The ievo ultimate is a CPNI certified
fingerprint scanner that combines an industry-leading multispectral
imaging sensor with advanced security features.
Employing a high-performance multispectral imaging (MSI) sensor, theultimatedelivers
a cutting-edge biometric solution,simultaneously reading data from
both the surface and subsurface levels of a fingerprint even when
features are hard to distinguishdue to factors such as dirt, moisture
With advanced encryption for data transmission, the ultimate fingerprint reader provides a highly accurate and quality image toreliably allow the ievo Control Board to perform 1:N matching of up to 50,000 (10,000 as standard)
fingerprint templates. The readerunit itself does not store any user
data for an additional level of protection.
Featuring an IP65 rating and built-in environmental controls, the ultimate reader is designed for external deployment and remains operational over time in harsh weather conditions.
Supporting proximity detection and clear LED and audio indications, the
reader offers simplicity along with convenience to the user.
Theultimatefingerprint reader is IP (Ingress Protection) rated to industry standard 65:
Totally protected against dust ingress.
Protected against low-pressure water jets from any direction. Limited ingress permitted.
With this rating, the ultimate is ideal for external and internal installations and harsh environment use.
the advanced multispectral imaging sensor to enable a fingerprint image
to be obtained even when some levels of dust, dirt, oils, creams or
cosmetics are present on the skin; and also through some types of latex
gloves. The ultimate provides a robust solution to work for you.
- Certified for Government use in the UK by the Centre for the Protection of National Infrastructure (CPNI) the ievo ultimate provides
resistance to fake and spoof fingerprint attacks by using the
industry’s best liveness detection sensor to capturedetailed data from
the surface and subsurface levels of a fingerprint.
- ievo readers have been designed to assimilate with a large number of
security systems via existing protocols. The system can be integrated
into a host of access control systems and other security products for