Skip to product information
1 of 9

Evolve Security Products (Speed Gates, Turnsiles)

EvolveFaceAi 5

EvolveFaceAi 5

Regular price £577.00
Regular price Sale price £577.00
Sale Sold out
Shipping calculated at checkout.

The worlds first multiple face detection AI camera up to 5 people.

Face recognition access control systems use facial biometrics to identify individuals, allowing or restricting access based on stored data. Here are the main types:

1. 1:1 Face Verification (Authentication)

  • Compares the captured face to a specific, pre-enrolled image or database entry (e.g., matching an employee’s face to their stored profile).
  • Commonly used in environments requiring a known individual, like employee access control systems.

2. 1


Face Identification (Recognition)

  • Scans the face and searches within a large database of images to find a match.
  • Useful in places where users are not pre-registered but need access, such as public transport or retail.

3. Face Detection Only

  • Simply detects the presence of a human face without identifying or verifying the person.
  • Used as a first layer in multi-factor access systems, or to trigger further authentication methods.

4. Liveness Detection

  • Ensures that the captured face is from a live person, not a photo or video.
  • Uses techniques like blinking or facial movement detection and is often layered with other face recognition types to prevent spoofing.

5. Thermal & Depth Mapping Face Recognition

  • Combines face recognition with depth or thermal imaging to verify the 3D structure of a face.
  • Often found in high-security environments, as it’s more resistant to spoofing techniques using 2D images.

6. Emotion-Based Recognition

  • Analyzes emotions or expressions alongside identity verification.
  • Less common but sometimes used for customer interaction feedback in retail or monitoring access control environments for signs of stress.

7. Cloud-Based Face Recognition Access Control

  • Stores face data in a cloud server, allowing cross-location access and management.
  • Allows remote monitoring and management, often used in large enterprises or smart city applications.

8. Offline Face Recognition Systems

  • Operates without requiring internet access, with all data stored locally.
  • Ideal for high-security areas or places where connectivity is unreliable or undesirable for security reasons.

9. Hybrid Access Control Systems

  • Combines face recognition with other biometric methods like fingerprints or iris scanning.
  • Useful for multi-layer security in highly controlled access environments (e.g., labs, banks).

Each type of face recognition access control serves a unique purpose based on security needs, environment, and privacy considerations.

View full details