FiveGT logo
Close Button
FiveGT logo

Face Recognition System

Face Recognition System



Introducing GTFR-5000

  • GTFR-5000
  • GTFR-5000

    GTFR-5000 Management program enables to manage time and attendance

    Gfacebot, a face recognition system made with Korean technology,
    is an state-of-the-art face recognition system that authenticates just by looking into the camera.
    Standing in front of the product, the face data is read by the infrared camera and compared with the face information stored in the inside.
    When it is an exact match, it is delivered to the access control device.
    Once authentication is finished, the robot unlocks the door lock and allows your entrance In addition, the infrared camera makes the color image of the visitor appear on the screen and is used for log recording.
    Face recognition products can be interlocked with security companies and can be used as standalone without interlocking

Features Details

      • Home Icon
      • IoT technology converged smart home

        Enhance home security by integrating with home IoT devices such as WallPad or CCTV

      • Human Icon
      • Convenient and quick use

        0.5~1 second face authentication after registration

      • Security Icon
      • Security accidents prevention

        Unable to tamper and duplicate via photo and video to prevent security accidents

      • Camera Icon
      • CPTED (Crime prevention through environmental design)

        Induce psychological burden on being photographed, blocks crime in advance

      • Phone Icon
      • Visitor Confirmation

        Check unregistered visitor on smartphone screen

      • Office Worker Icon
      • Convenient access/ attendance management

        Integration with access control, attendance management, salary management. Various reports functions

      • Authentication Icon
      • Hygienic contactless authentication method

        Stress-free disease-free contactless (as to fingerprints)

      • Notification Icon
      • Notification function

        In-house announcement through the screen

      • Icon
      • Easy on-site management

        Convenient control for large work force and remote location

      • Monney Icon
      • Economical and efficient access control

        User-friendly system to integrate in-house Internet phone and key phone functions

      • Encryption Icon
      • System Encryption

        Data and personal information protection through DB and image file encryption

      • Operation Icon
      • Operates Integrated system operation

        Integrated management of existing user manager system and access authentication system

  • Human Face icon
  • Next Generation Biometric Security System
  • contactless authentication method, It is a faster and more convenient system than other biometric technologies such as fingerprint
    iris, and blood vessel, The state-of-the-art system is the most effective as the face itself remains as a log history.
  • Human Face Chcek icon
  • Access and attendance management system
  • Easy installation and able to control access in standalone manner with wireless door lock and other lock devices, the device logs and saves images as history to deliver accurate attendance management function.
    Also, leaving photograph history of unauthorized visitor, it is effective for preventing crime. The device supports remote access function using call function to check the visitor's face
  • Phone Icon
  • Smartphone integration service
  • Supports access notification service through smartphone In addition to being able to view visitor records in real time,
    the device uses remote access function using call function to check the visitor's face.
  • Electric equipment
  • Integrated management program
  • Integrated management of multiple devices and users and remote device access and log check is possible with the provided integrated management program.
  • Router Icon
  • Various interfaces
  • Provides various external interfaces such as TCP / IP, RS-485, RS-232, GPIO port.

Standalone basic configuration


It is possible to install a standalone device to all entrances of home, office, officetel, and apartments to safely secure the entrance.
(Wireless door lock / Door lock device can be installed)

Standalone basic configuration

Basic network configuration


It is installed in network at the information desk or entrance of military institutions, public institutions, and large companies for security.

Basic network configuration

Product Specifications

ITEM Description
CPU CortexA8 based CPU Subsystem with NEON, 667MHz/800MHz
OS Android 2.1
RAM DDR2 256MB(32bit BW )
Camera CIS Dual Camera
COM I/O RS485, IEEE 802.11 b/g, ETHERNET 10/100Mbps
Security DUAL SAM Interface
Audio Mono
RFID Protocol ISO/IEC 14443A/B
Size TBD
Power 6W max. @ 12Vdc
Operating Temperature -20 ~ + 60 °C

Applicable Solutions