VIRDI AC 6000 Proposal
-
Upload
virdi-biometric-access-control-system -
Category
Technology
-
view
1.253 -
download
7
description
Transcript of VIRDI AC 6000 Proposal
1High Security & Convenient Use
AC-6000Fingerprint Identification System
2High Security & Convenient Use
• Technical Overview• User Specification• Operating System• Camera Operation• Finger Sensor Operation• USB Operation• User Interface • Language Translations• Future Expansion
1. Contents
3High Security & Convenient Use
• 1.3megapixel CMOS image sensor• Touch less button sensor (f1-f4, call button)• 16bit Color TFT LCD Touch screen 4.8inch (display
800x480)• 10/100mb Ethernet LAN• USB Host 1.1/2.0 – (USB pen or Wireless)• USB Device – (computer interface)• Linux OS (operating system)• Dynamic Language Change
2. Technical Overview
4High Security & Convenient Use
• Customizable Screen Images- Icons can change if needed• Customizable Screen Messages per User- User Authentication Message : server only (40 letters)• Customizable Sound/Voices- USB sound or MP3 files updating possible• Global Message Broadcasting- Main window display Programmable time for display : serv
er only (128 letters)
2. Technical Overview
5High Security & Convenient Use
• 13.56 MHz Smart Card Support (AC-6000SA)• 125 KHz RF Card Support (AC-6000RF)• Wiegand Interface ( Input 1ea, Output 1ea)• RS-485 or RS-232 Interface ( Switch Selection)• UV Protection (optional)• Approach Detect Sensor • Anti-pass back Support• 11 Authentication Modes• 524,000 Event History• 200,000 Templates (100,000 fingerprints)• 5 Fingerprints/user• 5 Cards per user/user
3. User Specification
6High Security & Convenient Use
• Why Linux? Free - No licensing fees Free support available, widely used Easy upgrading No difference to end user
4. Operating System
7High Security & Convenient Use
• Direct interface to CPU (faster)• 500ms-600ms capture time• Picture size 320 x 480 jpeg @ 5k per picture• 12,500 pictures (log and user database)• User database picture• Log picture• Export to USB• Server Real-time display• Picture is taken immediately on access• Three programmable options
– Display Picture (show picture on LCD)– Authorized Users (save new picture to database)– Unauthorized Users (save new picture to database)
5. Camera Sensor Operation
8High Security & Convenient Use
• Direct interface to CPU • Finger image displayed on LCD (visual quality che
ck)• 7,000 templates/second authentication time• 200ms finger capture time• Fake finger detection
6. Finger Sensor Operation
9High Security & Convenient Use
1. User Input (fingerprint/card/id/password)2. Authentication3. Picture4. LCD display result
7. Authentication Process
10High Security & Convenient Use
• USB pen device • Import to AC6000 (firmware upgrade, user
background images, system settings, user data, languages)
• Export from AC6000 (system settings, user data, log data, picture data)
• Transfer from terminal to terminal or terminal to server program.
8. USB Operation
11High Security & Convenient Use
• Designed by outsource company• GUI (User Interface)• All text is translatable to other languages• Easy to use touch buttons• Programmable LCD screen saver, turns off
lcd after programmable period.
9. User Interface
12High Security & Convenient Use
Three New Options (checkbox) System Settings -> Face Detection
* Card* Fingerprint* Password
10. Face Detection
13High Security & Convenient Use
Display Standard Success Windows
Display Standard Failure Windows
Start Face Detection
YES
YES
Card/Fingerprint/Password Face Detection Option Enabled?
NO
Card/Fingerprint /Password
Authorized?
NO
10. Face Detection
14High Security & Convenient Use
Please. Align Face in Center of window
# Show Type : # Show Type : VisibleVisible
# Capture Method# Capture Method
1. Starting Face Analysis – Video ON.1. Starting Face Analysis – Video ON.
2. Alignment Message Continue Count - Video2. Alignment Message Continue Count - Video
“Please. Align Face in Center of window 3.2.1.”“Please. Align Face in Center of window 3.2.1.”
3. Alignment Message Continue Count - Video3. Alignment Message Continue Count - Video
10. Face Detection
15High Security & Convenient Use
Still Picture Animation GIF
10. Face Detection
16High Security & Convenient Use
# Show Type : # Show Type : VisibleVisible
# Analysing Method# Analysing Method
1. Fingerprint Verification1. Fingerprint Verification
2. Card Verification2. Card Verification
3. ID Number Verification3. ID Number Verification
Face AnalysisFace Analysis
Analysing Face Image
10. Face Detection
17High Security & Convenient Use
Display Standard Result Window – Face Picture
Voice Standard “You are Authorized”
FailSuccess
# Show Type : # Show Type : VisibleVisible
# Authorized Icon and Matching Time Display# Authorized Icon and Matching Time Display
1. Fingerprint Authorized Icon 1. Fingerprint Authorized Icon
2. Card Authorized Icon 2. Card Authorized Icon
3. ID Number Authorized Icon3. ID Number Authorized Icon
# Show Type : # Show Type : VisibleVisible
# Return Point : # Return Point : Step 2.Step 2.
Card/Fingerprint /Password AuthorizedCard/Fingerprint /Password Authorized
10. Face Detection
18High Security & Convenient Use
Authorized Image Sample Failed Image Sample
Mask Many Face
Sunglass Blind eye
Background Cap
10. Face Detection
19High Security & Convenient Use
• Changeable custom background• Moveable icons/time/date• Option to display function keys on main
window• Option for daily background change• Status icons (system trouble, approach,
door, network, UV)• Input ID button• Access Button (time/attendance & meal
mode)
10. Main Screen
20High Security & Convenient Use
• Time/Attendance View
11. Main Screen
21High Security & Convenient Use
• Time/Attendance with Function Keys
11. Main Screen
22High Security & Convenient Use
• Icon Move-ability
11. Main Screen
23High Security & Convenient Use
• Main
12. Configuration
24High Security & Convenient Use
• User Programming
12. Configuration
25High Security & Convenient Use
• Add User
12. Configuration
26High Security & Convenient Use
• View User
12. Configuration
27High Security & Convenient Use
• Terminal Information
12. Configuration
28High Security & Convenient Use
• Theme
12. Configuration
29High Security & Convenient Use
• Possible for customer to translate and import language file
• Easy to use translation program• All East Asian languages, Arabic, Russian, Greek,
Hebrew.• Default English and Korean
13. Language Translations