EN | US
ONEEX
Suitcase
ONEEX
Suitcase
ONEEX
Suitcase
ONEEX
Suitcase
ONEEX
Suitcase
Portable and robust, benefit from a mobile identity verification system, ensuring trust and reliability.
Portable and robust, benefit from a mobile identity verification system, ensuring trust and reliability.
Portable and robust, benefit from a mobile identity verification system, ensuring trust and reliability.
Portable and robust, benefit from a mobile identity verification system, ensuring trust and reliability.
Portable and robust, benefit from a mobile identity verification system, ensuring trust and reliability.
Contact Sales
Contact Sales
Contact Sales
Contact Sales







Built for the field
Battery-powered and rugged for field use. Verify identities instantly, without setup or infrastructure.
Secure access anywhere
Instant ID verification backed by AI security—ideal for high-risk, fast-moving environments.
Keep scanning, even offline
Verify IDs offline with encrypted storage — data syncs to the cloud as soon as you're back online.

Built for the field
Battery-powered and rugged for field use. Verify identities instantly, without setup or infrastructure.
Secure access anywhere
Instant ID verification backed by AI security—ideal for high-risk, fast-moving environments.
Keep scanning, even offline
Verify IDs offline with encrypted storage — data syncs to the cloud as soon as you're back online.

Touch-and-go
Authenticate IDs with precision, ensuring secure and efficient front desk operations.
Works online or offline
Uninterrupted ID checks, even in case of network failures, with secure offline verification.
Ready from day one
Plug-and-play setup allows immediate deployment with no technical expertise required.
Built for the field
Battery-powered and rugged for field use. Verify identities instantly, without setup or infrastructure.

Secure access anywhere
Instant ID verification backed by AI security—ideal for high-risk, fast-moving environments.

Keep scanning, even offline
Verify IDs offline with encrypted storage — data syncs to the cloud as soon as you're back online.


Built for the field
Battery-powered and rugged for field use. Verify identities instantly, without setup or infrastructure.
Secure access anywhere
Instant ID verification backed by AI security—ideal for high-risk, fast-moving environments.
Keep scanning, even offline
Verify IDs offline with encrypted storage — data syncs to the cloud as soon as you're back online.
Trusted verification anytime, anywhere.
Trusted verification anytime, anywhere.
Trusted verification anytime, anywhere.
Trusted verification anytime, anywhere.
Verify identities confidently in any environment — even offline. The Oneex Suitcase supports all types of documents from 197 countries and delivers secure, encrypted results in seconds.
Verify identities confidently in any environment — even offline. The Oneex Suitcase supports all types of documents from 197 countries and delivers secure, encrypted results in seconds.
Verify identities confidently in any environment — even offline. The Oneex Suitcase supports all types of documents from 197 countries and delivers secure, encrypted results in seconds.
Verify identities confidently in any environment — even offline. The Oneex Suitcase supports all types of documents from 197 countries and delivers secure, encrypted results in seconds.
Verify identities confidently in any environment — even offline. The Oneex Suitcase supports all types of documents from 197 countries and delivers secure, encrypted results in seconds.





Open and power on.
Open and power on.
Open and power on.
Open and power on.
Open and power on.





Scan the ID.
Scan the ID.
Scan the ID.
Scan the ID.
Scan the ID.





Get Instant Results.
Get Instant Results.
Get Instant Results.
Get Instant Results.
Next-Gen Access Control
Next-Gen Access Control
Next-Gen Access Control
Next-Gen Access Control
Oneex Cloud
Oneex Cloud
Oneex Cloud
Oneex Cloud
Manage identity verification, guest access, and real-time analytics across all devices. Log and monitor all entries securely and compliantly.
Manage identity verification, guest access, and real-time analytics across all devices. Log and monitor all entries securely and compliantly.
Manage identity verification, guest access, and real-time analytics across all devices. Log and monitor all entries securely and compliantly.
Manage identity verification, guest access, and real-time analytics across all devices. Log and monitor all entries securely and compliantly.
API Access
API Access
API Access
API Access
Automate data entry and remove manual workflows—OCR extracts every detail flawlessly then instantly sends the data to your system via API.
Automate data entry and remove manual workflows—OCR extracts every detail flawlessly then instantly sends the data to your system via API.
Automate data entry and remove manual workflows—OCR extracts every detail flawlessly then instantly sends the data to your system via API.
Automate data entry and remove manual workflows—OCR extracts every detail flawlessly then instantly sends the data to your system via API.





13-inch touch screen
13-inch touch screen
13-inch touch screen
13-inch touchscreen for easy navigation and custom workflows.
13-inch touchscreen for easy navigation and custom workflows.
13-inch touchscreen for easy navigation and custom workflows.
13-inch touchscreen for easy navigation and custom workflows.





Integrated battery
Integrated battery
Integrated battery
Integrated battery
Battery provides up to 12 hrs
of use without external power.
Battery provides up to 12 hrs
of use without external power.
Battery provides up to 12 hrs
of use without external power.
Battery provides up to 12 hrs
of use without external power.


Empowering Smarter,
Safer Identity Verification
Empowering Smarter,
Safer Identity Verification
Empowering Smarter,
Safer Identity Verification
Empowering Smarter,
Safer Identity Verification
Empowering Smarter,
Safer Identity Verification





World Compatibility
World Compatibility
World Compatibility
World Compatibility
World Compatibility
Ensure global compatibility with passports, licenses, and government-issued IDs from 197 countries, with instant recognition and autonomous verification.
Ensure global compatibility with passports, licenses, and government-issued IDs from 197 countries, with instant recognition and autonomous verification.
Ensure global compatibility with passports, licenses, and government-issued IDs from 197 countries, with instant recognition and autonomous verification.
Ensure global compatibility with passports, licenses, and government-issued IDs from 197 countries, with instant recognition and autonomous verification.
Ensure global compatibility with passports, licenses, and government-issued IDs from 197 countries, with instant recognition and autonomous verification.


24/7 Support
24/7 Support
24/7 Support
24/7 Support
24/7 Support
Expert support available 24/7 to ensure uninterrupted verification operations.
Expert support available 24/7 to ensure uninterrupted verification operations.
Expert support available 24/7 to ensure uninterrupted verification operations.
Expert support available 24/7 to ensure uninterrupted verification operations.
Expert support available 24/7 to ensure uninterrupted verification operations.
RSA2048 Security
RSA2048 Security
RSA2048 Security
RSA2048 Security
RSA2048 Security
Advanced RSA2048 encryption secures data in transit and at rest—preventing breaches and unauthorized access.
Advanced RSA2048 encryption secures data in transit and at rest—preventing breaches and unauthorized access.
Advanced RSA2048 encryption secures data in transit and at rest—preventing breaches and unauthorized access.
Advanced RSA2048 encryption secures data in transit and at rest—preventing breaches and unauthorized access.
Advanced RSA2048 encryption secures data in transit and at rest—preventing breaches and unauthorized access.
Verification steps
Here’s how our machines perform true deep identity verification
NFC Read
Hyper Resolution
Biometrics
Ultraviolet
Infrared
Role of NFC
Read a digital version of the identity document.
What Happens
The machine extracts encrypted data from the NFC chip, cross-references it with the document’s physical attributes, and performs advanced verification to ensure authenticity and accuracy.
Detecting an anomaly
Counterfeit IDs may lack an NFC chip, an authentic security signature, or the data stored in the chip may not match the physical information, indicating tampering.
Comparing scan vs. chip data
Verification steps
Here’s how our machines perform true deep identity verification
NFC Read
Hyper Resolution
Biometrics
Ultraviolet
Infrared
Role of NFC
Read a digital version of the identity document.
What Happens
The machine extracts encrypted data from the NFC chip, cross-references it with the document’s physical attributes, and performs advanced verification to ensure authenticity and accuracy.
Detecting an anomaly
Counterfeit IDs may lack an NFC chip, an authentic security signature, or the data stored in the chip may not match the physical information, indicating tampering.
Comparing scan vs. chip data
NFC Read
Facial Verification
Hyper Resolution
Ultraviolet
Infrared
Comparing scan vs. chip data
Verification steps
Here’s how our Solutions perform true verifications using AI Workflows
Role of NFC
Read a digital version of the identity document.
What Happens
The machine extracts encrypted data from the NFC chip, cross-references it with the document’s physical attributes, and performs advanced verification to ensure authenticity and accuracy.
Detecting an anomaly
Counterfeit IDs may lack an NFC chip, an authentic security signature, or the data stored in the chip may not match the physical information, indicating tampering.
NFC Read
Facial Verification
Hyper Resolution
Ultraviolet
Infrared
Comparing scan vs. chip data
Verification steps
Here’s how our Solutions perform true verifications using AI Workflows
Role of NFC
Read a digital version of the identity document.
What Happens
The machine extracts encrypted data from the NFC chip, cross-references it with the document’s physical attributes, and performs advanced verification to ensure authenticity and accuracy.
Detecting an anomaly
Counterfeit IDs may lack an NFC chip, an authentic security signature, or the data stored in the chip may not match the physical information, indicating tampering.
NFC Read
Facial Verification
Hyper Resolution
Ultraviolet
Infrared
Comparing scan vs. chip data
Verification steps
Here’s how our Solutions perform true verifications using AI Workflows
Role of NFC
Read a digital version of the identity document.
What Happens
The machine extracts encrypted data from the NFC chip, cross-references it with the document’s physical attributes, and performs advanced verification to ensure authenticity and accuracy.
Detecting an anomaly
Counterfeit IDs may lack an NFC chip, an authentic security signature, or the data stored in the chip may not match the physical information, indicating tampering.
NFC Read
Facial Verification
Hyper Resolution
Ultraviolet
Infrared
Comparing scan vs. chip data
Verification steps
Here’s how our Solutions perform true verifications using AI Workflows
Role of NFC
Read a digital version of the identity document.
What Happens
The machine extracts encrypted data from the NFC chip, cross-references it with the document’s physical attributes, and performs advanced verification to ensure authenticity and accuracy.
Detecting an anomaly
Counterfeit IDs may lack an NFC chip, an authentic security signature, or the data stored in the chip may not match the physical information, indicating tampering.
Ready for real-world use.
Ready for real-world use.
Ready for real-world use.
Ready for real-world use.
Deploy reliable ID checks in the most demanding environments.
Deploy reliable ID checks in the most demanding environments.
Deploy reliable ID checks in the most demanding environments.
Deploy reliable ID checks in the most demanding environments.

Shock resistant
Splash resistant
Vibration proof

Shock resistant
Splash resistant
Vibration proof

Shock resistant
Splash resistant
Vibration proof

Shock resistant
Splash resistant
Vibration proof

Shock resistant
Splash resistant
Vibration proof
Specs and features
Specs and features
Specs and features
Specs and features
Specs and features
See more
See more
See more
See more


No training required for employees
No training required for employees
No training required for employees
No training required for employees
No training required for employees
Effortless deployment with plug-and-play setup, enabling immediate operational readiness.
Effortless deployment with plug-and-play setup, enabling immediate operational readiness.
Effortless deployment with plug-and-play setup, enabling immediate operational readiness.
Effortless deployment with plug-and-play setup, enabling immediate operational readiness.


Built for deployment in any real-world setting.
Built for deployment in any real-world setting.
Built for deployment in any real-world setting.
Built for deployment in any real-world setting.
Built for deployment in any real-world setting.
Tested for durability in high-pressure scenarios, to deliver reliable performance where others can’t.
Tested for durability in high-pressure scenarios, to deliver reliable performance where others can’t.
Tested for durability in high-pressure scenarios, to deliver reliable performance where others can’t.
Tested for durability in high-pressure scenarios, to deliver reliable performance where others can’t.


Request a custom solution to fit your needs.
Request a custom solution to fit your needs.
Request a custom solution to fit your needs.
Request a custom solution to fit your needs.
Request a custom solution to fit your needs.
Tailor Oneex to your operational needs—hardware, integrations, or deployment specs. We'll build it.
Tailor Oneex to your operational needs—hardware, integrations, or deployment specs. We'll build it.
Tailor Oneex to your operational needs—hardware, integrations, or deployment specs. We'll build it.
Tailor Oneex to your operational needs—hardware, integrations, or deployment specs. We'll build it.
Frequently
asked questions
How secure is the data collected during identity verification?
Does the Suitcase solution require internet connectivity?
Can the Suitcase be used in highly restricted or classified environments?
Why choose the Suitcase?
How do you prevent unauthorized access or misuse of the Suitcase?
Can the Suitcase integrate with existing security infrastructures?
Frequently
asked questions
How secure is the data collected during identity verification?
Does the Suitcase solution require internet connectivity?
Can the Suitcase be used in highly restricted or classified environments?
Why choose the Suitcase?
How do you prevent unauthorized access or misuse of the Suitcase?
Can the Suitcase integrate with existing security infrastructures?
Frequently
asked questions
How secure is the data collected during identity verification?
Does the Suitcase solution require internet connectivity?
Can the Suitcase be used in highly restricted or classified environments?
Why choose the Suitcase?
How do you prevent unauthorized access or misuse of the Suitcase?
Can the Suitcase integrate with existing security infrastructures?
Frequently
asked questions
How secure is the data collected during identity verification?
Does the Suitcase solution require internet connectivity?
Can the Suitcase be used in highly restricted or classified environments?
Why choose the Suitcase?
How do you prevent unauthorized access or misuse of the Suitcase?
Can the Suitcase integrate with existing security infrastructures?
Frequently
asked questions
How secure is the data collected during identity verification?
Does the Suitcase solution require internet connectivity?
Can the Suitcase be used in highly restricted or classified environments?
Why choose the Suitcase?
How do you prevent unauthorized access or misuse of the Suitcase?
Can the Suitcase integrate with existing security infrastructures?
Other hardware options
Other hardware options
Other hardware options
Other hardware options
Oneex Suitcase
Oneex Suitcase
Oneex Suitcase
Oneex Suitcase
Mobile Identity Verification
Mobile Identity Verification
Mobile Identity Verification
Mobile Identity Verification




Current device
Current device
Current device
Current device
Oneex Kiosk
Oneex Kiosk
Oneex Kiosk
Oneex Kiosk
Automated Biometric Check-In
Automated Biometric Check-In
Automated Biometric Check-In
Automated Biometric Check-In




Learn more
Learn more
Learn more
Learn more
Oneex Desktop
Oneex Desktop
Oneex Desktop
Oneex Desktop
Plug-and-Verify Simplicity
Plug-and-Verify Simplicity
Plug-and-Verify Simplicity
Plug-and-Verify Simplicity




Learn more
Learn more
Learn more
Learn more
Other hardware options
Oneex Suitcase
Mobile ID verification, anywhere

Current device
Other hardware options
Oneex Suitcase
Mobile ID verification, anywhere

Current device
© 2025 Oneex
© 2025 Oneex
© 2025 Oneex
© 2025 Oneex
© 2025 Oneex