Skip to main content

2.3 Biometric Registration & Login

2.3.1 Overview

Make your login experience faster and more secure with Biometric Authentication, which combines Face Recognition and Voice Verification so you can log in without needing a password.


2.3.2 Face Capture

To register your face:

  • Look directly at the camera in a well-lit environment.

  • The system will automatically take three photos from slightly different angles.

  • Make sure your full face is visible no glasses, masks, or obstructions.

Tip: Sit still and follow the on-screen instructions for best results.

face registration.jpeg

Face Capture


2.3.3 Voice Registration

After your face has been captured, you’ll move on to voice registration:

  • A paragraph will appear on your screen.

  • Read the paragraph out loud, clearly and at a steady pace.

  • The system will record your voice and store it for future logins.

Important: Make sure you’re in a quiet environment. Clear, audible recordings help improve accuracy.

voice registration.jpeg

Voice Registration

 


2.3.4 Registration Complete

Once both face and voice data are captured:

  • Your biometric profile will be securely saved.

  • You can now log in using just your face and voice no password required.

  • Your privacy is protected all biometric data is encrypted and securely stored.

 


2.3.5 Biometric Login

To log in using biometrics:

  • Choose the Biometric Login option on the login screen

  • The system will start with Facial Recognition, activating your camera

  • Position your face in the frame to verify your identity

  • Once confirmed, Voice Recognition may follow for added security

This advanced method ensures that only authorized users gain access quickly and safely.


2.3.5 Biometric Login

To log in using biometrics:

  • Choose the Biometric Login option on the login screen.

  • The system will start with Facial Recognition, activating your camera.

  • Position your face in the frame to verify your identity.

  • Once confirmed, Voice Recognition may follow for added security.

This advanced method ensures that only authorized users gain access quickly and safely.