Entertech FaceStation Examined

By Brian Rhodes, Published Nov 05, 2012, 07:00pm EST (Info+)

Biometric credentials are more than just fingerprints. A growing trend in access control readers is face recognition, but is it dependable enough to be the primary credential for access control? Entertech Systems [link no longer available] thinks so, and their FaceStation Access Termina [link no longer available]l is designed around it. In this note, we examine the company, the terminal, and the face recognition technology behind it.

Authentication Process Overview

**** ******* **** ********* *********** ** authenticate ***** ********** **** *** '****' access ******* ******. * ******** ** biometric ******* - ** *** **** of ***********, ****** ** **** ***** - ** ****** ** ******** ************* of *** **** *** ****** **********/**** holder ********. *******, *** **** ****** control ****** ******** ** *********** ** stored ** *** ********* **** ******. When * **** ***** ** ********* as ** ******** ******, *** ****** unit ********** *** **** ***** ****** with * **** ****** ******, *** sends *** **** ***** *********** ** the **** ****** ******* ****** ***** cardholder *********** ** * ******* ******.

** **** ***, ** **** ** an ****** ******* ****** *** ****** wiegand ******, *** *********** *** ** used ** ******* '**** ***********' ** an ****** ******* ****** ********** ** how ****** **’* ****** ********** **.

Face ******* ********

********* ** *** ** *********** *** reseller *********'* **** ** ****** ******* *********. ***** ********* ** *** ******* reseller ** *** *******'* ******** ** North *******, ******* ** *********** *** the ***********, ***********, *** ************* ** the ***********.

*** ******* ********* ** ********* ******'* FaceStation *** *** **** ******* *******. One ** *** ******* ** * 'standard' ****** ****, *** *** ***** is ** **-**** ****. *** ************ claims **** *********** ****** *** ********* of ********* *** ‘***** *****’ ** an ***** ***** ** *** ** signature, ** *** ****** ****** ** spoofed ** ********. ** ********, *** addition ** *** ** ***** **** additional ******* ******** **** ** *** recognition **********, ***** *** ******* ****** increases *** ******** ** *****. *** unit ** ***** ** *** ******* that *******:

Other ********* **********

  • *.*” ***** ****** *** ******* ******* as * ****** *** *********** **************
  • *** *** *** ** ********** ***** user-defined ****** *** *******
  • ****: *** ************ ****** **** ********* matches ** **** **** ******* ***** under * *******.
  • *** *******: ***.*** *** *********, **/*** ethernet ****
  • **** *******: *****-** ***.***/* ******** ********
  • *****-** ********** *** ******* *** ***** intercom *********
  • * ****** / * ****** ******: The */* ***** ***** *** ************* of *****, **** ******** *******, *** serial ******* **** ********* **** *******.
  • ** *** *******: **** ******* ** built **** *** ******* ** **** Mifare/DesFire/RF *****, *** ****** **** ****** or ********* ****** ***********.
  • ****: **** ******* *** * ~ $1700 ****** *****

Function ********

********* ** *********** *********:*********** ***** *** ********* ** * central ******, *** ******* ** ***** alone ***** ** *** ******* *****. In **** ****, *** ******** *** capacity ***** *,***,*** *********** ******* ** 10,000 ***** ****. *******, ****** **** readers **** *** ******** ***** ** door *********** ***** **/* ****, *** network ******* ******* *** **** ******* and *** *** *****/********** ** ********** to ******* ******** ** * *** that *********** ******* *** ***.

**** ***** *** **** ******* ******* an ********** ********** *** ******, *** readers *** ** ***** ** ******* door ******** ******** **** *** ****** and ** ********* ******* ***** ****** embedded ** ****** ********* ******* ********** Application.

***** ******* *********** **** ****** ******* systems *** ************ ******* ******* **********, Suprema ****** **** *********** (**: ****** credential *********, ****** **** *************) **** Lenel ******* **** ** ********* **** month. *** ******* ***** ******* ***** access ******* ******* [**** ** ****** available] ********* *****, ******** *****, *******, Keyscan, *** ******.

***** & *********** **************:***** ***** ******* ******* ******* ** initiate * ****, *** **** ******* automatically ******* * ****** ********** ** be ****, *** *** ** ****** prompts **** ***** **** **** ******** to ** ****. *** **** **** scans ***** ************* **** ** **** intervention ********. ***** ********* ****** *** authentication ******* ***** ***** * ******, we **** *** ****** *** ****’* performance ** ********.

Face *********** *********

********* ******’* *********** ****** **** ** face *********** *** ******. **** ******* that *** **** *********** ** ** as ** ****** ***** ******* ***** - ************, *****, ** *** *******, and ****** *** **** *********** ** a ******* ****** ** **********. ***** products ******* ****** ** ********* ********** methods ** ****** ****** ** *** prevented ***** ** *** *****.

**** *********** ** ***** * ********** fraught **** ******** - ****** ******** clothing ******* **** ****, ******, ** eyeglasses *** ******* *********** ******** **** working. ****** *** ************* **** ** users ** ******* ********** ******* **** type ** *********, **** *********** ** a **** ***** ********** **** **** problems.

Compared ** ***********

*********** ******* *** * ******** ** the **** ** ***********. ********** ********** *************, like **/********* (**** ** ************* ***) ***** * ****** ** ***** fingerprint/finger **** ******* ** ***** "** series" **** ***** ****$*** - $********** *****. ****, ************'************* ***** * ***********-**** ******, *** *** be ********* *** ~$*** ************ *******. It ******** *** **** ****** ** input/outputs *** ********* ********** ********** **********.

*********** *********** *** **** *********** *********, we *** **** *** ***** ******* biometric ********* ** ****** ***********. ****** there ** * ******** *********** ** credential ***** **** ** ****, *** constraints *** ***** ** *** ********** are ***** ** ***** *** ********** deployment.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts reporting, tutorials and software funded by subscriber's payments enabling us to offer the most independent, accurate and in-depth information.
Loading Related Reports