Request demo
Site language:
A biometric software product for increasing the level of security at the facility during video surveillance
A biometric software product for biometric identity verification in access control and management systems
A biometric software product for displaying personalized media content
A biometric software product with facial recognition for reliable identity check
A biometric software product with facial recognition that expands the electronic queue systems with personalized services for visitors
A software product that provides simple and reliable working time and attendance by identifying faces using tablets, IP cameras, or terminals
A biometric software product with robust user authentication for unlocking a device or gaining access to operating systems or apps
A biometric software product with facial recognition that provides enhanced communication with clients
A biometric software product that provides a reliable and quick check of the gym clients access right without employee’s participation
A new level of work with visitors and employees of Business centers opened with the help of biometric products
Biometrics for convenient service to citizens, including remote monitoring of the quality of personnel work
Biometric monitoring of working hours and additional security tools for industrial facilities
Modern methods of biometric analytics for safe operation of sports facilities
Convenient and secure transport solutions based on the digital identity of the passenger
Biometric solutions for a new level of security and interaction with visitors
Biometric video Analytics for targeted marketing and personnel control in distributed networks
Biometric products for proctoring and video surveillance systems in educational institutions
Keyless biometric access to rooms, targeted approach to each client and information about the time of work for employees
Necessary tool for the security and competitiveness of a modern Bank
Improving the level of security, speed of investigations and timely prevention of illegal acts in the urban public space
Customer-oriented solutions, acceleration of the work process of the registry area, control of the staff of the entire institution
RecFaces makes facial biometrics simple and applicable. We provide a wide range of ready-made biometric solutions for businesses to upgrade their security and technological efficiency.
We are ready for cooperation and sales through the partner network. To get advice on your project, please contact us by e-mail
It is our principal and invaluable resource. Talented and energetic people of our team unite the like-minded ones which helps to expand expertise and company’s growth.
Join us!
We are always happy to answer all your questions. Contact us in any way convenient for you.
We share our long-term expertise
in the development of biometric software.
Discover our latest news and updates
on facial recognition technology
Find out more about
RecFaces company here


A biometric software product for biometric identity verification in access control and management systems

Id-Gate is a software developed to enrich the functions of existing or new access control systems with additional modern functions using facial recognition technology

  • Fast installation in 20 minutes
  • Integrations with ACS
  • New authentication capabilities using virtual access points


9 integrations
with the solutions of leaders in the ACS development
> 100
of different call types for one fully functional integration
20 min.
to set up the solution using the installation package
More than 200
installations around the world
< 1 sec
to identify a person using a terminal or virtual access point
3 types
of terminal identifiers: face image, RFID-card, QR-code
1:N or 1:1
terminal works in both identification and verification modes for increased pass reliability
a set of built-in GDPR compliance techniques


Modern face recognition capabilities for access control systems without additional programming or expensive integrations:

RELIABLE access for employees and visitors using a face image, which is a unique and inalienable identifier

HIGH capacity of incoming groups is provided by fast contactless identification without RFID-cards

CONVENIENT guest access is provided by temporary activation of the visitor’s biometric profile, which grants entry to the organization without RFID cards

VIRTUAL ACCESS control points allow you to make records and send notifications about an employee passage in any significant place

New ACS capabilities are achieved by simple integration with modern facial recognition technology, saving configured access policies

Body temperature and mask CONTROL makes it possible to automate the process of information registration and respond to violations in due time


The business need
Technical consultation
Installation of the solution
Connection to ACS, import of profiles and access policies
Operation of the solution
20 min
to install Id-Gate


A free demo license is provided for 3 months to experience all the functionality of the solution at your facility.

For a demo, please fill out a request or contact our team at

how we improved our Id-Gate product


We are constantly improving Id-Gate and other solutions, making recognition systems more accurate and faster. Each updated release includes new functional and technological options that make the users’ work more convenient and efficient.

Software updates and technical support are provided as part of the support certificate.

Acs integration with facial recognition technology

The solution allows to enhance the capabilities of the classic ACS with additional modern functions using facial recognition technology without significant investments, ensuring the maintaining of ACS policies.

Do you want to have your ACS integrated with our SOLUTION? Let’s work together!

Id-Gate provides software integration with a list of access control systems, which is contanly expanding. All integration modules are available in the Id-Gate basic version.

If an ACS developer requires certification for integration, we are ready to undergo all the certification procedures. It allows us to consider the requirements of the ACS developer and provides additional conditions for reliable operation of the Id-Gate integration software module.


Unlike RFID cards, the solution operates with a biometric identifier of an employee or visitor that is unique and inalienable. It cannot be lost or transferred to another person. The identification of organization’s employees or visitors by face personalizes access, prevents from passing with someone else’s ID, increases efficiency of access control systems.

Key advantages:

Unique biometric identifier

Personalized access to the site


At critical facilities or specially protected areas, the use of several authentication methods at the same time increases the level of security. The solution allows you to implement multifactor authorization, complementing the traditional check of RFID, as well as QR-codes with all the capabilities of identity confirmation using facial recognition.

Key advantages:

Increased identification reliability

Authentication flexibility


The solution allows you to organize a quick and convenient pass using face identification mode without any cards. The identification of employees or visitors in the biometric terminal takes less than 1 second, providing high capacity, which is especially relevant during rush hours at the beginning and at the end of the working day.

Key advantages:

Identification takes less than 1 second

Queue reduction at the entrance/exit


The solution allows you to optimize the operation of the access control system according by prior request for new visitors or follow-up visits. The responsible employee provides photos and data about the visitor remotely, and the operator can activate temporary access for the guest through the checkpoint equipped with a terminal or camera.

Key advantages:

Optimization of the passing system

Remote data transmission, access activation


The solution supports the operation of terminals equipped with means of controlling the human body temperature. During each pass, together with information about the visitor, the temperature of a person’s body is automatically recorded in the log, as well as information about the presence of a mask. The operator can configure notification rules or site access restrictions by these parameters, if it is necessary.

Key advantages:

Automatic notification or pass restriction

Recording of all measurements and passes


The connection of surveillance cameras as virtual access control points allows you to display in the system the facts of people passages in areas where it is impossible to place turnstiles, lock cabins. It also provides control over the pass of several people with one pass card. The solution provides instant notification of the ACS operator in case of identification of unauthorized people.

Key advantages:

Pass control of several people by one RFID

Instant operator notifications


The solution automatically updates profile and policy data for all terminals according to the ACS rules for these access points. If the network connection is lost, the terminals still provide the passage of employees through the access point. After the connection is restored, all the pass data stored in the terminal is automatically transmitted to the solution server and the ACS.

Key advantages:

Automatic data transfer to the server and ACS

Providing continuous access for employees


A profile of a person is created in the system with a set of photos to maintain high accuracy of identification. During a long period of operation, the solution considers age of a person and other changes in appearance, automatically updates the photos of user profiles by removing one of the outdated photos from the profile and replacing it with the current photo obtained by the system.

Key advantages:

Always up-to-date profile photos

Automatically upload new profile information during operation


The solution operates only with biometric templates to perform identification operations. Reverse conversion of biometric template to employee photo image is impossible.

Data exchange in the solution is carried out by encrypted transmission protocols, which are https and wss.

Key advantages:

Compliance with secure coding standards

Encryption architecture and algorithms provide a high level of security


  • Information security of terminals is achieved by transmitting only non-personalized biometric templates and access lists to terminals

  • Virtual access control points based on surveillance cameras allow to organize security monitoring in areas where installation of physical access restriction devices is impossible

  • Convenient and fully documented API for integrations with client’s systems


Id-Gate is a ready-made software product distributed through the electronic license keys to the profile database (the core of the system), as well as to the source of biometric data (for example, a turnstile with installed video camera).

The technical support certificate includes incident analysis of the solution operation and regular software updates.

Camera license
Database license
Technical support
Learn more about recfaces biometric solutions
Training courses

Sign up for our Id-Gate introductory webinars.

To get guidance on your project, email us at

Biometric products to solve your business problems
Do you want to become our partner? Leave a request for your project and we will contact you.
All fields are required.

    We will send a password for the archive with files Security code to the archive.
    Thank you for your interest in our solution.
    Your request has been received and is being reviewed. We will get in touch with you on the next business day.