![](https://static.wixstatic.com/media/6f5075_60e9ecca05d447b2b0cc78c547bf2551~mv2.jpg/v1/fill/w_1920,h_440,al_c,q_85,blur_2,enc_auto/6f5075_60e9ecca05d447b2b0cc78c547bf2551~mv2.jpg)
ALGORITHM
Technology > Algorithm
Finger Algorithm
![al1.jpg](https://static.wixstatic.com/media/6f5075_529f9620be724d5ba7509e2913c397fa~mv2.jpg/v1/fill/w_1152,h_550,al_c,q_85,usm_2.00_1.00_0.00,enc_auto/al1.jpg)
Finger
Algorithm
Version Fingerprint Algorithm V3.2
· Complying with BioAPI V2.0
· Supporting CBEFF(Common Biometric Exchange Formats Framework)
· Low FAR & FRR
· High-speed Authentication
Specification
Fingerprint Template Template size: 480 Bytes, Enrollment speed: 0.2second
Bio Data Comparison False Acceptance Rate(FAR): < 0.0001%, False Reject Rate(FRR): 0.1%,
Matching speed: 1/1,200second, Rotation range: 0 ~ 360°, Matching level: Three levels
Face Algorithm
![al2.png](https://static.wixstatic.com/media/6f5075_c6b51cb7602c4a298997533a1576af1f~mv2.png/v1/fill/w_58,h_27,al_c,q_85,usm_0.66_1.00_0.01,blur_2,enc_auto/al2.png)
Face Algorithm
· Convenient and competitive bio-recognition technology.
· Easily verifies user’s identity without physical contact.
· Stable face recognition even in situations of great illumination changes.
· The system for denying/accepting access via face recognition can be stored and used from
PDA, Mobile, PCs, and other image/video communication devices.
- To verify legitimacy of the user, mobile terminals and devices can store video information,
and use it’s own camera to observe and recognize if the user is authentic.
· Core technological ability to search multimedia databases.
· Variable use ranging from video recognition, proving identity, HCI (Human Computer
Interface), image searching, security, surveillance systems, and more.
· Can be versatile in usage in situations such as access control and diligence administration.