Sub 2-meter Accurcy, Indoors and Outdoors

Verify Every Personal on Premis

Utilizing Data Analytics and Intelligence

Starting with Physical IAM

Tackling the Insider Threat

Biometric Solution is a Necessity and not a Privilege 

In reality, the use of bio-metrics for physical access control is one of the most demanding applications. To be successful in today’s access control environment, basic principles must be adhered to.

    Read More
    1. The bio-metric template must be stored in the secure memory of a smart card, rather than in a database.
    2. The comparison between the template in the card and the actual bio-metric template is made at the door in the reader. If there is a match, the reader sends a Wiegand code from the card to the system. The system recognizes the code and opens the door.
    3. Use verification rather than identification. Verification means proving the card belongs to the cardholder. Identification means selecting the cardholder from a database of many card holders. This means that we refer to one to one versus one to many.

Our Values

Privacy protection is our priority. Safety has higher standards.

Join With Us

To tackle insider threats, and create safer environment

Our Mission

Adding Convenience without compromising Security.



One of the more interesting uses of biometrics involves combining biometrics with smart cards and public-key infrastructure (PKI). A major problem with biometrics is how and where to store the user’s template. Because the template represents the user’s personal characters, its storage introduces privacy concerns. Furthermore, storing the template in a centralized database leaves that template subject to attack and compromise. On the other hand, storing the template on a smart card enhances individual privacy and increases protection from attack, because individual users control their own templates.



GNS enhances security by placing more biometric functions directly on the S-Badge. We have built a fingerprint sensor directly into the smart card reader, which in turn passes the biometric to the smart card for verification. This is a stronger secure architecture because cardholders must authenticate themselves directly to the card.

Each badge is individually customized with a printed photo ID on a scratch-proof and water-resistant beveled surface.

How It Works

The following examples trigger an alarm:

  1. Scan a badge and didn’t get it: meaning you possible allowed someone else
  2. Scan a badge, get in, and someone followed you
  3. Getting out of your normal daily behavior
Why GNS ?

Unlike other systems, the S-Badge leverages the latest IoT technology, artificial intelligence (AI) and machine learning to enhance security and unlock an entirely new range of functionality and data that go far beyond today’s standards. The proprietary, turn-key solution utilizes an innovative system of on-site LoRa gateways and a battery-smart, all-in-one authentication badge that verifies a user‘s identity based on location, a biometric signature and a preprogrammed NFC chip. The S-Badge also features a panic button to discreetly signal an emergency, along with the badges’ location.