Biometric Modalities

Facial Reconition

A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source. Wikipedia.

Contactless Fingerprints

An attempt to gather and add fingerprints to those gathered via wet-ink process and then, in a "touchless" scan, verify claimed identify and, a bigger challenge, identify their owners without additional clues..

Heart Beat Human Authentication

The shape and beat of your heart can be used to verify your identity. .


Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance.

Palm and Vein Authentication

Palm vein scan is a biometric that works by using infrared light to map the unique vein structure of your palm, capturing over 5 million data points. The palm vein scanner then converts these data points into a unique encrypted code that becomes your biometric ID..


Speaker recognition is the identification of a person from characteristics of voices. It is used to answer the question "Who is speaking?" The term voice recognition can refer to speaker recognition or speech recognition.

The Next Technological Wave

“You Are Your Identity”

The Future is YOU!

P.R. Howard Jackson

Serial Entreprenuer

P.R. Howard Jackson

Founder and CEO

I love the field of Biometrics Technology, so I decided to create my own company, BioMetrix Solutions. 

I love the field of Biometrics Technology, so I decided to create my own company, BioMetrix Solutions.  

I have been in the field of Biometric Technology for past 10 years. My background includes Biometric detection, tracking, collecting, identification and verification.  Biometric algorithmic research, metrics algorithm studies and biometric modality studies.  Analyzing NIST biometric evaluation testing reports, and NIST face recognition vendor test reports.  Experienced in integrating fingerprint, voice pattern, iris scanning, and facial recognition technology, strong familiarity with Biometric Automated Toolset database (BATS), Pisces Biometrics Systems, CBP Biometrics Systems and Interagency Identity Detection Equipment (HIIDE) systems.



My initial introduction began in Afghanistan supporting military soldiers worldwide as a Biometrics Engineer on the BISA contract where I traveled worldwide in support of Biometrics Technology. I later took a role on the PISCES contract traveling to countries such as Africa and Malta supporting, The Department of State and CIA in their quest to secure our airports, land and border crossing. For the past two and a half years I have been supporting U.S. Customs Boarder in the Innovation & Ideation Department guiding them in their mission to secure air, land, sea and boarders through the advancement of futurist Biometrics and Identity Access Management tools, by way of Biometric detection, tracking, collecting, identification and verification. Biometric algorithmic research, metrics algorithm studies and the biometric modality studies. Analyzing NIST biometric evaluation testing reports, and NIST face recognition vendor test reports, new and Innovative Technological Modalities, Solutions and capabilities.

Founder and CEO
B.B.A., Business Administration in Computer Information Systems Science, University of The District of Columbia, Washington, DC;
Biometrics Training, Ft. Huachuca, AZ Quantifying Face Recognition Performance in Non-cooperative Setting Biometric Institute Conference .

Our Team Working Abroad

International and Domestic 

Biometrics and Biographical data collection of and Afghan local.


Biometrics Testing at Dullues Airport

Biometrics and Biographical data collection.  Embassy, boarder and airport control .


JetBlue Biometrics and Biographical data collections.

Biometrics installation at airports, seaports, entry, exit locations and law enforcement facilities.

Biometrics headquarters at KAF

Services We Offer

We specialize in digital identity solutions to help your company transition to the latest in technology.​


Biometrics consultants can assist in identifying and assessing threats and security risks to your company and suggest the best solutions.


Our goal is to turns strategies and plans into actions in order to accomplish strategic objectives and goals for our companies.


We conduct evaluations of your companies current security needs and determine the right modality for your Biometric needs .

Other IT Related Services

We provide other IT Services such as backup, installation, systems admin, security, proposal writing, consultation, website design and more.

Frequently Asked Questions

Body measurements and calculations related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

  • DNA Matching. The identification of an individual using the analysis of segments from DNA. …
  • Eyes – Iris Recognition. The use of the features found in the iris to identify an individual. …
  • Face Recognition. …
  • Finger Geometry Recognition. …
  • Hand Geometry Recognition. …
  • Typing Recognition. …
  • Voice – Speaker Identification.
  • And more

The advantages that biometrics provides are that the information is distinctive for every person and it can utilized as a technique for individual identification. The top benefits of Biometric technology are authentication, privacy or data discretion, authorization or access control, data veracity, and non-repudiation.

1.Time & Attendance

2. Workforce Management

3. Visitor Management

4. School Management

5. Law Enforcement

6. Membership Management

7. Patient Identification

8. Secured Financial Services

9. Driver’s Identification

10. Real Estate Management

11. And More.

NIST Biometrics Explanation & Information

Play Video