IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

National Sheriffs Deploy Fingerprint Authentication in First Phase of Pegasus Program

Enables secure information sharing among law enforcement across the nation via the Web

The Pegasus Program, a nationwide information sharing system designed by and for the nation's sheriffs, has implemented the first phase of a fingerprint authentication system using WEB-key from BIO-key International.

The Pegasus Program is deploying approximately 1,100 fingerprint access authentication devices for 220 sheriffs' offices in the first phase of this project. Plans are in place to expand the rollout to over 3,000 sheriffs' offices nationwide as well as local law enforcement and first responder agency partners. Under the program, each participating sheriff's office is provided the WEB-key software along with fingerprint readers. Larger offices can purchase additional readers if necessary.

The Pegasus system provides sheriffs in any state with Web-based access to information required for day-to-day law enforcement investigations and first responder situations. It also allows them to securely send and receive secure messages to other jurisdictions, such as requests for information and assistance and alerts. WEB-key assures that only authorized personnel access the system through positive fingerprint authentication.

Although there are fingerprint authentication systems in use within a single location or enterprise, the Pegasus Program is believed to be the first multi-agency system using secure Internet connections for fingerprint authentication. The new system addresses the most pressing issue in homeland security: sharing critical information between first responders nationwide in a highly secure environment.

Fingerprint authentication provides a high level of security and user accountability in the Pegasus system. As an added measure of security, the user must re-authenticate using their fingerprint to ensure that the user is still present and accountable for the requested action before accessing more sensitive functions. Only a fingerprint is required, and this critical security process is completed in two seconds or less.