Standalone Face Recognition Fingerprint Time Attendance WE-68N

Previous 1 / 1 Next

Standalone Face Recognition Fingerprint Time Attendance WE-68N Wemax Face Recognition Time Attendance
Quantity
Add Quotation


Time Management System TMS Software Demo

Download Files

Report1-Summary.pdf (24.21 KB)
Report_5_-_Time_Card.pdf (26.23 KB)
Report_4_-_Abnormal.pdf (22.73 KB)
Report_3_-_Logs.pdf (21.48 KB)
Report_2_-_Shift.pdf (23.4 KB)
WE-68N_BROCHURE.pdf (2.61 MB)
WEMAX STANDALONE FACE RECOGNITION FINGERPRINT TIME ATTENDANCE WE-68N

Features
  • User capacity: 300 Face User, 3000 Fingerprint
  • Transaction storage: 160,000 Transaction
  • Resolution: 500dpi
  • Verification mode: 1:10R1:N
  • Access: Face, Fingerprint, Password, Proximity Card (OPTIONAL)
  • Backup Battery (Optional): Approx. 3-4 hours
  • Identification speed: < 1sec
  • FAR: <0.0001%
  • FRR: <0.01%
  • Communication: RS232, RS485, TCPIIP, US B Host
  • Power consumption: <5W
  • Operation temperature: OC - 60C
  • Operation humidity: 20%-60%
  • Size: 210(L) x 82(W) x 40.8(0) mm


  • High Speed
  • User Friendly Design
  • Accurate & Fast Identification
  • Large User & Record Capacity
  • Flexible Interfaces & Data Management
  • Reliable Performance
  • High Usability & Security
  • 360 Degree Identification
  • Download or Uploading data with pendrive

What is Face Recognition?

Face recognition technology is the less intrusive and fastest biometric technology. It works with the most obvious individual identifier – the human face.

Instead of requiring people to place their hand on a reader (a process not acceptable in some cultures as well as being a source of illness transfer) or precisely position their eye in front of a scanner, face recognition systems unobtrusively take pictures of people's faces as they enter a defined area. There is no intrusion or delay, and in most cases the subjects are entirely unaware of the process. They do not feel "under surveillance" or that their privacy has been invaded.


Technology

Facial recognition analyzes the characteristics of a person's face images input through a digital video camera. It measures the overall facial structure, including distances between eyes, nose, mouth, and jaw edges. These measurements are retained in a database and used as a comparison when a user stands before the camera. This biometric has been widely, and perhaps wildly, touted as a fantastic system for recognizing potential threats (whether terrorist, scam artist, or known criminal) but so far has not seen wide acceptance in high-level usage. It is projected that biometric facial recognition technology will soon overtake fingerprint biometrics as the most popular form of user authentication.

Every face has numerous, distinguishable landmarks, the different peaks and valleys that make up facial features. Each human face has approximately 80 nodal points. Some of these measured by the Facial Recognition Technology are:

Distance between the eyes

Width of the nose

Depth of the eye sockets

The shape of the cheekbones

The length of the jaw line

Use

 

Currently gaining support as a potential tool for averting terrorist crimes, facial recognition is already in use in many law enforcement areas. Software has also been developed for computer networks and automated bank tellers that use facial recognition for user verification purposes.
 

Evaluation

One of the strongest positive aspects of facial recognition is that it is non-intrusive.Verification or identification can be accomplished from two feet away or more, and without requiring the user to wait for long periods of time or do anything more than look at the camera.

Face recognition is also very difficult to fool. It works by comparing facial landmarks - specific proportions and angles of defined facial features - which cannot easily be concealed by beards, eyeglasses or makeup.
 

How it Works

The following four-stage process illustrates the way biometric systems operate:

When the user faces the camera, standing about two feet from it. The system will locate the user's face and perform matches against the claimed identity or the facial database. It is possible that the user may need to move and reattempt the verification based on his facial position. The system usually comes to a decision in less than 5 seconds.


Please leave your enquiry here, we will reply as soon as possible.
Name*  
Company Name  
Product Interested  
Quantity  
Email*  
Contact No.*  
Ship to Name  
Shipping Address  
Messages*  
   

You have 0 items in you cart. Would you like to checkout now?
0 items
Switch to Mobile Version
available in
Subscribe Newsletter