Check out our special report on casino security
HID Crossmatch L Scan™ Master software development kit
Technical Specification
- Make: HID
- Model code: Crossmatch L Scan™ Master
- Reader Types: Biometric
- Operating System: Windows® XP 32 bit, tested with XP Service Pack 3, Windows® 7 with SP1 32 bit, 64 bit in WOW mode, tested with Windows 7 Service Pack 1, Windows® 8.1 32 and 64 bit
Capture fingerprint and palm print images through a non-hardware dependent biometric SDK Workflow management allows implementation of a structured process for biometric capture that matches the application requirement Workflows for ID Flats, ten-print, single finger, dual finger and palm capture, including handling of pre-captured fingerprints and/or missing fingers Workflow parameters and workflow steps can be changed and controlled dynamically at processing time, thus enabling a flexible adaption of application to all customer specific processing requirements User application receives status and error message during the capture process Configurable image file formats for PNG, WSQ, BMP, JPEG Flexible plug-ins infrastructure including out of the box implementations for quality and sequence check: standards for NFIQ (500 ppi) and Aware (500 + 1000 ppi)
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control software |
| Model code | Crossmatch L Scan™ Master |
| Reader Types | Biometric |
| System Requirements | Operating System: Windows® XP 32 bit, tested with XP Service Pack 3, Windows® 7 with SP1 32 bit, 64 bit in WOW mode, tested with Windows 7 Service Pack 1, Windows® 8.1 32 and 64 bit |
| Additional info |
|
More HID Access control software
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download
