Biostar VP5200SS16 Administrator Guide - Page 283

face recognition

Page 283 highlights

Glossary distributed intelligence: In the BioStar system, the authorization database is distributed to each terminal, so that authorization is faster and can continue even when other parts of the system are offline. door: Doors are the physical barriers that provide entry into a building or space. At least one device must be connected to a door to provide access control, but two devices can be connected to support anti-passback and other features, such as door relays, alarm relays, exit switches, and sensors. duress finger: This term refers to an enrolled fingerprint that will activate silent alerts when a candidate is under duress. In the typical duress scenario, a perpetrator forces the candidate to gain access by force or threat of harm. The candidate gains access by means of his or her "duress finger," which allows access and simultaneously triggers the alarm or alert actions you specify. enrollment: The process of creating a user account and capturing images of fingerprints or issuing access cards. entrance limit: The maximum number of times a user can gain authorization to a specific area. The entrance limit can be related to a time period so that users are limited to certain number of entries during office hours, for example. ESSID: Extended Service Set ID. The ESSID is the name of a wireless network access point. It allows one wireless network to be clearly distinguishable from another. ESSID is one type of SSID (the other being BSSID). face recognition -The automated process of validating a claimed identity based on the image of a face. BioStar extracts and analyzes the facial features such as the skin texture and the shapes of the face, eyes, nose and mouth from a captured face image and compares them with those of all the registered persons. false acceptance rate: The false acceptance rate (FAR) is a measure of the likelihood that a biometric security system will incorrectly accept an access attempt by an unauthorized user. A system's FAR typically is stated as the ratio of the number of false acceptances to the number of identification attempts. false rejection rate: The false rejection rate (FRR) is a measure of the likelihood that a biometric security system will incorrectly reject an access attempt by an authorized user. A system's FRR is typically stated as the ratio of the number of false rejections to the number of identification attempts. fingerprint recognition -The automated process of matching two human fingerprints: one previously recorded and one being provided by a user for authentication. BioStar incorporates Suprema's awardwinning algorithms for recognizing fingerprints. fingerprint sensor: A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for fingerprint recognition. 283 Copyright © 2014, Suprema Inc. On the web: www.supremainc.com

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291

Glossary
Copyright
©
2014, Suprema Inc. On the web: www.supremainc.com
283
distributed intelligence:
In the BioStar system, the authorization database is distributed to each
terminal, so that authorization is faster and can continue even when other parts of the system are
offline.
door
: Doors are the physical barriers that provide entry into a building or space. At least one device
must be connected to a door to provide access control, but two devices can be connected to support
anti-passback and other features, such as door relays, alarm relays, exit switches, and sensors.
duress
finger
: This term refers to an enrolled fingerprint that will activate silent alerts when a
candidate is under duress. In the typical duress scenario, a perpetrator forces the candidate to gain
access by force or threat of harm. The candidate gains access by means of his or her "duress finger,"
which allows access and simultaneously triggers the alarm or alert actions you specify.
enrollment
: The process of creating a user account and capturing images of fingerprints or issuing
access cards.
entrance limit
: The maximum number of times a user can gain authorization to a specific area. The
entrance limit can be related to a time period so that users are limited to certain number of entries
during office hours, for example.
ESSID
: Extended Service Set ID. The ESSID is the name of a wireless network access point. It allows one
wireless network to be clearly distinguishable from another. ESSID is one type of SSID (the other being
BSSID).
face recognition
-The automated process of validating a claimed identity based on the image of a
face. BioStar extracts and analyzes the facial features such as the skin texture and the shapes of the
face, eyes, nose and mouth from a captured face image and compares them with those of all the
registered persons.
false acceptance rate
: The false acceptance rate (FAR) is a measure of the likelihood that a biometric
security system will incorrectly accept an access attempt by an unauthorized user. A system's FAR
typically is stated as the ratio of the number of false acceptances to the number of identification
attempts.
false rejection rate
: The false rejection rate (FRR) is a measure of the likelihood that a biometric
security system will incorrectly reject an access attempt by an authorized user. A system's FRR is
typically stated as the ratio of the number of false rejections to the number of identification attempts.
fingerprint recognition
-The automated process of matching two human fingerprints: one previously
recorded and one being provided by a user for authentication. BioStar incorporates Suprema's award-
winning algorithms for recognizing fingerprints.
fingerprint sensor
: A fingerprint sensor is an electronic device used to capture a digital image of the
fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to
create a biometric template (a collection of extracted features) which is stored and used for fingerprint
recognition.