What is Failover and Why is it Important

Failover is a function that automatically switches to a standby server, database or network when failure of the primary system is detected. Failover prevents server downtime, data loss and system failure. It can protect mission-critical data 24/7 with no downtime.

READ MORE


Hardening Guide: Ensuring Server Security

Servers hold confidential organizational data and information. An insecure server is vulnerable to all sorts of security threats and data breaches. Security vulnerabilities can lead to the loss of critical data or loss of control and capability that can jeopardize the whole organization.

READ MORE


Guideline for Installation and Enrollment

​This article is intended to guide the installation and enrollment of FaceStation F2. To enhance the user experience and achieve exceptional authentication accuracy, it is highly recommended to comply with the guidelines.

READ MORE


Guideline for Face Authentication

​This article is intended to guide face authentication. Some advice for face authentication of users wearing masks also include. To enhance the user experience and achieve exceptional authentication accuracy, it is highly recommended to comply with the guidelines.

READ MORE


How To Cleanly Use And Disinfect Suprema Products

This article is intended to guide on how to clean or disinfect the Suprema products hygienically and safely. Additionally, it covers items that must be understood when cleaning the product.

READ MORE


Suprema's fingerprint recognition algorithm against dry fingerprints

In either cold or dry environments, the state-of-the-art fingerprint sensor applied to Suprema's products demonstrates performance that far surpasses other companies’ fingerprint sensors. With its state-of-the-art fingerprint sensor and superlative algorithm, Suprema provides performance that is about 31 times higher indoors and about 19 times higher outdoors than other companies’ products.

READ MORE


Security Threats to Face Authentication and FaceStation 2 Technology

The authentication through face authentication is as prone to spoofing as fingerprint-based methods. Is its security also vulnerable to similar methods?

READ MORE


Suprema Multi-dynamic Range (MDR) Technology

Compared to the fingerprint access control devices installed in a fixed position, fingerprint authentication scanners are more likely to be used in a varied positions and locations. Suprema’s patented MDR technology is available in selected BioMini models, namely BioMini Plus 2, BioMini Combo and BioMini Slim. MDR technology delivers greater benefits to mobile authentication applications where fingerprint scanners are connected with mobile devices in varied locations and positions.

READ MORE


BioStar 2 and Web Security

This article explains the differences of the two security protocols (HTTP and HTTPS) that are being by used by BioStar 2, which is a web-based security platform, and explains the reason why HTTPS should be used.

READ MORE


Hyper Data Transfer for BioStar 2

The available memory bandwidth and increasing CPU performance outpace that of I/O devices. As a result, handling the I/O operations perfectly is the key point for designing a system architecture. For this reason, the BioStar 2 server adapted an asynchronous system architecture for handling network I/O operations. Before taking a deep look into the asynchronous system architecture, let’s understand the synchronous system architecture first.

READ MORE


New Image Compression Technology of SFM5500 Series

The SFM5500 series overcame this problem and have been equipped with the new technology to compress fingerprint images and quickly send high quality images via a low bandwidth network environment. When compressing, the quality degradation is minimized (Figure 2), but the data size is lowered by 90%, reducing the time it takes to be sent by 90%, as well. Moreover, you can set the system to compress images in different levels, enabling you to appropriately adjust the transfer speed and the image quality according to its use.

READ MORE


Next Generation Verification Scanner, BioMini Slim

BioMini Slim, the world’s thinnest PIV certified FAP20 optical scanner, is made using key optical technology, image acquisition and algorithms accumulated over 10 years. It is a new concept scanner overcoming the available environmental limits of existing scanners and is optimized for the mobile environment.

READ MORE

Multiple sub-IDs of FaceStation

Face authentication is gaining much more attention relative to other biometric recognition technologies due to not only the simple convenience it provides but also its ability to avoid various privacy issues. As facial information is publically displayed, there is little concern for a user to show his face to the device.

READ MORE


Suprema's Fingerprint Algorithm

Suprema has developed a fingerprint verification algorithm, which has been proven to be one of the most advanced technologies in Fingerprint verification contest (FVC). It is the core technology of our company, which can be applied to the embedded module, PC authentication library, and various application products.

READ MORE


Adaptive IR Illumination Technology for Face Authentication

Variations in background illumination have always been one of the main challenges for a practical face authentication system. Active illumination based face authentication techniques are considered to be one of the most promising and practical methods used to solve illumination issues in indoor applications.

READ MORE


Smart Enrollment Technology for Face Authentication System

Human face is one of the most common and non-intrusive biometrics used to identify individuals. It is much more universal, acceptable and easier to access than a fingerprint. Recently, the use of face authentication technology in cooperative biometric systems such as access control, time & attendance and PC security is increasing.

READ MORE


How to clean fingerprint sensors

The fingerprint sensors can be soiled by user’s fingers, dust, or other sources. This contamination may affect image quality, degrading authentication performance.

READ MORE


RS-485 Wiring Guide

RS-485 signaling relies upon balanced and differential signaling scheme, and has many advantages over unbalanced signaling such as RS-232, such as strong noise immunity and multi drop configuration capability. These are the most frequently-asked questions on using RS-485 signaling systems, which are worth reading before designing a RS-485 BioStar network system.

READ MORE


Proper Use of Relays

This article is intended to introduce a basic application guide for relays in access control devices. Additionally, a means to prevent undesired arcing in relay contacts is proposed, to suppress unintended radiation and maintain relay lifespan.

READ MORE