Product Details
Place of Origin: China
Brand Name: HOMSH
Certification: ISO9001
Model Number: L20
Payment & Shipping Terms
Price: Negotiated
Delivery Time: 5-8 work day
Payment Terms: T/T
Product Number: |
L20 |
Product Size (L*W*H): |
76*81*41mm (bracket Height Is 109mm) |
Product Features: |
Iris Collection, Iris Registration, Iris Recognition, Iris Encryption, Iris Decryption |
Display Screen: |
2.4 Inches, Resolution 240*320pixel |
Camera: |
Iris: 2MP |
Working Distance: |
Iris: 21cm~27cm |
Collection Method: |
Non-contact, Automatic Trigger |
Identification Method: |
Iris |
Average Registration Time: |
<1s |
Average Recognition Time: |
<1s |
Communication Method: |
Type-C |
Working Temperature: |
-10°C~55°C |
Working Environment Humidity: |
0~93%RH, Non-condensing |
Voltage: |
5V |
Product Number: |
L20 |
Product Size (L*W*H): |
76*81*41mm (bracket Height Is 109mm) |
Product Features: |
Iris Collection, Iris Registration, Iris Recognition, Iris Encryption, Iris Decryption |
Display Screen: |
2.4 Inches, Resolution 240*320pixel |
Camera: |
Iris: 2MP |
Working Distance: |
Iris: 21cm~27cm |
Collection Method: |
Non-contact, Automatic Trigger |
Identification Method: |
Iris |
Average Registration Time: |
<1s |
Average Recognition Time: |
<1s |
Communication Method: |
Type-C |
Working Temperature: |
-10°C~55°C |
Working Environment Humidity: |
0~93%RH, Non-condensing |
Voltage: |
5V |
Binocular Iris Register : High Security, Fast Iris Recognition, Recognition Time ≤ 1s
Description
L20 is a safe and easy-to-use iris identification terminal product developed by Hongshi Technology for the field of digital information security. This product can be connected to the host computer through the USB interface to identify the iris of the human eye, realize the encryption/unlocking of PCs and mobile terminals, and the login and authorization functions of application software.
This device is especially suitable for computer login unlocking and data encryption in national defense and public safety.
Features
1. Equipped with iris recognition chip QX10 independently developed by independent patent, using USB binocular iris module usb23; (invention patent number ZL 201410430535.2)
2. High-speed, high-quality single/binocular iris image acquisition, acquisition time <1s;
3. High security, fast iris recognition, recognition time ≤ 1s;
4. Type-C communication interface, plug and play, no need for additional power supply;
5. 2.4-inch LCD display, real-time display of iris images, assisting registration and identification of registration;
6. Compatible with Android, Windows, Linux and other multi-system platforms;
7. Ergonomic design, can be used by hand;
8. Equipped with a desktop magnetic bracket, which can be used on a fixed desktop and free your hands;
Specifications
category | Specifications |
Product number | L20 |
Product size (L*W*H) | 76*81*41mm (bracket height is 109mm) |
Product Features | Iris collection, iris registration, iris recognition, iris encryption, iris decryption |
display screen | 2.4 inches, resolution 240*320pixel |
Camera | Iris: 2MP |
working distance | Iris: 21cm~27cm |
collection method | Non-contact, automatic trigger |
Identification method | iris |
user capacity | unlimited |
average registration time | <1s |
average recognition time | ≤1s |
False Acceptance Rate (FAR) | 10-7 |
False Rejection Rate (FRR) | 10-3 |
Infrared Safety Standard | Conforms to American standard ANSI RP-27.1-96 Conforms to European standard IEC/EN62471 |
Core Algorithm Performance | Conforms to the national standard "Technical Requirements for Iris Recognition System of Information Security Technology" (GB/T20979-2019) |
Iris Image Quality | Comply with the national standard GB/T33767.6-2018 iris image data |
communication method | Type-C |
Working temperature | -10°C~55°C |
working environment humidity | 0~93%RH, non-condensing |
Light intensity of working environment | 0~6000Lux (non direct sunlight) |
voltage | 5V |
How to use | Handheld or desktop (with stand) use |
Operating Tips | LCD prompt, voice guide |
Application Scenario
L20 can be widely used in file encryption and decryption, PC power-on unlocking, system login authorization, software application authorization, data center encryption and other scenarios.