HD Camera / Face Rec / Door Controller All-in-One

Author: Brian Rhodes, Published on Apr 30, 2014

Is it a security camera, face recognition reader, or a door controller?

Stand aside people: BioCam 300 claims to be all three, and more.

Should you consider this device for your systems? What are the downsides?

We take a look at the key features, pricing and competitive positioning inside.

** ** * ******** ******,*************** ******, ** * **** **********?

***** ***** ******: ****** *** ****** ** ** *** *****, and ****.

****** *** ******** **** ****** *** **** *******? **** *** the *********?

** **** * **** ** *** *** ********, ******* *** competitive *********** ******.

[***************]

********

*************** ** ** "*** *****'* ***** ** ** ****** **** ******** facial *********** *** ******* ** * ****** ****" *** ** not ****, ********* *** *** **** ****** ******. *** ~*"**"**" unit *********** ** * *****-****** ******-***** ******, **** ***** ** *** ears, *** * *" *** ******* ******* **********: 

*** ************* ****** ****** ** ***** ************ ******, * ****-*** ****** ******, * ****** **** monitor, *** * ********** **** ********** ** * ****** ****. When *** ***** **** ** ***** ******, *** ****** ******** surveillance ****** ** *** ***** 

*** ********

  • **** ******: *** **** ** ******** ** ** ******* **** ***** so ** *** ******* ******** ** *****, *** **** ******* those ***** ******* *** ******** ** '****** ********' ***********. ** to *** ***** *** ** ****** ** *** **** (** templates *** ****), ***** ** ****** ** ***** *** ******** in **** **** * *******. *** **** ****** ** *** scan ** ** ** **** ****, *** *** ******** ** LEDs ********* ******** **** ** **** *********.
  • ** ************ ******: *** **** **** ******** * **** ****, ** ***, day/night ****** **** ******** *****. *** **** *** ** ********** to ****** ** ****** ******* ** *** ******, ******** ********/******, ***** *** **********, *** **** *.***.
  • **** **********: ******, *** **** *********** ******** ** *** ****, *** has************ ***** *** ***** *******, *******, ** *** *******. ********* is ******** ** **** ** * '**********' ****** ******, *** while **** ********* *** *********** *** ** ****** **********, *** unit ****** ** ********** **** ****** *** ***** ****** *********.
  • *** ***: ***********, **** *** *** ******* ******** ** *** ****, it **** *** *** ***** **** ********, *** ******* ******** a ***** @ *.** ***** ******.

****

***** *** ****** *** ** ***, ** ** ******** ** have * ~$*,*** ****** *****. *** ********************** ******** *** ****** ** *** *********, *** *** ******* may ********** ** ********* ***** ********* *****, *** ********************.

*** * **** **** **********, ***** *** ****** *******, *** price ** ********** ********** ****** ***** *** **** ** ***********, one ** ****** ** **** ** * ***** ***** **** entry ******. ** *** ******** / *********** ****, ******* ** '***' - * **** *********** / ******** *******.

***************

***** *** **** ** ******** ** ****** ***** ****, ** does *** **** *** ****** **** ** *** *** ***. Absent ** ****** ******* *** ************ ** *******, ********* ****** should ** **** ** ***** ******:

  • *****:******* *** *********, *** *** ************ ******** ***** *************** ******* ***** *** ****** ******* * ** '********* **************'. ***** *** **** with ***** ******, *** ****** ******** ***** *** ********* ** a ************ ****** **** *******.
  • **** *** ********:*****, ******* ******* *** **** *** **************************** *** *****, ****** ****** ** **** ***** ** *******. While ******* ************* **** *********** ****** ** *** ***** ** less, ***** ** ** ********** ** *** ******** ***** ******** are **** **** * *** *****.
  • ******* ***********:***** ********* ** ***** **** * ****, **** ******** ******** and ***** ****, ** ** ******* ******* *****, ***** *********, nor ****** ***** *****. ***** **** ****, ************** ** ********** components ** *** ********, *** ** *** **** **** ***, the ****** ****** **** ** ********.

Unit *********** / *********** ********

*******, ** ****** *** ************* ** ********** ** *** *******, one ******* ******** ** *** **** ************** ** *** ********* to *******: ******** ********. 

*** *******'***************** *** ******** ********** *****:

*** ****** **** ** ******* *** ****** **** ** ******** good ****** ** *****, *** **** *** ***** ** ********** to ********* ** *****. ***** ************* **********, **** *** ******** of *** *** ** ***** ******* *********** **** ****** ** hats *** ********************* **** **********. ******* ******** ******** ** *** ********* **** ** *** **** leaves **** ****** ********** ** ******* *********, ******* **** ********.

*** **** ** ***** ** ********'* ********* ********* *****? ****, *** ********* ******* ** ******* ****** ***** ******* ***** *********** lead ** **** ******. ******** * ***** ** ******** ** a *** *** *** ** ****, *** ** ******* ********* to ***** **** **** ** ******** **** *** ****** ** front ** *** ***** ***** **.

Comments (10)

If the system is running in a verification mode (1:1) as it should for access control applications, then the number of faces in the database will have no bearing on matching accuracy and false alarm rates.

... the number of faces in the database will have no bearing on matching accuracy and false alarm rates.

So are you saying if it doesn't work with ~400 faces don't expect it to work any better with ~40? That's too bad because the latter is probably closer to the SOHO sweetspot...

I may have expressed myself poorly. While running in verification mode the number of users enrolled in the database will have no bearing on 1:1 verification matching performance, because the user presumably asserts his/her identity and the live image(s) is compared to the database image(s) corresponding to that user only. The number of images captured during runtime and enrollment for each user will likely have a bearing on matching accuracy. However, the technical matching performance for each user may either improve or degrade with the nature and number of images used depending on how the system makes use of them.

Skip - I'm not sure I totally follow your post. Are you saying that facial ID should be used as a sort of secondary verification mechanism, instead of being the primary/only verification mechanism?

With regards to FR accuracy: The product does have provision for wiegand inputs, so it could run in a two factor verification mode: User asserts identity with a possession factor (e.g., card) and FR camera verifies identity with biometrics (1:1 match). The accuracy of this mode will be much higher than identification mode (1:Many). In ID mode, the user looks at the camera, and his/her face is compared to every other image in the database (up to 400 users @ several images / user). Achieving good technical performance in this mode requires much stronger biometric performance as the probability for false match is much higher.

What I don't get about the recent burst of face-recognition access control products is where the real application is.

It seems like there are two primary cases:

1) Face-as-credential. This one still seems way to prone to false reads and delays, negating the ease-of-use factor when users get locked out or spend 10+ seconds at the door trying to get through.

2) Face-as-secondary credential. This one seems more practical because you're comparing the face read at the door to a known set of profile images, but it's still generally more costly and time consuming that something like an iris scan or fingerprint scan. The hardware is also bulky and ugly (for a door ornament) relative to other options.

I can't help but feel like facial recognition access control and 3D printers have a lot in common as that "gee whiz" thing that just can't really find a feasible fit in the marketplace just yet. This limits it to novelty and niche applications, which slows down overall adoption and R&D.

Are you seeing facial recognition applications that are truly viable and practical for a mainstream deployment?

Shouldn't the door controller be on the secure side of the door?

What if I take a full sized picture of an authorized person and hold it up in front of my face? At least it would be cleaner than chopping their head off!

Ken - I actually tried that, didn't work. I am guessing the facial geometry stored as the credential doesn't work when you have a flat 2D image.

What if the spoofed face was 3d?

Shades of Brian's Frankenfinger...;)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Directory of Video Intercoms on Nov 13, 2018
Video Intercoms, also known as Video Door-Phones or Video Entry Systems, have been growing in the past decade as more and more IP camera...
Beware Amazon Go Store Hype (Tested) on Nov 13, 2018
IPVM's trip to and testing of Amazon Go's San Francisco store shows a number of significant operational and economic issues that undermine the...
Axis 2N Intercom Tested on Nov 08, 2018
Axis expanded its video intercom business buying Czech-based 2N in 2016. Despite competing against owner Axis' intercoms, 2N recently registered as...
Haven Targets School Security with Lockdown Lineup on Nov 08, 2018
Haven, a US startup founded in 2014 as a residential-focused company, has now raised funding and is offering a lineup of commercial grade locks for...
Directory Of Video Doorbells on Nov 06, 2018
Video doorbells are one of the fastest growing categories in video surveillance, especially among residences. The optimal placement of these...
Avigilon Opens Up Analytics And Cameras on Nov 06, 2018
Avigilon is opening up. The company historically famous for advocating its own end-to-end solutions and making it harder for 3rd parties to...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
Worst Products on Nov 03, 2018
Security integrators periodically report on their favorite and worst products to IPVM. These are known integrators who IPVM pays to answer surveys....
Solar-Powered, Smart-Phone-Based Access Kit (VIZPin) Examined on Nov 02, 2018
Cloud-based access control company VIZPin is releasing a solar-powered and smart phone based access control system for gates and other remote...
Building Occupancy Codes and Access Control Tutorial on Nov 01, 2018
A building or room's classification can greatly impact which building codes must be followed. In terms of access control, these 'occupancy codes'...

Most Recent Industry Reports

Milestone Disrupts Milestone With Arcules on Nov 19, 2018
Milestone is now competing against... Milestone's own spinout Arcules New IPVM testing shows that Arcules has incorporated a substantial amount of...
Pressure Mounts Against Dahua and Hikvision Xinjiang Business on Nov 19, 2018
Pressure is mounting against Hikvision, Dahua, and other companies operating in Xinjiang as an international outcry brews against the Chinese...
Arcules Cloud VMS Tested on Nov 19, 2018
Arcules is a big bet, or as they describe themselves a 'bold company', spun out and backed by Milestone and Canon.  But how good is Arcules cloud...
'Sticker' Surveillance Camera Developed (CSEM Witness) on Nov 16, 2018
The Swiss Center for Electronics and Microtechnology (CSEM) has announced what it calls the: world’s first fully autonomous camera that can be...
ISC East 2018 Mini-Show Final Report on Nov 16, 2018
This is our second (updated) and final show report from ISC East. ISC East, by its own admission, is not a national or international show, billed...
Facial Detection Tested on Nov 16, 2018
Facial detection and recognition are increasingly offered by video surveillance manufacturers. Facial detection detects faces in an image/video...
Throughtek P2P/Cloud Solution Profile on Nov 15, 2018
Many IoT manufacturers either do not have the capabilities or the interest to develop their own cloud management software for their devices....
ASIS Offering Custom Research For Manufacturers on Nov 15, 2018
Manufacturers often want to know what industry people think about trends and, in particular, the segments and product they offer.  ASIS and its...
Hikvision Silent on "Bad Architectural Practices" Cybersecurity Report on Nov 14, 2018
A 'significant vulnerability was found in Hikvision cameras' by VDOO, a startup cybersecurity specialist. Hikvision has fixed the specific...
French Government Threatens School with $1.7M Fine For “Excessive Video Surveillance” on Nov 14, 2018
The French government has notified a high-profile Paris coding academy that it risks a fine of up to 1.5 million euros (about $1.7m) if it...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact