HD Camera / Face Rec / Door Controller All-in-One

Author: Brian Rhodes, Published on Apr 30, 2014

Is it a security camera, face recognition reader, or a door controller?

Stand aside people: BioCam 300 claims to be all three, and more.

Should you consider this device for your systems? What are the downsides?

We take a look at the key features, pricing and competitive positioning inside.

** ** * ******** ******,*************** ******, ** * **** **********?

***** ***** ******: ****** *** ****** ** ** *** *****, and ****.

****** *** ******** **** ****** *** **** *******? **** *** the *********?

** **** * **** ** *** *** ********, ******* *** competitive *********** ******.

[***************]

********

*************** ** ** "*** *****'* ***** ** ** ****** **** ******** facial *********** *** ******* ** * ****** ****" *** ** not ****, ********* *** *** **** ****** ******. *** ~*"**"**" unit *********** ** * *****-****** ******-***** ******, **** ***** ** *** ears, *** * *" *** ******* ******* **********: 

*** ************* ****** ****** ** ***** ************ ******, * ****-*** ****** ******, * ****** **** monitor, *** * ********** **** ********** ** * ****** ****. When *** ***** **** ** ***** ******, *** ****** ******** surveillance ****** ** *** ***** 

*** ********

  • **** ******: *** **** ** ******** ** ** ******* **** ***** so ** *** ******* ******** ** *****, *** **** ******* those ***** ******* *** ******** ** '****** ********' ***********. ** to *** ***** *** ** ****** ** *** **** (** templates *** ****), ***** ** ****** ** ***** *** ******** in **** **** * *******. *** **** ****** ** *** scan ** ** ** **** ****, *** *** ******** ** LEDs ********* ******** **** ** **** *********.
  • ** ************ ******: *** **** **** ******** * **** ****, ** ***, day/night ****** **** ******** *****. *** **** *** ** ********** to ****** ** ****** ******* ** *** ******, ******** ********/******, ***** *** **********, *** **** *.***.
  • **** **********: ******, *** **** *********** ******** ** *** ****, *** has************ ***** *** ***** *******, *******, ** *** *******. ********* is ******** ** **** ** * '**********' ****** ******, *** while **** ********* *** *********** *** ** ****** **********, *** unit ****** ** ********** **** ****** *** ***** ****** *********.
  • *** ***: ***********, **** *** *** ******* ******** ** *** ****, it **** *** *** ***** **** ********, *** ******* ******** a ***** @ *.** ***** ******.

****

***** *** ****** *** ** ***, ** ** ******** ** have * ~$*,*** ****** *****. *** ********************** ******** *** ****** ** *** *********, *** *** ******* may ********** ** ********* ***** ********* *****, *** ********************.

*** * **** **** **********, ***** *** ****** *******, *** price ** ********** ********** ****** ***** *** **** ** ***********, one ** ****** ** **** ** * ***** ***** **** entry ******. ** *** ******** / *********** ****, ******* ** '***' - * **** *********** / ******** *******.

***************

***** *** **** ** ******** ** ****** ***** ****, ** does *** **** *** ****** **** ** *** *** ***. Absent ** ****** ******* *** ************ ** *******, ********* ****** should ** **** ** ***** ******:

  • *****:******* *** *********, *** *** ************ ******** ***** *************** ******* ***** *** ****** ******* * ** '********* **************'. ***** *** **** with ***** ******, *** ****** ******** ***** *** ********* ** a ************ ****** **** *******.
  • **** *** ********:*****, ******* ******* *** **** *** **************************** *** *****, ****** ****** ** **** ***** ** *******. While ******* ************* **** *********** ****** ** *** ***** ** less, ***** ** ** ********** ** *** ******** ***** ******** are **** **** * *** *****.
  • ******* ***********:***** ********* ** ***** **** * ****, **** ******** ******** and ***** ****, ** ** ******* ******* *****, ***** *********, nor ****** ***** *****. ***** **** ****, ************** ** ********** components ** *** ********, *** ** *** **** **** ***, the ****** ****** **** ** ********.

Unit *********** / *********** ********

*******, ** ****** *** ************* ** ********** ** *** *******, one ******* ******** ** *** **** ************** ** *** ********* to *******: ******** ********. 

*** *******'***************** *** ******** ********** *****:

*** ****** **** ** ******* *** ****** **** ** ******** good ****** ** *****, *** **** *** ***** ** ********** to ********* ** *****. ***** ************* **********, **** *** ******** of *** *** ** ***** ******* *********** **** ****** ** hats *** ********************* **** **********. ******* ******** ******** ** *** ********* **** ** *** **** leaves **** ****** ********** ** ******* *********, ******* **** ********.

*** **** ** ***** ** ********'* ********* ********* *****? ****, *** ********* ******* ** ******* ****** ***** ******* ***** *********** lead ** **** ******. ******** * ***** ** ******** ** a *** *** *** ** ****, *** ** ******* ********* to ***** **** **** ** ******** **** *** ****** ** front ** *** ***** ***** **.

Comments (10)

If the system is running in a verification mode (1:1) as it should for access control applications, then the number of faces in the database will have no bearing on matching accuracy and false alarm rates.

... the number of faces in the database will have no bearing on matching accuracy and false alarm rates.

So are you saying if it doesn't work with ~400 faces don't expect it to work any better with ~40? That's too bad because the latter is probably closer to the SOHO sweetspot...

I may have expressed myself poorly. While running in verification mode the number of users enrolled in the database will have no bearing on 1:1 verification matching performance, because the user presumably asserts his/her identity and the live image(s) is compared to the database image(s) corresponding to that user only. The number of images captured during runtime and enrollment for each user will likely have a bearing on matching accuracy. However, the technical matching performance for each user may either improve or degrade with the nature and number of images used depending on how the system makes use of them.

Skip - I'm not sure I totally follow your post. Are you saying that facial ID should be used as a sort of secondary verification mechanism, instead of being the primary/only verification mechanism?

With regards to FR accuracy: The product does have provision for wiegand inputs, so it could run in a two factor verification mode: User asserts identity with a possession factor (e.g., card) and FR camera verifies identity with biometrics (1:1 match). The accuracy of this mode will be much higher than identification mode (1:Many). In ID mode, the user looks at the camera, and his/her face is compared to every other image in the database (up to 400 users @ several images / user). Achieving good technical performance in this mode requires much stronger biometric performance as the probability for false match is much higher.

What I don't get about the recent burst of face-recognition access control products is where the real application is.

It seems like there are two primary cases:

1) Face-as-credential. This one still seems way to prone to false reads and delays, negating the ease-of-use factor when users get locked out or spend 10+ seconds at the door trying to get through.

2) Face-as-secondary credential. This one seems more practical because you're comparing the face read at the door to a known set of profile images, but it's still generally more costly and time consuming that something like an iris scan or fingerprint scan. The hardware is also bulky and ugly (for a door ornament) relative to other options.

I can't help but feel like facial recognition access control and 3D printers have a lot in common as that "gee whiz" thing that just can't really find a feasible fit in the marketplace just yet. This limits it to novelty and niche applications, which slows down overall adoption and R&D.

Are you seeing facial recognition applications that are truly viable and practical for a mainstream deployment?

Shouldn't the door controller be on the secure side of the door?

What if I take a full sized picture of an authorized person and hold it up in front of my face? At least it would be cleaner than chopping their head off!

Ken - I actually tried that, didn't work. I am guessing the facial geometry stored as the credential doesn't work when you have a flat 2D image.

What if the spoofed face was 3d?

Shades of Brian's Frankenfinger...;)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Ambitious Mobile Access Startup: Openpath on May 24, 2018
This team sold their last startup for hundreds of millions of dollars, now they have started Openpath to become a rare access control small...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Access Visitor Management Systems Guide on May 11, 2018
"Who are you, and why are you here?" Facilities that implement Visitor Management Systems hope they never need to ask that question to anyone,...
S2 Access Control / 'Unified Security Management' Profile on May 08, 2018
In our 13th access control company profile, we examine S2 Security's Netbox platform: Unified Security Management Platform positioning Core...
Vivotek 12MP Fisheye Camera Tested (FE9391-EV) on May 08, 2018
Next in our 12MP fisheye camera evaluation, we bought and tested Vivotek's latest generation FE9391-EV, a new model claiming improved smart IR...
Access Control Card Printers Guide on May 03, 2018
Card printers are a core component of professional access control systems, often used as photos IDs and prominently displayed. Modern badges put...
Last Chance - May 2018 Camera Course on May 03, 2018
This is the last chance to register as the course starts next week. This is the only independent surveillance camera course, based on in-depth...
JCI / Tyco VideoEdge NVR Profile on May 03, 2018
JCI (formerly Tyco) is one of the largest players in the global security industry, both as a manufacturer and an integrator. The company's most...

Most Recent Industry Reports

BREAKING: US House Passes Bill Banning Gov Use of Dahua and Hikvision on May 24, 2018
Today, the US House of Representatives has passed H.R. 5515, a bill that includes a ban on the US government's use of Dahua and Hikvision. This...
Hanwha Wisenet X Analytics and VMD Test on May 24, 2018
Continuing our updated testing of camera analytics, we tested Hanwha's Wisenet X analytics for over two weeks in multiple scenes, indoors and out,...
Ambitious Mobile Access Startup: Openpath on May 24, 2018
This team sold their last startup for hundreds of millions of dollars, now they have started Openpath to become a rare access control small...
Amazon's "Dangerous New Face Recognition Technology" Says ACLU on May 23, 2018
The ACLU has caused a stir, with a new report Amazon Teams Up With Law Enforcement to Deploy Dangerous New Face Recognition Technology,...
Software Only VMS vs NVR Appliances on May 23, 2018
Should you buy your own PC/server and load VMS software on it or get a turnkey appliance (both hardware and software, e.g., NVR, Hybrid DVR) from a...
Buy Arecont: Top Bid $10 Million Cash on May 22, 2018
Last year, Arecont had a deal for a purchase price of $170 million (see Failed Arecont China Acquisition). This year, Arecont has a deal for a...
Installing Box Cameras Indoors Tutorial on May 22, 2018
This tutorial starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
The Hikvision Smart Classroom Behavior Management System on May 22, 2018
Hikvision's rapidly growing offering of analytics, which we most recently examined with Hikvision's ethnic minority analytics, is now going into...
Dahua Intrusion Analytics And VMD Tested (Poorly) on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact