The Watchlist works as the following:
The term Watchlist can be applied to both a Lookout scenario as well as a Verification scenario. The Lookout scenario is normally used in conjunction with a criminal or terrorist scenario while Verification can be used for employees or known personnel. The Face Lookout System provides for the creation of multiple Watchlists from still images, recorded images, or live images that are captured.
10.1 inch touch screen face recognition access control machine Model: P102 Size:10.1-inch Application scenarios It is suitable for office area, hotel, passageway gate, office building, school, shopping mall, store, community, public service and management project, etc. ...
Come From Shenzhen Jieyi Technology Co., Ltd.
ST-F005 is a face and fingerprint recognition time attendance device, using multiple identification methods:face+fingerprint+password.ARM9 industrial computing core, fast operation, good stability, large storage flash, data storage security worry free. The equipment panel is ...
Come From Shineacs Technology Limited
Overview: ST-F501 is a face recognition and fingerprint timeattendance access control machine, using multiple identification methods: face +fingerprint+password +ID/IC (optional). The use of ARM9 industrial computing core, fast operation, good stability, large storage flash, ...
Come From Shineacs Technology Limited