Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

Biometric device

A biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognizing the identity of a living person based on a physiological or behavioral characteristic. These characteristics include fingerprints, facial images, IRIS and voice recognition.


App concept that allows the desired application (Access, Time, Info, …) to be loaded into the hardware or simply exchanged

Customized app development for selected partners also possible

Cloud-based G7 Connect platform with integrated authorization system for configuration, firmware, and app updates for single or multiple devices/projects

4.3” color display with capacitive touchscreen for intuitive user guidance and operation

Contactless multi-technology reader for all popular RFID technologies, NFC data carriers, and Gantner.Connect

Web interface in the device

Power supply via Ethernet (PoE) possible

Slim housing design

Easy installation and convenient Plug & Play commissioning

Available with fingerprint reader for increased security

Integrated speaker for user feedback

Face Recognition

Forced mask wearing alert

7-inch LCD touch screen, 2 Mega pixel wide-angle lens, built-in Mifare card reading module

Face recognition distance (without face mask): 0.3 m to 3 m, Duration < 0.2 s/User, Accuracy rate ≥ 99%

Max. 50,000 faces, Max. 50,000 cards

Two-way audio with client software, indoor station, and main station

Supports TCP/IP, Wi-Fi

Configuration via the web client

Supports ISAPI and ISUP5.0 protocol


IRIS Recognition

Operates in Iris only / Face only / and, or, fusion mode. Select and use according to the biometric security environment

Automatically captures dual iris and face at the same distance

A proven set of anti-spoof measures that continues to set the standard for the industry is included

Up to 5,000 1:N, 100,000 1:1 users

Number of transaction logs on device DB: 1M (Iris) / 100,000 (Face)

Automatically captures faces and iris naturally up to 24 inches or 60 cm

Easy on device setting & user enrollment available with Self-guidance with live images on 7” multi Touch LCD

Tested and meets UL, ANSI, and international eye safety standards

The Camera automatically finds user and moves to a location where the user’s eyes and face can be photographed

Information is encrypted, Secure Boot platform and Advanced Network security

Quickly and easily authenticates just by looking at the screen with wide recognition range of Iris 30~60cm (12~24”) & Face 30~80cm (12~32”)

Open Android Platform provides for third party application development

Face Recognition Software

Face detection

Client-server, centralized or distributed

Control and accounting of unique visitors

Reconciliation with ‘Black’ and White’ lists

Detection of conflict situations, unattended objects, smoke and congestions of people

Feature extraction

Identification and verification of persons

Detector of the presence of a medical mask on the face

Work with photo images and video recordings

Working with video streams

Function for assessing the quality of photographic images

Filter of face detection by angle

Filter of face detection by image quality

Function “Liveness”, distinguishing a real face from a printed on paper or demonstrated

from the screen of an electronic device

Function for finding duplicates in databases of face images

Recording and storage of a video archive with markup by events

Working with comparison