Suprema development tools

SMART Access & Identity 2023 Access Control & Identity Management, Integrated Solutions

Suprema has a range of tools to make it easier to integrate its products with third-party systems and solutions.

BIOSTAR 2 API

The BioStar 2 API is a comprehensive web application programming interface that provides the tools necessary for developers to create applications or integrate BioStar 2 into third-party software.

Build the perfect solution: BioStar 2 API provides everything that is needed to develop the perfect solution to meet your customers’ needs. Whether it be the integration of BioStar 2 into existing security software, or the development of a completely new security solution, BioStar 2 API provides the necessary tools.

More ways to do more: BioStar 2 API provides the tools to control devices, terminals, users, and biometrics. The API is a set of REST APIs, which uses JSON formatted data for requests and responses for easier understanding. BioStar 2 API handles complicated operations so that you can focus on the important things, like easily creating custom access control systems or integrating biometrics into third-party systems.

Ready to share, open source: All additional functionality, aside from access control features which are considered as core, are provided through the modularised app. Most of the apps provided are developed using BioStar 2 API and are available as open source, allowing them to be used as a developer reference for custom development. The extensibility provided through the API truly creates value and extends the versatility of the platform.

BioStar 2 anywhere: BioStar 2 API uses cloud-based technology to connect and manage the local BioStar 2 server remotely. A full set of REST APIs allows developers to build custom solutions or to easily integrate BioStar 2 into third-party software.

BioStar 2 inside: The compact, and yet powerful, BioStar 2 Server requires minimal computing resources, allowing it to be installed on multiple hardware platforms. This versatility, combined with API, helps to create new business models by incorporating features of BioStar 2 to existing systems such as time & attendance terminal, NVR, NAS, and IoT Hub for a complete security solution.

SUPREMA G-SDK

The Suprema G-SDK for integrating Suprema devices into third-party software is a lightweight, scalable, and cross-platform solution which expedites your development.

Multi-language support: By using gRPC, which is an open-source RPC framework, Suprema G-SDK lowers the barrier for developers by supporting a wide range of programming languages such as C++, C#, Java, Python, Objective-C, Go, JavaScript, and more. It helps developers, who are not familiar with a certain programming language, to integrate Suprema devices with their own applications by using languages they prefer.

Higher scalability: With Suprema G-SDK, you can control device connections via gateways. Suprema G-SDK supports connectivity of up to 1000 devices via a device gateway and a master gateway which supports up to 100 000 devices by coordinating multiple device gateways in parallel.

Greater performance: By adopting a protocol buffer mechanism, Suprema G-SDK brings about greater performance through its ability to handle extremely enhanced operations and more efficient data serialisation for faster data transfer for user management, event logging, etc. It increases speed performance by five to ten times when compared to BioStar 2 Device SDK.

BIOSTAR 2 Device SDK

Create powerful solutions: Use the BioStar 2 Device SDK to simply integrate and control biometric devices from third-party systems and enhance the security capabilities of a system by harnessing the power of true identity.

Multi-language and OS support: The BioStar 2 Device SDK supports multiple programming languages from C++, C#. It also supports Windows, providing a versatile programming environment.

Independent data structure and API: The BioStar 2 Device SDK uses a single unified structure and API for all different types of supported devices. The developer doesn’t have to use complicated branching statements, which simplifies development.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...