HID Crossmatch L Scan™ Master software development kit
Technical Specification
- Make: HID
- Model code: Crossmatch L Scan™ Master
- Reader Types: Biometric
- Operating System: Windows® XP 32 bit, tested with XP Service Pack 3, Windows® 7 with SP1 32 bit, 64 bit in WOW mode, tested with Windows 7 Service Pack 1, Windows® 8.1 32 and 64 bit
Capture fingerprint and palm print images through a non-hardware dependent biometric SDK Workflow management allows implementation of a structured process for biometric capture that matches the application requirement Workflows for ID Flats, ten-print, single finger, dual finger and palm capture, including handling of pre-captured fingerprints and/or missing fingers Workflow parameters and workflow steps can be changed and controlled dynamically at processing time, thus enabling a flexible adaption of application to all customer specific processing requirements User application receives status and error message during the capture process Configurable image file formats for PNG, WSQ, BMP, JPEG Flexible plug-ins infrastructure including out of the box implementations for quality and sequence check: standards for NFIQ (500 ppi) and Aware (500 + 1000 ppi)
Read moreMake | HID |
---|---|
Manufacturer | HID |
Category | Access Control>Access control software |
Model code | Crossmatch L Scan™ Master |
Reader Types | Biometric |
System Requirements | Operating System: Windows® XP 32 bit, tested with XP Service Pack 3, Windows® 7 with SP1 32 bit, 64 bit in WOW mode, tested with Windows 7 Service Pack 1, Windows® 8.1 32 and 64 bit |
Additional info |
|
Download PDF version Download PDF version |
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download