AccSoft Face Recognition
Contact with us for any advice
Call Us
0773 436 536
Face Recognition
User capacity -Face 1,000, Palm 1,000 Cards 1,000
Transaction storage – 150,000
Communications – RS485, TCP/IP, USB pendrive, WIFI
Face RecognitionSpeed – <= 1s Power Supply – 12VDC/3A Temperature operating – 0℃—45℃
Humidity operating – 20%—80%
Language – English
Size – 72.94(L)*157.94(W)*23(H)mm
Introduction
TimeTr@ck-FA3000 Face Recognition Reader has the following characteristics on the basis of summarizing 2020/2021 / edition:
– Enhanced Visible Light Facial Recognition
– Anti-spoofing algorithm against print attack (laser, color and B/W photos), videos attack and 3D mask attack
– Better hygiene with touchless biometric authentication, masked individual identification increases FAR
– Multiple Verification: Face / Palm / Card / Password
– Recognition distance: 0.3-2 meters
– TCP/IP and WIFI network function included.

Here are some key features and benefits of our face recognition readers:
Trust AccSoft Solutions to provide you with reliable face recognition time recorders from TimeTr@ck. We pride ourselves on delivering quality solutions that meet the unique needs of businesses in Sri Lanka.
Our readers use advanced algorithms to ensure accurate and reliable identification of individuals based on their unique facial features. Say goodbye to manual check-ins and the potential for errors or manipulation.
With face recognition technology, you can eliminate the practice of “buddy punching” where employees fraudulently punch in or out for one another. Each employee’s face becomes their unique identifier, ensuring that only they can access the system.
Our face recognition readers are designed with a user-friendly interface, making it easy for employees to use without any extensive training. The intuitive system simplifies the attendance tracking process and saves time for both employees and administrators.
Face recognition technology offers an added layer of security by eliminating the need for access cards or passwords that can be lost, stolen, or shared. Each employee’s face becomes their secure credential, ensuring only authorized individuals gain access.