TouchChip TCET Module on-board processor is used for Mobile ID Terminals, Single Sign-on, Time and Attendance, Point of Sale Security, Patient ID
TouchChip TCET Module Details
Easy to integrate
The TouchChip® TCET module is compact, cost effective and easy to integrate.
The on-board processor is used for capture and match, delivering fast and accurate results.
It can store up to approximately 100 user templates and supports USB, SPI or UART interfaces.
Power consumption is less than 100mA during capture and match.
For easy integration, the TCET module is fully assembled and tested — just connect and interface using simple commands.
The Enhanced Image Mode (EIM) optimizes image quality over a broad range of skin types and capture conditions.
The TCET module eliminates latent images during capture and offers ingress protection from dust and moisture penetration to IP65.
TouchChip TCET Module is Used for Mobile ID Terminals, Single Sign-on, Time and Attendance, Point of Sale Security, Patient ID
Supports WSQ and JPEG2000
The module supports WSQ and JPEG2000 compression with the appropriate Software Development Kit (SDK).
The TouchChip TCET module includes broad software support from leading algorithm providers, ISV’s and system integrators.
Whether you are an OEM or system integrator, HID’s biometric identity verification solutions provide a natural extension to your applications.
ESSENTIAL CONDITIONS OF FINGERPRINT READER
Fingerprint readers are used to securely verify identity
HID covers a wide range of products from the simplest for authentication on PC, network to the most complex of the LUMIDIGM series used by the FBI
The fingerprint scanner scans your fingerprint.
It can be used for many applications, including access control, license verification, criminal background checks, computer logon, etc.
Verification of the “liveliness” of a person, in practice verifying that the fingerprint is not a fake, which is performed via a computer system.
This control is usually used to counter fraud and identity theft.
The main categories of fingerprint matching techniques are minutiae-based matching and pattern matching.
Pattern matching simply compares stored images to see how similar they are.
Pattern matching is usually used in fingerprint systems to detect any duplicates.
See the document Powering Trusted Identities with Fingerprint Biometrics Brochure
Civil ID/Voting/Benefits Distribution
Logical & Physical Access Control
Mobile ID Terminals
Time and Attendance
Point of Sale Security
- Steelcoat®: Highest-durability or GoldCoat: FIPS 201 PIV certified
- Low power consumption
- Compact size
- IP65-rated top surface sealed against dust and liquid
- OS: Windows® 7, 8 and 10, Win CE, Linux®, Android™ and embedded systems (with or without OS)
SELECT THE OMNIKEY PRODUCT