Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Magic Point G2 is a small and good-looking smart face attendance access machine.

2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Equipment advantages: magic Point G2 integrates "smart attendance, visitor system, access control" and the new face recognition attendance access control. Compared with the previous square small D2, the magic point G2 has a great change in shape, oval appearance, the overall look is smaller and more beautiful.

The recognition method of Magic Point G2 uses the leading face recognition algorithm technology, achieving 99.99% financial payment-level accurate recognition. Usually, when you wear glasses, makeup, hat, hairstyle and other behavior changes, you can quickly recognize within 1 second and open the door automatically within 1 meter.

The anti-cheating technology of Magic Point G2 uses hybrid spectral technology with binocular cameras to effectively realize living recognition, using human faces as the "key" of access control, and preventing the use of photos and videos as recognition to open access guards. this effectively ensures the internal security of the enterprise or organization.

Magic Point G2 supports both online and offline recognition methods, and the device can store 3000 face photos.

Magic point G2 and nail attendance wisdom fusion, employees face scanning door can be completed at the same time attendance punch, to and from work more quickly and conveniently.

Magic Point G2 intelligent visitor access control, support intelligent reception and release, so that visitors automatically match permissions, intelligent notification, intelligent reception and release, greatly improve the efficiency of visitors' visit and reception, and export visitors' entry and exit records with one click. and Magic Point G2 will send a "Welcome" voice greeting to visitors. The outsiders of the enterprise no longer need to be conveyed through the front desk or doorman, but can be completed directly through the magic point G2 "unmanned receptionist".

Magic Point G2 access control products support unified management, unified distribution, automatic clearance of departure rights, to help enterprises to achieve intelligent office.

Magic Point G2 technical parameters:

Appearance size: high 164.3mm, wide 89.03mm, thick 13.54mm

Weight: 169.8G

Color: Gray

Installation mode: support wall, glass, doorpost and other installation methods

Hardware configuration:

Processor: 4 cores, 1.45GHz

Memory: 1GB

ROM:8GB

LCD:4'' inch, 800cm 600D iPS, touchscreen

Camera: 2 million HD pixels, 1amp 2.7 inch CMOS

Wifi:IEEE 802.11b/g/n,2.4GHz

Bluetooth: Bluetooth5.0+LE

Excuse for the whole machine:

1 white light fill light ring

1 infrared supplementary light ring

1 integrated cavity loudspeaker

1 G2 connection cable interface

1 system restart setup button (Restart)

1 system restore factory settings button (Reset)

HUB interface

1 G2 connection cable interface

1 MIR-USB

1 8pin terminal

1 RJ45 network port

Software parameters

Operating system Android 6. 0

There are 3000 faces.

10000 offline records

The recognition distance is within 1 meter

Living recognition support

Face recording on mobile phone supports input of face on mobile phone.

Fittings

Power adapter × 1

Power cord × 1

Hanging wall piece × 1

G2 connection line × 1

Hub × 1

8Pin terminal × 1

Screw x 5

Expansion tube? 60 × 30 × 2

Three-pack card x 1

Operating instructions × 1

3M glue × 1

Working environment

Operating temperature-10: 40 ℃

Power consumption of whole machine

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report