Suprema development tools

SMART Access & Identity 2023 Access Control & Identity Management, Integrated Solutions

Suprema has a range of tools to make it easier to integrate its products with third-party systems and solutions.

BIOSTAR 2 API

The BioStar 2 API is a comprehensive web application programming interface that provides the tools necessary for developers to create applications or integrate BioStar 2 into third-party software.

Build the perfect solution: BioStar 2 API provides everything that is needed to develop the perfect solution to meet your customers’ needs. Whether it be the integration of BioStar 2 into existing security software, or the development of a completely new security solution, BioStar 2 API provides the necessary tools.

More ways to do more: BioStar 2 API provides the tools to control devices, terminals, users, and biometrics. The API is a set of REST APIs, which uses JSON formatted data for requests and responses for easier understanding. BioStar 2 API handles complicated operations so that you can focus on the important things, like easily creating custom access control systems or integrating biometrics into third-party systems.

Ready to share, open source: All additional functionality, aside from access control features which are considered as core, are provided through the modularised app. Most of the apps provided are developed using BioStar 2 API and are available as open source, allowing them to be used as a developer reference for custom development. The extensibility provided through the API truly creates value and extends the versatility of the platform.

BioStar 2 anywhere: BioStar 2 API uses cloud-based technology to connect and manage the local BioStar 2 server remotely. A full set of REST APIs allows developers to build custom solutions or to easily integrate BioStar 2 into third-party software.

BioStar 2 inside: The compact, and yet powerful, BioStar 2 Server requires minimal computing resources, allowing it to be installed on multiple hardware platforms. This versatility, combined with API, helps to create new business models by incorporating features of BioStar 2 to existing systems such as time & attendance terminal, NVR, NAS, and IoT Hub for a complete security solution.

SUPREMA G-SDK

The Suprema G-SDK for integrating Suprema devices into third-party software is a lightweight, scalable, and cross-platform solution which expedites your development.

Multi-language support: By using gRPC, which is an open-source RPC framework, Suprema G-SDK lowers the barrier for developers by supporting a wide range of programming languages such as C++, C#, Java, Python, Objective-C, Go, JavaScript, and more. It helps developers, who are not familiar with a certain programming language, to integrate Suprema devices with their own applications by using languages they prefer.

Higher scalability: With Suprema G-SDK, you can control device connections via gateways. Suprema G-SDK supports connectivity of up to 1000 devices via a device gateway and a master gateway which supports up to 100 000 devices by coordinating multiple device gateways in parallel.

Greater performance: By adopting a protocol buffer mechanism, Suprema G-SDK brings about greater performance through its ability to handle extremely enhanced operations and more efficient data serialisation for faster data transfer for user management, event logging, etc. It increases speed performance by five to ten times when compared to BioStar 2 Device SDK.

BIOSTAR 2 Device SDK

Create powerful solutions: Use the BioStar 2 Device SDK to simply integrate and control biometric devices from third-party systems and enhance the security capabilities of a system by harnessing the power of true identity.

Multi-language and OS support: The BioStar 2 Device SDK supports multiple programming languages from C++, C#. It also supports Windows, providing a versatile programming environment.

Independent data structure and API: The BioStar 2 Device SDK uses a single unified structure and API for all different types of supported devices. The developer doesn’t have to use complicated branching statements, which simplifies development.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

You cannot bribe a computer
Access Control & Identity Management Security Services & Risk Management
Corruption is a cancer that destroys the prospects and stability of countries and businesses. It widens wealth gaps and punishes the poor. It costs countries many billions in lost revenue.

Read more...
Heightening physical security at military base
Turnstar Systems Access Control & Identity Management Government and Parastatal (Industry) Products
Turnstar Systems recently installed two 3-metre Velocity Raptor traffic spikes at the South African National Defence Force (SANDF) Randfontein military base on Gauteng’s West Rand.

Read more...
Zero Trust to dominate 2023
Cyber Security Access Control & Identity Management
Traditional ways of safeguarding data are no longer sufficient in 2023. Zero Trust has emerged as a more proactive way for businesses to keep their systems, data, and networks protected against compromise.

Read more...
Turnstar opens an office in the UK
Turnstar Systems News Access Control & Identity Management
Turnstar Systems recently established an office in the Greater Manchester borough in the North East of England, as part of the company’s ongoing expansion strategy.

Read more...
Enkulu Technologies to distribute Brazil’s Control iD
News Access Control & Identity Management Products
Enkulu Technologies has been appointed as the first South African distributor of Control iD products; a Brazilian company offering a T&A range of solutions based on its range of biometric products.

Read more...
HID Technology Seminar
Technews Publishing HID Global News Access Control & Identity Management Products
HID Global’s technology seminar introduced partners and distributors to the company’s new Signo range of readers and highlighted the benefits and global growth of mobile access credentials.

Read more...
Celebrating a successful year
Gallagher Technews Publishing News Access Control & Identity Management Products
Gallagher Security hosted an end-of year event at the Steyn City Equestrian Centre in which it thanked its partners for another successful year and provided a glimpse into what the company will be releasing in 2023.

Read more...
Innovation and service, 37 years and counting
Technews Publishing Impro Technologies Access Control & Identity Management Integrated Solutions
Innovation, simplicity and trust underpin the nearly 40 years of success of local access control brand, Impro Technologies, which is still run as an independent entity despite being acquired by ASSA ABLOY in 2016.

Read more...
Access control for one of Britain’s oldest boarding schools
Access Control & Identity Management Education (Industry) Products
In 2022, Christ’s Hospital School, which hosts 18 boarding houses on site, needed to replace its access control security system with a new solution that would be simple to manage and maintain.

Read more...
Improving safety and security
Gallagher Education (Industry) Access Control & Identity Management Integrated Solutions
Education facilities have more than enough to deal with when it comes to allocating budget. Security often seems to be the last item on the agenda but is more important than ever.

Read more...