HD Camera / Face Rec / Door Controller All-in-One

Author: Brian Rhodes, Published on Apr 30, 2014

Is it a security camera, face recognition reader, or a door controller?

Stand aside people: BioCam 300 claims to be all three, and more.

Should you consider this device for your systems? What are the downsides?

We take a look at the key features, pricing and competitive positioning inside.

** ** * ******** ******,*************** ******, ** * **** **********?

***** ***** ******: ****** *** ****** ** ** *** *****, and ****.

****** *** ******** **** ****** *** **** *******? **** *** the *********?

** **** * **** ** *** *** ********, ******* *** competitive *********** ******.

[***************]

********

*************** ** ** "*** *****'* ***** ** ** ****** **** ******** facial *********** *** ******* ** * ****** ****" *** ** not ****, ********* *** *** **** ****** ******. *** ~*"**"**" unit *********** ** * *****-****** ******-***** ******, **** ***** ** *** ears, *** * *" *** ******* ******* **********: 

*** ************* ****** ****** ** ***** ************ ******, * ****-*** ****** ******, * ****** **** monitor, *** * ********** **** ********** ** * ****** ****. When *** ***** **** ** ***** ******, *** ****** ******** surveillance ****** ** *** ***** 

*** ********

  • **** ******: *** **** ** ******** ** ** ******* **** ***** so ** *** ******* ******** ** *****, *** **** ******* those ***** ******* *** ******** ** '****** ********' ***********. ** to *** ***** *** ** ****** ** *** **** (** templates *** ****), ***** ** ****** ** ***** *** ******** in **** **** * *******. *** **** ****** ** *** scan ** ** ** **** ****, *** *** ******** ** LEDs ********* ******** **** ** **** *********.
  • ** ************ ******: *** **** **** ******** * **** ****, ** ***, day/night ****** **** ******** *****. *** **** *** ** ********** to ****** ** ****** ******* ** *** ******, ******** ********/******, ***** *** **********, *** **** *.***.
  • **** **********: ******, *** **** *********** ******** ** *** ****, *** has************ ***** *** ***** *******, *******, ** *** *******. ********* is ******** ** **** ** * '**********' ****** ******, *** while **** ********* *** *********** *** ** ****** **********, *** unit ****** ** ********** **** ****** *** ***** ****** *********.
  • *** ***: ***********, **** *** *** ******* ******** ** *** ****, it **** *** *** ***** **** ********, *** ******* ******** a ***** @ *.** ***** ******.

****

***** *** ****** *** ** ***, ** ** ******** ** have * ~$*,*** ****** *****. *** ********************** ******** *** ****** ** *** *********, *** *** ******* may ********** ** ********* ***** ********* *****, *** ********************.

*** * **** **** **********, ***** *** ****** *******, *** price ** ********** ********** ****** ***** *** **** ** ***********, one ** ****** ** **** ** * ***** ***** **** entry ******. ** *** ******** / *********** ****, ******* ** '***' - * **** *********** / ******** *******.

***************

***** *** **** ** ******** ** ****** ***** ****, ** does *** **** *** ****** **** ** *** *** ***. Absent ** ****** ******* *** ************ ** *******, ********* ****** should ** **** ** ***** ******:

  • *****:******* *** *********, *** *** ************ ******** ***** *************** ******* ***** *** ****** ******* * ** '********* **************'. ***** *** **** with ***** ******, *** ****** ******** ***** *** ********* ** a ************ ****** **** *******.
  • **** *** ********:*****, ******* ******* *** **** *** **************************** *** *****, ****** ****** ** **** ***** ** *******. While ******* ************* **** *********** ****** ** *** ***** ** less, ***** ** ** ********** ** *** ******** ***** ******** are **** **** * *** *****.
  • ******* ***********:***** ********* ** ***** **** * ****, **** ******** ******** and ***** ****, ** ** ******* ******* *****, ***** *********, nor ****** ***** *****. ***** **** ****, ************** ** ********** components ** *** ********, *** ** *** **** **** ***, the ****** ****** **** ** ********.

Unit *********** / *********** ********

*******, ** ****** *** ************* ** ********** ** *** *******, one ******* ******** ** *** **** ************** ** *** ********* to *******: ******** ********. 

*** *******'***************** *** ******** ********** *****:

*** ****** **** ** ******* *** ****** **** ** ******** good ****** ** *****, *** **** *** ***** ** ********** to ********* ** *****. ***** ************* **********, **** *** ******** of *** *** ** ***** ******* *********** **** ****** ** hats *** ********************* **** **********. ******* ******** ******** ** *** ********* **** ** *** **** leaves **** ****** ********** ** ******* *********, ******* **** ********.

*** **** ** ***** ** ********'* ********* ********* *****? ****, *** ********* ******* ** ******* ****** ***** ******* ***** *********** lead ** **** ******. ******** * ***** ** ******** ** a *** *** *** ** ****, *** ** ******* ********* to ***** **** **** ** ******** **** *** ****** ** front ** *** ***** ***** **.

Comments (10)

If the system is running in a verification mode (1:1) as it should for access control applications, then the number of faces in the database will have no bearing on matching accuracy and false alarm rates.

... the number of faces in the database will have no bearing on matching accuracy and false alarm rates.

So are you saying if it doesn't work with ~400 faces don't expect it to work any better with ~40? That's too bad because the latter is probably closer to the SOHO sweetspot...

I may have expressed myself poorly. While running in verification mode the number of users enrolled in the database will have no bearing on 1:1 verification matching performance, because the user presumably asserts his/her identity and the live image(s) is compared to the database image(s) corresponding to that user only. The number of images captured during runtime and enrollment for each user will likely have a bearing on matching accuracy. However, the technical matching performance for each user may either improve or degrade with the nature and number of images used depending on how the system makes use of them.

Skip - I'm not sure I totally follow your post. Are you saying that facial ID should be used as a sort of secondary verification mechanism, instead of being the primary/only verification mechanism?

With regards to FR accuracy: The product does have provision for wiegand inputs, so it could run in a two factor verification mode: User asserts identity with a possession factor (e.g., card) and FR camera verifies identity with biometrics (1:1 match). The accuracy of this mode will be much higher than identification mode (1:Many). In ID mode, the user looks at the camera, and his/her face is compared to every other image in the database (up to 400 users @ several images / user). Achieving good technical performance in this mode requires much stronger biometric performance as the probability for false match is much higher.

What I don't get about the recent burst of face-recognition access control products is where the real application is.

It seems like there are two primary cases:

1) Face-as-credential. This one still seems way to prone to false reads and delays, negating the ease-of-use factor when users get locked out or spend 10+ seconds at the door trying to get through.

2) Face-as-secondary credential. This one seems more practical because you're comparing the face read at the door to a known set of profile images, but it's still generally more costly and time consuming that something like an iris scan or fingerprint scan. The hardware is also bulky and ugly (for a door ornament) relative to other options.

I can't help but feel like facial recognition access control and 3D printers have a lot in common as that "gee whiz" thing that just can't really find a feasible fit in the marketplace just yet. This limits it to novelty and niche applications, which slows down overall adoption and R&D.

Are you seeing facial recognition applications that are truly viable and practical for a mainstream deployment?

Shouldn't the door controller be on the secure side of the door?

What if I take a full sized picture of an authorized person and hold it up in front of my face? At least it would be cleaner than chopping their head off!

Ken - I actually tried that, didn't work. I am guessing the facial geometry stored as the credential doesn't work when you have a flat 2D image.

What if the spoofed face was 3d?

Shades of Brian's Frankenfinger...;)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

October 2018 Camera Course - Save $50 - Last Chance on Sep 13, 2018
Today is the last day to save $50 on the October 2018 Camera Course, register now. This is the only independent surveillance camera course,...
Door Fundamentals For Access Control Guide on Sep 12, 2018
Assuming every door can be secured with either a maglock or an electric strike can be a painful assumption in the field. While those items can be...
Access Control Course Fall 2018 on Sep 06, 2018
Registration IS CLOSED ends this Thursday. Register now. If you are looking to strengthen your ability to design and deploy access systems or...
Drain Wire For Access Control Reader Tutorial on Sep 04, 2018
An easy-to-miss cabling specification plays a key role in access control, yet it is commonly ignored. The drain wire offers protection for readers...
Directory Of 110+ Video Management Software (VMS) Suppliers on Aug 30, 2018
This directory provides a list of Video Management Software providers to help you see and research what options are available. Listing...
Exit Devices For Access Control Tutorial on Aug 28, 2018
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety codes the world over, and become integral parts of electronic access...
Inputs/Outputs For Video Surveillance Guide on Aug 24, 2018
While many cameras have Input/Output (I/O) ports, few are actually used and most designers do not even consider them. However, a good understanding...
Assa Aperio Wireless Access Reader R100 Tested on Aug 23, 2018
Wireless access control is frequently promoted by manufacturers as a way to cut installation costs. Perhaps the biggest proponent of this is mega...
Synology Surveillance Station VMS Tested on Aug 22, 2018
With so many low-cost NVRs and enterprise VMSes, is there any place in the market for NAS-based VMSes? Recently, IPVM bought a Synology NAS for...
Backup Power For Maglocks Guide on Aug 20, 2018
When the main power fails, many believe maglocks must leave doors unlocked. However, battery backed up maglocks are allowed according to IBC /...

Most Recent Industry Reports

25% China Tariffs Finalized For 2019, 10% Start Now, Includes Select Video Surveillance on Sep 18, 2018
A surprise move: In July, when the most recent tariff round was first announced, the tariffs were only scheduled for 10%. However, now, the US...
Central Stations Face Off Against NFPA On Fire Monitoring on Sep 18, 2018
Central stations are facing off against the NFPA over what they call anti-competitive language in NFPA 72, the standard that covers fire alarms....
Hikvision USA Starts Layoffs on Sep 18, 2018
Hikvision USA has started layoffs, just weeks after the US government ban was passed into law. Inside this note, we examine: The important...
Chinese Government Praises Hikvision Following Xi Jinping on Sep 17, 2018
The Chinese government council responsible for managing China's state-owned companies praised Hikvision’s obedience to China’s authoritarian leader...
Amazon Ring Spotlight Cam Tested on Sep 17, 2018
Amazon's Ring has released their latest camera entry, the Spotlight Cam, which we bought and tested in our Consumer IP Camera Analytics...
European Mega Security Firm Verisure Pushing Security Fog on Sep 17, 2018
The European mega security firm Verisure (Securitas Direct), with a reported 2 million customers, is pushing security fog, as shown in this BBC...
IP Camera Cable Labeling Guide on Sep 14, 2018
Labeling cables can save a lot of money and headaches. While it is easy to overlook, taking time to label runs during installation significantly...
Favorite Intercom Manufacturers 2018 on Sep 14, 2018
Intercoms are certainly increasing in popularity, driven by the integration of video and IP networking. But who is the favorite? On the one side,...
Vivotek 4MP Camera Tested (FD8379-HV) on Sep 13, 2018
Next in our series of updated 4MP testing, we bought and tested Vivotek's FD8379-HV, and entry level 4MP model claiming "top-notch quality video in...
Ascent / MONI Faces Lender Lawsuit and Debt Crisis on Sep 13, 2018
ASCMA, aka Ascent, aka Brinks Home Security, aka MONI, aka Monitronics is being sued by a group of their lenders who allege: As of June 30,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact