businesses, people and whole communities with a view to creating unique values for the benefit of everyone.

Adress:

UVIRA street, number  81,ALFA Building, 4th Floor, Commune of Gombe, City of Kinshasa, Democratic Republic of Congo

Phone Number:

+243 999 765 036