This component allows to easily integrate and use the SmartCards ACOS3/3X/NFC with fingerprint management in your software (minimum WD14). • Choice of the reader (contact and/or NFC) • Connection / D... |
Updated on 09/05/2014 Downloaded 1,569 time(s) |
| |
The EZFGP component can use a wide range of fingerprint readers, based on the UPEK engine. There are a lot of firms using it, as EIKON, ACS, ROYAL, etc... You will be able to easily scan, compare, dig... |
Updated on 12/01/2014 Downloaded 629 time(s) |
| |
This component has been created in order to allow a COMPATIBLE encryption between WINDEV, WEBDEV, and WINDEV Mobile. You will be able to transfer encrypted data between the software you had created. R... |
Published on 06/20/2014 Downloaded 452 time(s) |
| |
Management of Futronic fingerprint scanners EZFGP has been developed to answer to a security need in order to protect sensitive data, access control, people recognition. It is fully compatible with ... |
Published on 06/12/2016 Downloaded 421 time(s) |
| |
This component and its example allow to scan a signature from WACOM pads whose type are STU-300 / 4X0 / 5X0, to link it to a document and to be able to check its authenticity regarding this last. The ... |
Updated on 03/30/2020 Downloaded 333 time(s) |
| |
Text and files encryption using the AES – I – II – III protocol EZAES has been developed in order to bring a solution for security needs, when protecting sensitive data is mandatory either on storag... |
Updated on 05/02/2014 Downloaded 284 time(s) |
| |
Text and files encryption using the TwoFish I - II - III protocol EZTWF has been developed in order to bring a solution for security needs, when protecting sensitive data is mandatory either on stora... |
Updated on 05/02/2014 Downloaded 218 time(s) |
| |
Text and files encryption using the DES / 3DES (Triple DES) protocol EZDES has been developed in order to bring a solution for security needs, when protecting sensitive data is mandatory either on s... |
Updated on 05/02/2014 Downloaded 180 time(s) |
| |
Text and files encryption using the Anubis I to VII protocol EZANS has been developed in order to bring a solution for security needs, when protecting sensitive data is mandatory either on storage, ... |
Updated on 05/02/2014 Downloaded 122 time(s) |
| |
Text and files encryption using the KHAZAD protocol EZKZD has been developed in order to bring a solution for security needs, when protecting sensitive data is mandatory either on storage, either on... |
Updated on 05/02/2014 Downloaded 120 time(s) |
| |