Entertech FaceStation Examined

Author: Brian Rhodes, Published on Nov 05, 2012

Biometric credentials are more than just fingerprints. A growing trend in access control readers is face recognition, but is it dependable enough to be the primary credential for access control? Entertech Systems thinks so, and their FaceStation Access Terminal is designed around it. In this note, we examine the company, the terminal, and the face recognition technology behind it.

Authentication Process Overview

**** ******* **** ********* *********** ** ************ ***** ********** **** the '****' ****** ******* ******. * ******** ** ********* ******* - ** *** **** ** ***********, ****** ** **** ***** - ** ****** ** ******** ************* ** *** **** *** system **********/**** ****** ********. *******, *** **** ****** ******* ****** database ** *********** ** ****** ** *** ********* **** ******. When * **** ***** ** ********* ** ** ******** ******, the ****** **** ********** *** **** ***** ****** **** * card ****** ******, *** ***** *** **** ***** *********** ** the **** ****** ******* ****** ***** ********** *********** ** * wiegand ******.

** **** ***, ** **** ** ** ****** ******* ****** can ****** ******* ******, *** *********** *** ** **** ** provide '**** ***********' ** ** ****** ******* ****** ********** ** how ****** **’* ****** ********** **.

Face ******* ********

********* ** *** ** *********** *** ******** *********'* **** ** ****** ******* *********. ***** ********* ** *** ******* ******** ** *** *******'* products ** ***** *******, ******* ** *********** *** *** ***********, development, *** ************* ** *** ***********.

*** ******* ********* ** ********* ******'* *********** *** *** **** onboard *******. *** ** *** ******* ** * '********' ****** unit, *** *** ***** ** ** **-**** ****. *** ************ claims **** *********** ****** *** ********* ** ********* *** ‘***** depth’ ** ** ***** ***** ** *** ** *********, ** the ****** ****** ** ******* ** ********. ** ********, *** addition ** *** ** ***** **** ********** ******* ******** **** by *** *********** **********, ***** *** ******* ****** ********* *** accuracy ** *****. *** **** ** ***** ** *** ******* that *******:

Other ********* **********

  • *.*” ***** ****** *** ******* ******* ** * ****** *** multifactor **************
  • *** *** *** ** ********** ***** ****-******* ****** *** *******
  • ****: *** ************ ****** **** ********* ******* ** **** **** records ***** ***** * *******.
  • *** *******: ***.*** *** *********, **/*** ******** ****
  • **** *******: *****-** ***.***/* ******** ********
  • *****-** ********** *** ******* *** ***** ******** *********
  • * ****** / * ****** ******: *** */* ***** ***** for ************* ** *****, **** ******** *******, *** ****** ******* like ********* **** *******.
  • ** *** *******: **** ******* ** ***** **** *** ******* to **** ******/*******/** *****, *** ****** **** ****** ** ********* format ***********.
  • ****: **** ******* *** * ~ $**** ****** *****

Function ********

********* ** *********** *********:*********** ***** *** ********* ** * ******* ******, *** ******* as ***** ***** ***** ** *** ******* *****. ** **** case, *** ******** *** ******** ***** *,***,*** *********** ******* ** 10,000 ***** ****. *******, ****** **** ******* **** *** ******** wired ** **** *********** ***** **/* ****, *** ******* ******* between *** **** ******* *** *** *** *****/********** ** ********** to ******* ******** ** * *** **** *********** ******* *** not.

**** ***** *** **** ******* ******* ** ********** ********** *** system, *** ******* *** ** ***** ** ******* **** ******** directly **** *** ****** *** ** ********* ******* ***** ****** embedded ** ****** ********* ******* ********** ***********.

***** ******* *********** **** ****** ******* ******* *** ************ ******* wiegand **********, ******* ****** **** *********** (**: ****** ********** *********, remote **** *************) **** ***** ******* **** ** ********* **** month. *** ******* ************ ***** ****** ******* **************** *****, ******** *****, *******, *******, *** ******.

***** & *********** **************:***** ***** ******* ******* ******* ** ******** * ****, *** Face ******* ************* ******* * ****** ********** ** ** ****, and *** ** ****** ******* **** ***** **** **** ******** to ** ****. *** **** **** ***** ***** ************* **** no **** ************ ********. ***** ********* ****** *** ************** ******* takes ***** * ******, ** **** *** ****** *** ****’* performance ** ********.

Face *********** *********

********* ******’* *********** ****** **** ** **** *********** *** ******. Most ******* **** *** **** *********** ** ** ** ** option ***** ******* ***** - ************, *****, ** *** *******, and ****** *** **** *********** ** * ******* ****** ** credential. ***** ******** ******* ****** ** ********* ********** ******* ** assure ****** ** *** ********* ***** ** *** *****.

**** *********** ** ***** * ********** ******* **** ******** - simple ******** ******** ******* **** ****, ******, ** ********** *** prevent *********** ******** **** *******. ****** *** ************* **** ** users ** ******* ********** ******* **** **** ** *********, **** Recognition ** * **** ***** ********** **** **** ********.

Compared ** ***********

*********** ******* *** * ******** ** *** **** ** ***********. ********** biometrics *************, **** **/********* (**** ** ************* ***) ***** * ****** ** ***** ***********/****** **** ******* ** their "** ******" **** ***** ****$*** - $********** *****. ****, ************'************* ***** * ***********-**** ******, *** *** ** ********* *** ~$*** distribution *******. ** ******** *** **** ****** ** *****/******* *** networked ********** ********** **********.

*********** *********** *** **** *********** *********, ** *** **** *** users ******* ********* ********* ** ****** ***********. ****** ***** ** a ******** *********** ** ********** ***** **** ** ****, *** constraints *** ***** ** *** ********** *** ***** ** ***** for ********** **********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

PoE Powered Access Control Tutorial on Jan 19, 2018
Powering access control with Power over Ethernet is becoming increasingly common.  However, access requires more power than cameras, and the...
Winter 2018 Camera Course on Jan 18, 2018
Learn video surveillance and get certified. Register now. Save $50 on the course, ending this Thursday the 18th, plus get access to 2 class times...
CES 2018 Show Final Report on Jan 12, 2018
This is IPVM's final edition of our 2018 CES show report. Below are already numerous images and commentary, with more coming tomorrow.   CES is...
Hanwha ExtraLux Camera Tested on Jan 11, 2018
Hanwha has released the latest in their Wisenet X line, the "extraLUX" series, claiming to "capture crystal clear, true-color images in low-light...
Hikvision IR Bullet Camera Shootout on Jan 08, 2018
Hikvision's widely used Value Plus line claims 30m/~98' IR illumination range, on multiple lens options ranging from wide angle (100°+) to...
Access Control Course Winter 2018 on Jan 04, 2018
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in the...
Chinese Government Attacks Western Reports on Jan 03, 2018
The Chinese government is angry at the BBC and WSJ's reporting on Chinese video surveillance (see BBC Features Dahua and WSJ Investigates China's...
2018 Access Control Book Released on Jan 02, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing, significantly updated for...
2018 Top Sales Interest For Integrators on Dec 20, 2017
130+ integrators answered: This is a key question, especially for manufacturers, as it impacts what areas to focus more on and what...
Lock Status Monitoring Tutorial on Dec 18, 2017
Just because your doors look secure does not mean they are. Unless access systems are using lock status monitoring, the doors and areas they...

Most Recent Industry Reports

PoE Powered Access Control Tutorial on Jan 19, 2018
Powering access control with Power over Ethernet is becoming increasingly common.  However, access requires more power than cameras, and the...
If You Have 4 Cameras, You Can Throw Them Away, If You Have 400, They Throw You Away on Jan 19, 2018
Do users care about anything but price? Do user care about cybersecurity? Do users care about trusting their supplier? These have become...
Chinese Government Hikvision Surveillance System On US Government Network on Jan 18, 2018
Hikvision, the Chinese government-owned manufacturer, has publicly claimed that their products are running on a US government network. Moreover,...
Winter 2018 Camera Course on Jan 18, 2018
Learn video surveillance and get certified. Register now. Save $50 on the course, ending this Thursday the 18th, plus get access to 2 class times...
VSaaS Usage Statistics 2018 on Jan 18, 2018
VSaaS has been a 'next big thing' for more than a decade. The prospect of managing, storing and streaming video from the cloud rather than...
Vivint Streety Video Strengthens Door Knocking on Jan 17, 2018
Vivint is famous (or infamous depending on your perspective) for mastering large scale door to door selling. The company has skyrocketed from a...
Axis: "It’s A Question Of Trust And Who You Want To Be Associated With" on Jan 17, 2018
Who do you trust? Who do you want to be associated with? Axis is raising hard questions to start 2018. In this note, we examine these questions,...
Software House Vulnerability Allows Inside Attacker To Open Doors on Jan 17, 2018
A vulnerability in Software House IP-ACM modules allows an attacker to potentially unlock doors, or perform other actions, on affected systems....
'Defiant' Hikvision 'Strikes Back' At WSJ And US on Jan 16, 2018
The fight is on. Hikvision and their owner, the Chinese government, 'strikes back' against the Wall Street Journal and US politicians raising...
The 2018 Surveillance Industry Guide on Jan 16, 2018
The 300 page, 2018 Video Surveillance Industry Guide, covering the key events and the future of the video surveillance market, is now available,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact