RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Suprema BioStar 2

Product
Developers: Suprema
Last Release Date: 2015/03/11
Technology: MCDS - Access Control and Control Systems,  Application Development Tools

Content

BioStar 2 - software for configuring biometric devices. Suprema

Simple, easy-to-administer, platform for creating network access control systems with the ability to configure and manage the system via a web interface from desktop and mobile devices. Support in the system up to 1 thousand devices (compatibility with readers with the V2 prefix). A powerful web service API simplifies the integration process with system extensions and third-party applications.

2025: Sigur System Integration

and Integration Sigur Suprema enables access control with biometric the terminals. The solution will be relevant for companies with increased security requirements where methods are needed. multifactor authentication Sigur announced this on July 11, 2025. Initial configuration is performed through Suprema BioStar 2 software, after which you can manage biometric templates directly from. Sigur Software More. here

2019: Giant biometric data leak of millions of people in Britain

In mid-August 2019, researchers at information security company VPNMentor discovered the leak of more than a million fingerprints and other sensitive data. Employees of the firm claim to have accessed biometric data from Biostar 2 software.

Biostar 2 is used by thousands of companies around the world, including London Police, to control access to protected facilities. Suprema, the developer of Biostar 2, claims to be already dealing with this problem. Open data found on August 5 disappeared from the network on August 13, VPNMentor reported. However, no one is taken to assert during what period of time this data was publicly available.

Biometric data of millions of people turned out to be vulnerable on the network

Along with fingerprint records, the researchers note, they found photos of people, facial recognition data, names, addresses, passwords, employment history and records of visits to protected objects. Many affected are concerned that Suprema has not reported a possible data breach so its customers can take action on the ground.

Researchers who discovered the data had difficulty trying to report the leak to Suprema. They tried to call the offices, but the Suprema staff simply hung up. In total, 23 gigabytes of data containing almost 30 million records were found on the network. Researchers note that biometric information can never become confidential after such a leak.

Among the companies whose data ended up online were Power World Gyms, a gym in India and Sri Lanka (113,796 user records, including fingerprints), Global Village, an annual festival in the UAE (15,000 fingerprints), Adecco Staffing, a Belgian recruitment company (2,000 fingerprints). Most of all, the leak affected British users and companies - millions of personal records were freely available.[1]

2014

Software screen on SVT displays, 2014

Система Архитектура Web-сервер
Операционная система Windows
База данных SQLite
Максимальное количество подключаемых устройств 1000
API сервера Restful API
Передача гиперданных Поддерживается
Число одновременно подключенных клиентских станций 100
Контроль доступа Число рабочих графиков Не ограничено
Число групп/уровней доступа 128
Макс. число групп для каждого пользователя 16
Макс. число отпечатков пальцев на каждого пользователя 10
Администратор оборудования Поддерживается
Мониторинг событий Журнал событий в режиме реального времени, статусы устройств, статусы точек доступа, история тревожных событий
Дополнительные функции Панель управления Поддерживается
Преобразование в файл для печати Данные пользователя, устройства, точки доступа, журнал событий, история тревожных сообщений
Автоматическая синхронизация данных (пользователи, группы доступа) Поддерживается
Автоматическое обновление серверного ПО и прошивок оборудования Поддерживается

Software properties

  • The modular architecture of the platform provides scalability that helps meet any high security policy requirements.

  • The most ergonomic BioStar 2 platform is convenient and easy to administri­rovanii. By automatically synchronizing data, any changes to the server are directly applied to the end devices.

  • The BioStar 2 control panel displays the main MCDS indicators: event logging, system information, notifications and alarm messages. These tools provide rapid and convenient analysis and monitoring of system states and events.

  • The web interface allows users to connect to BioStar 2, both from stationary workstations and from mobile devices (tablets, smartphones, etc.) The web interface provides system invariance with respect to the operating system and the browser used.

  • The hardware discovery feature allows the BioStar 2 platform to automatically detect all devices connected to the network. Web server architecture significantly reduces deployment time - there is no need to install software on client workstations.

  • BioStar 2 automatically receives notifications of system updates through the data cloud. This feature allows you to automatically update the server software, and the hardware firmware can be updated in one click via the built-in interface.

  • Access level and group settings allow you to easily implement the features of an arbitrarily complex security policy.

  • The modular architecture of the BioStar 2 platform allows you to easily and quickly expand and improve the existing system as soon as such a need arises.

  • Powerful web services API for easy integration.

  • The BioStar 2 web service API creates a comfortable environment for easy integration with both third-party applications and system extensions.

  • To improve security, client devices in BioStar 2 connect via secure HTTPS. The communication channels between the server and the end devices are protected by the AES encryption algorithm, with a unique key used for each connection.

  • BioStar 2 works with user biometric data in the form of shablo­nov. The templates are also encrypted to maximize the protection of biometric information. Other sensitive data, such as a PIN or password, is protected by SHA encryption.

BioStar 2 Topology, 2014