Functional characteristics
1、Equipped with the Independent patent development iris recognition chip Q10,adopted binocular iris module usb23;
2、High speed, high quality monocular / binocular iris image acquisition,time less than 2 seconds;
3、high safety, rapid iris recognition, time less than 1 second;
4、Type-C communication interface, plug and play,no additional power supply;
5、2.4inch LCD display screen, real-time display of iris images, auxiliary alignment registration and recognition;
6、Communicate with the upper computer with USB interface through TypeC to USB connection line;
7、Compatible with multi-system platforms such as Android, Windows and Linux;
8、Hand-held, ergonomic shell;
9、Equipped with table-type magnetic suction bracket, can be fixed to desktop to use and liberate hands.
Specification parameters
Model | L20 |
Interface | Type-C |
Function | iris registration, iris recognition, iris encryption and iris decryption |
Power supply | No external power supply |
Operational method | program control |
Acquisition method | Non-contact, automatic trigger |
Recognition method | Binocular or arbitrary monocular recognition |
Capture distance | 21~27cm |
Distance indication | Focus box display (blue please approach or stay away, green is OK) |
Average registration time | <2s |
Average recognition time | <1s |
User capacity | Unlimited |
Algorithm performance | complies with national standards Information security technology. Technical requirements for iris recognition system (GB / T20979-2007) |
Iris image quality | better than international standard of iris image quality ISO/IEC19794-6:2005 |
Auxiliary lighting standard | 2 * LED, wavelength of 780-870nm, complies with US standard ANSI RP-27.1-96 |
light of working environment | 0~10000Lux |
Operating temperature | -10℃~55℃ |
Operating voltage | 5V |
Working power | 3.5W |
Weight | 144g |
Dimensions | 76mm*81mm*41mm |
Usage | handheld usage or fixed mode |
Application scenarios
L20 can be widely used in file encryption and decryption, PC unlocking, system login authorization, software application authorization, data center encryption and other scenarios.