{"id":362728,"date":"2023-09-01T10:35:56","date_gmt":"2023-09-01T08:35:56","guid":{"rendered":"https:\/\/recogtech.com\/sektoren\/behoerden\/"},"modified":"2025-05-23T14:27:06","modified_gmt":"2025-05-23T12:27:06","slug":"behorden","status":"publish","type":"page","link":"https:\/\/recogtech.com\/de\/sektoren\/behorden\/","title":{"rendered":"Beh\u00f6rden"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; next_background_color=&#8220;#ffffff&#8220; admin_label=&#8220;section&#8220; module_class=&#8220;dh-valign-center-section&#8220; _builder_version=&#8220;4.22.1&#8243; background_enable_color=&#8220;off&#8220; use_background_color_gradient=&#8220;on&#8220; background_color_gradient_direction=&#8220;105deg&#8220; background_color_gradient_stops=&#8220;rgba(0,38,100,0.8) 0%|rgba(0,38,100,0.8) 50%|rgba(220,222,230,0) 50%|rgba(255,255,255,0) 99%&#8220; background_color_gradient_overlays_image=&#8220;on&#8220; background_image=&#8220;https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/sector-overheid-1920.jpg&#8220; height=&#8220;300px&#8220; height_tablet=&#8220;300px&#8220; height_phone=&#8220;240px&#8220; height_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;0px||0px||false|false&#8220; bottom_divider_style=&#8220;slant2&#8243; bottom_divider_height=&#8220;75px&#8220; bottom_divider_flip=&#8220;horizontal&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row admin_label=&#8220;row&#8220; _builder_version=&#8220;4.21.0&#8243; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220; custom_padding=&#8220;0px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_text_color=&#8220;#FFFFFF&#8220; hover_enabled=&#8220;0&#8243; sticky_enabled=&#8220;0&#8243; link_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;14px&#8220; custom_margin=&#8220;||14px|||&#8220; locked=&#8220;off&#8220;]<span><span><a href=\"https:\/\/recogtech.com\/de\/\">Home<\/a><\/span><\/span>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.22.1&#8243; _module_preset=&#8220;default&#8220; header_text_color=&#8220;#FFFFFF&#8220; header_font_size=&#8220;60px&#8220; header_font_size_tablet=&#8220;56px&#8220; header_font_size_phone=&#8220;42px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h1>Beh\u00f6rden<span style=\"color: #e70000;\">.<\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.22.1&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<div><span lang=\"DE\">Stellen Sie sich vor, dass sich Unbefugte Zugang zu hochsicheren Beh\u00f6rden oder sensiblen Informationen verschaffen wollen, etwa bei Sicherheitsdienste. Anstelle traditioneller Identifikationsmethoden wie Pass- oder Personalausweiskontrolle setzen immer mehr Beh\u00f6rden unsere Venenmustererkennung ein.<\/span><\/div>\n<p>[\/et_pb_text][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM2MTQ0NCJ9fQ==@&#8220; button_text=&#8220;M\u00f6chten Sie uns kennenlernen?&#8220; _builder_version=&#8220;4.22.1&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_font=&#8220;|700|||||||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/sector-overheid-1920.jpg&#8220; alt=&#8220;Recogtech &#8211; L\u00f6sungen f\u00fcr den \u00f6ffentlichen Sektor&#8220; title_text=&#8220;sector-overheid-1920&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.22.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;rgba(0,38,100,0.15)&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.22.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.22.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb use_icon=&#8220;on&#8220; font_icon=&#8220;&#xf10e;||fa||900&#8243; content_max_width=&#8220;800px&#8220; _builder_version=&#8220;4.22.1&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;|700|||||||&#8220; body_text_color=&#8220;#002664&#8243; body_font_size=&#8220;20px&#8220; body_line_height=&#8220;1.6em&#8220; text_orientation=&#8220;center&#8220; module_alignment=&#8220;center&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"font-weight: 400;\"><em><strong>&#8222;<span lang=\"DE\">Dank der nahtlosen Fusion meiner Zutrittskarte und der verifizierenden \u00dcbereinstimmung meiner Handfl\u00e4che mit dem Palm-ID Card ist die Doppelsicherung v\u00f6llig problemlos. Und das Beste daran? Meine biometrischen Daten sind nicht in der Datenbank, das bietet einen zus\u00e4tzlichen Schutz der Privatsph\u00e4re. Mit dieser Innovation machen Beh\u00f6rden einen gro\u00dfen Schritt in Richtung intelligentere, effizientere Sicherheitsprotokolle und eines neuen Standards f\u00fcr Datenschutz.<\/span>&#8222;<\/strong><\/em><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.22.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.22.1&#8243; _module_preset=&#8220;default&#8220; header_2_font_size=&#8220;36px&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2><span lang=\"DE\">Die <\/span>L\u00f6sung f\u00fcr Beh\u00f6rden<\/h2>\n<div><span lang=\"DE\">Wie funktioniert das genau? Die Person meldet sich bei der Registrierungsstelle mit unserer Palm-ID Card Registrierungseinheit an und es wird ein Scan des Venenmusters durchgef\u00fchrt, der sofort verschl\u00fcsselt wird. Dieser Scan wird dann auf eine pers\u00f6nliche Zutrittskarte gespeichert.<br \/><\/span><\/div>\n<div>\u00a0<\/div>\n<div><span lang=\"DE\">Mit dem Palm-ID Card in Kombination mit der Zutrittskarte k\u00f6nnen Sie absolut sicher sein, dass nur autorisierte Personen Zutritt zu gesicherten Standorten und Zugriff auf sensible Informationen bekommen. Unbefugter Zutritt geh\u00f6rt der Vergangenheit an, was die Gesamtsicherheit deutlich erh\u00f6ht.<\/span><\/div>\n<p>[\/et_pb_text][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM2MTQ0NCJ9fQ==@&#8220; button_text=&#8220;Kontakt aufnehmen&#8220; _builder_version=&#8220;4.22.1&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_font=&#8220;|700|||||||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/palm-id-entree.jpg&#8220; alt=&#8220;Palm ID Pro in Aktion &#8211; Recogtech&#8220; title_text=&#8220;palm-id-entree&#8220; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span><span><a href=\"https:\/\/recogtech.com\/de\/\">Home<\/a><\/span><\/span>Beh\u00f6rden.Stellen Sie sich vor, dass sich Unbefugte Zugang zu hochsicheren Beh\u00f6rden oder sensiblen Informationen verschaffen wollen, etwa bei Sicherheitsdienste. Anstelle traditioneller Identifikationsmethoden wie Pass- oder Personalausweiskontrolle setzen immer mehr Beh\u00f6rden unsere Venenmustererkennung ein.&#8220;Dank der nahtlosen Fusion meiner Zutrittskarte und der verifizierenden \u00dcbereinstimmung meiner Handfl\u00e4che mit dem Palm-ID Card ist die Doppelsicherung v\u00f6llig problemlos. Und das [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":362725,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-362728","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beh\u00f6rden |<\/title>\n<meta name=\"description\" content=\"Stellen Sie sich ein Szenario vor, in dem sich unberechtigte Personen Zugang zu hochsicheren Regierungsgeb\u00e4uden verschaffen wollen. Produkt anzeigen\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/recogtech.com\/de\/sektoren\/behorden\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beh\u00f6rden |\" \/>\n<meta property=\"og:description\" content=\"Stellen Sie sich ein Szenario vor, in dem sich unberechtigte Personen Zugang zu hochsicheren Regierungsgeb\u00e4uden verschaffen wollen. Produkt anzeigen\" \/>\n<meta property=\"og:url\" content=\"https:\/\/recogtech.com\/de\/sektoren\/behorden\/\" \/>\n<meta property=\"og:site_name\" content=\"Recogtech - Biometrische beveiliging\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-23T12:27:06+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/sektoren\\\/behorden\\\/\",\"url\":\"https:\\\/\\\/recogtech.com\\\/de\\\/sektoren\\\/behorden\\\/\",\"name\":\"Beh\u00f6rden |\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/#website\"},\"datePublished\":\"2023-09-01T08:35:56+00:00\",\"dateModified\":\"2025-05-23T12:27:06+00:00\",\"description\":\"Stellen Sie sich ein Szenario vor, in dem sich unberechtigte Personen Zugang zu hochsicheren Regierungsgeb\u00e4uden verschaffen wollen. Produkt anzeigen\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/sektoren\\\/behorden\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/recogtech.com\\\/de\\\/sektoren\\\/behorden\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/sektoren\\\/behorden\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/recogtech.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sektoren\",\"item\":\"https:\\\/\\\/recogtech.com\\\/de\\\/sectoren\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Beh\u00f6rden\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/recogtech.com\\\/de\\\/\",\"name\":\"Recogtech - Biometrische beveiliging\",\"description\":\"High-end Biometric Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/recogtech.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/#organization\",\"name\":\"Recogtech B.V.\",\"url\":\"https:\\\/\\\/recogtech.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/recogtech-weblogo-blauw-rood.png\",\"contentUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/recogtech-weblogo-blauw-rood.png\",\"width\":600,\"height\":111,\"caption\":\"Recogtech B.V.\"},\"image\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beh\u00f6rden |","description":"Stellen Sie sich ein Szenario vor, in dem sich unberechtigte Personen Zugang zu hochsicheren Regierungsgeb\u00e4uden verschaffen wollen. Produkt anzeigen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/recogtech.com\/de\/sektoren\/behorden\/","og_locale":"de_DE","og_type":"article","og_title":"Beh\u00f6rden |","og_description":"Stellen Sie sich ein Szenario vor, in dem sich unberechtigte Personen Zugang zu hochsicheren Regierungsgeb\u00e4uden verschaffen wollen. Produkt anzeigen","og_url":"https:\/\/recogtech.com\/de\/sektoren\/behorden\/","og_site_name":"Recogtech - Biometrische beveiliging","article_modified_time":"2025-05-23T12:27:06+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/recogtech.com\/de\/sektoren\/behorden\/","url":"https:\/\/recogtech.com\/de\/sektoren\/behorden\/","name":"Beh\u00f6rden |","isPartOf":{"@id":"https:\/\/recogtech.com\/de\/#website"},"datePublished":"2023-09-01T08:35:56+00:00","dateModified":"2025-05-23T12:27:06+00:00","description":"Stellen Sie sich ein Szenario vor, in dem sich unberechtigte Personen Zugang zu hochsicheren Regierungsgeb\u00e4uden verschaffen wollen. Produkt anzeigen","breadcrumb":{"@id":"https:\/\/recogtech.com\/de\/sektoren\/behorden\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/recogtech.com\/de\/sektoren\/behorden\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/recogtech.com\/de\/sektoren\/behorden\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/recogtech.com\/de\/"},{"@type":"ListItem","position":2,"name":"Sektoren","item":"https:\/\/recogtech.com\/de\/sectoren\/"},{"@type":"ListItem","position":3,"name":"Beh\u00f6rden"}]},{"@type":"WebSite","@id":"https:\/\/recogtech.com\/de\/#website","url":"https:\/\/recogtech.com\/de\/","name":"Recogtech - Biometrische beveiliging","description":"High-end Biometric Security","publisher":{"@id":"https:\/\/recogtech.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/recogtech.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/recogtech.com\/de\/#organization","name":"Recogtech B.V.","url":"https:\/\/recogtech.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/recogtech.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/recogtech-weblogo-blauw-rood.png","contentUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/recogtech-weblogo-blauw-rood.png","width":600,"height":111,"caption":"Recogtech B.V."},"image":{"@id":"https:\/\/recogtech.com\/de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/pages\/362728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/comments?post=362728"}],"version-history":[{"count":4,"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/pages\/362728\/revisions"}],"predecessor-version":[{"id":365198,"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/pages\/362728\/revisions\/365198"}],"up":[{"embeddable":true,"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/pages\/362725"}],"wp:attachment":[{"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/media?parent=362728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}