Developer checklist
This page describes the main points that developers should be sure to include in their implementations. Links go to the relevant section of our documentation.
Image size¶
Requirements listed here for size and compression.
Image requirements¶
Requirements listed here.
Pipeline selection¶
Pipeline selection controls the attack vector being queried. If you are calling one attack vector at a time via /check_liveness then you will need to specify the pipeline. The Screen Replay attack vector is used by default.
Pipeline naming¶
- All pipelines are named alphabetically. More recent algorithms will be closer to Z in the alphabet.
- All pipeline names end with a suffix indicating the attack vector they are intended for.
-sr
denotes the Screen Replay attack vector-pc
denotes the Printed Copy attack vector-ps
denotes the Portrait Substitution attack vector
Hardware recommendations¶
We recommend that integrators proceed with the c5.4xlarge
in AWS or equivalent hardware from another cloud provider. Integrators can proceed with the c5.xlarge
or equivalent as a low-throughput configuration. High throughput configurations are likely to benefit the most in cost-benefit by using an instance equipped with a GPU, such as the g4dn.xlarge
or equivalent.
Licensing¶
IDLive Doc operates with a license using a time-based cutoff. EVAL software is designed to cease operation 90 days from release, and PROD software has a 365 day limit. The expiration time can be queried using the API.
Developers and Product teams should plan on updating at minimum once a year to take advantage of the significant algorithm performance updates and security improvements.