Software product biometric facial identification for security purposes with using video stream
Software product for enriching the biometric capabilities of access control systems
The software product for displaying personalized media content
Software product biometric facial identification for security purposes with using video stream
Software product biometric facial identification for security purposes with using video stream
Software product, which expands the toolset of the electronic queue terminal through biometric identification
Software product that provides reliable staff monitoring hours through biometric identification
Reliable and trustworthy biometric control access to operating and information systems
Software product that provides an increased level of targeting by employing biometric identification
Software product that provides a reliable and quick check of the gym clients access right without employee’s participation
A new level of work with visitors and employees of Business centers opened with the help of biometric products
Biometrics for convenient service to citizens, including remote monitoring of the quality of personnel work
Biometric monitoring of working hours and additional security tools for industrial facilities
Modern methods of biometric analytics for safe operation of sports facilities
Convenient and secure transport solutions based on the digital identity of the passenger
Biometric solutions for a new level of security and interaction with visitors
Biometric video Analytics for targeted marketing and personnel control in distributed networks
Biometric products for proctoring and video surveillance systems in educational institutions
Keyless biometric access to rooms, targeted approach to each client and information about the time of work for employees
Necessary tool for the security and competitiveness of a modern Bank
Improving the level of security, speed of investigations and timely prevention of illegal acts in the urban public space
Customer-oriented solutions, acceleration of the work process of the registry area, control of the staff of the entire institution
RecFaces makes facial biometrics simple and applicable. We provide a wide range of ready-made biometric solutions for businesses to upgrade their security and technological efficiency.
We are ready for cooperation and sales through the partner network. To get advice on your project, please contact us by e-mail
This is our main and invaluable resource. Experts in facial biometrics and just good people
We are always happy to answer all your questions. Contact us in any way convenient for you.


The software product for biometric identity verification in access control and management systems

Id-Gate – is a software developed to enrich the functions of existing or new access control systems with additional modern functions using facial recognition technology

  • Fast installation in 20 minutes
  • Integration with the ACS
  • New authentication capabilities with virtual access points


9 integrations
with the solutions of leaders in the ACS development
> 100
different types of calls for one full-function integration
20 min
to install the solution using the installer
More than 200
installations around the world
< 1 sec
takes identification of a person on the terminal or virtual access point
3 types
of terminal identifiers: face image, RFID-card, QR-code
1:N or 1:1
terminal operation in both identification and verification mode for increased pass reliability
built-in privacy protection mechanisms


Modern face recognition capabilities for access control systems without additional programming or expensive integrations

RELIABLE access for employees and visitors using a face image, which is a unique and inalienable identifier

HIGH capacity of incoming groups is provided by fast contactless identification without RFID-cards

CONVENIENT guest access is provided by temporary activation of the visitor’s biometric profile and provide access to the organization without RFID cards

VIRTUAL ACCESS control points allow to register and notify if an employee or visitor passed at any significant place

New ACS capabilities are achieved by simple integration with modern facial recognition technology, saving configured access policies

Body temperature and mask CONTROL allows to automate the process of information registration and respond to violations in due time


The need for a solution
Technical solution development
Installation of the solution using the installer
Connection to ACS, import of profiles and access policies
Operation of the solution
20 min
Id-Gate installation takes


A free demo license is provided for 3 months to experience all the functionality of the solution at your facility

To get our support on setting up a demo for your business task, you can fill out a request or email us at

How we improved our Id-Gate product


We are continuously improving Id-Gate and our other solutions, making recognition systems more accurate and faster. Each updated release contains new functional and technological features that make the users’ operation even more convenient and efficient

Software updates and technical support are provided as part of the support certificate

Acs integration with facial recognition technology

The solution allows to integrate the capabilities of the classic ACS with additional modern functions using facial recognition technology, ensuring the retention of ACS policies, without significant investments

Do you want to have your ACS integrated with our SOLUTION? Let’s work together!

ID-GATE provides software integration with Bosch Security System (BIS), DormaKaba Exos, Honeywell Pro-Watch, Kone Access, Lenel OnGuard, Schneider Electric EcoStruxure Security Expert, Bolid Orion Pro, RusGuard, Sigur, the list of integrations is expanded. All integration modules are available in the base version of Id-Gate

If there are certification procedures of ACS manufacturers integration modules, we will pass these certification procedures. It allows us to consider the requirements of the ACS developer and provides additional conditions for reliable operation of the Id-Gate integration software module

integration with world leaders

In contrast to RFID cards, the solution operates with a biometric identifier of an employee or visitor that is unique and inalienable, it cannot be lost or transferred to another person. Identification of the organization’s employees or visitors by face image personalizes access prevents from passing with someone else’s ID, increasing efficiency of access control systems

The main advantages of this function are:

Unique biometric identifier

Personalized access to the site


At especially important objects or specially protected areas, the use of several authentication methods at the same time increases the level of security. The solution allows to implement multifactor authorization, complementing the verification of traditional RFID, as well as QR-codes with all the capabilities of identity confirmation using facial recognition

The main advantages of this function are:

Increased identification reliability

Flexibility of authentication organization


The solution allows to organize a quick and convenient pass using face identification mode without using cards. Identification of employees or visitors at the biometric terminal takes less than 1 second, providing high capacity, which is especially relevant during rush hours at the beginning and at the end of the working day

The main advantages of this function are:

Identification tales less than 1 second

Shortening queues at the entrance/exit


The solution allows you to optimize the operation of the pass system according to the preliminary request of a person for new visitors or follow-up visits. The responsible employee provides photos and data about the visitor remotely, and the operator of the pass office can activate temporary access for the guest through the checkpoint equipped with a terminal or camera

The main advantages of this function are:

Optimization of the permit system

Remote data transmission, access activation


The solution supports the operation of terminals equipped with means of controlling the human body temperature. During each pass, together with information about the visitor, the temperature of a person’s body is automatically recorded in the log, as well as information about the presence of a mask. The operator can configure notification rules or site access restrictions by these parameters, if it is necessary

The main advantages of this function are:

Automatic notification or pass restriction

Logging of all measurements and passes


The connection of surveillance cameras as virtual access control points allows to display in the system the facts of people’s pass in places where it is impossible to place turnstiles, lock cabins. It also provides control over the passage of several people with one pass. The solution provides instant notification of the operator in ACS in case of identification of unauthorized people

The main advantages of this function are:

Pass control of several people by one pass

Instant operator notifications


The solution automatically updates profile and policy data on all terminals according to the ACS rules for these passage points. If the network connection is lost, the terminals will provide the passage of employees. After the connection is restored, all the pass data, stored in the terminal, will be automatically transmitted to the solution server and ACS

The main advantages of this function are:

Automatic data transfer to the server and ACS

Providing the seamless passage of employees


To maintain high accuracy of identification, a profile of a person creates in the system with a set of attached photos. In a long period of operation, considering age and other changes in appearance, the solution automatically updates the photos of user profiles by removing one of the outdated photos from the profile and replacing it with the current photo obtained by the system

The main advantages of this function are:

Always up-to-date profile photos

Automatically upload new profile information during operation


During the operation, the solution operates only with biometric templates to perform identification operations. Reverse conversion of biometric template to employee photo image is impossible
Data exchange in the solution is carried out using encrypted transmission protocols – https and wss

The main advantages of this function are:

Compliance with secure coding standards

Encryption architecture and algorithms provide a high level of security


  • Information security of terminals is achieved by transmitting only non-personalized biometric templates and access lists to terminals

  • Virtual access control points based on surveillance cameras, allow to organize security monitoring in areas where installation of physical access restriction devices is impossible

  • Convenient and detailed documented API for integrations with client’s systems


Id-Gate is a ready-made software product that is distributed by transferring electronic license keys to the profile database (the core of the system), as well as to the source of biometric data (for example, turnstile with installed video camera)

The technical support certificate includes incident analysis of the solution and regular software updates

License for video cameras
Database license
Technical Support certificate
Learn more about recfaces biometric solutions
Training courses

Sign up for our introductory webinar on the Id-Gate product

To get guidance on your project, email us at

Biometric products to solve your business problems
Do you want to become our partner? Leave a request for your project and we will contact you
All fields are required.

    We will send a password for the archive with files Security code to the archive.
    Thank you for your interest in our solution.
    Your request has been received and is being reviewed. We will get in touch with you on the next business day.