Install¶
IDLive Face SDK is distributed as a tar archive for Linux releases, and as a zip archive for Windows ones. You need to extract this archive, for example you can use these commands:
mkdir /opt/idliveface
tar xf facesdk/releases/1.29.0/facesdk-linux-v1.29.0-x64-gcc5.4-neh-openvino-eval.tar.gz \
-C /opt/idliveface --strip-components=1
Expand-Archive facesdk-windows-v1.29.0-x64-msvc141-neh-openvino-eval.zip -DestinationPath .
Move-Item facesdk-windows-v1.29.0-x64-msvc141-neh-openvino-eval C:\idliveface
This documentation assumes you've installed the SDK to /opt/idliveface
(or C:\idliveface
on Windows), but you're free to select any other directory. Note that commands above remove an intermediary directory from the archive.
The directory with the SDK should look like this:
$ ls -F /opt/idliveface
3rdparty/ data/ docs/ examples/ include/ libs/ README.txt
PS C:\> Get-ChildItem C:\idliveface
Directory: C:\idliveface
Mode LastWriteTime Length Name
---- ------------- ------ ----
d---- 4/11/2022 6:33 PM 3rdparty
d---- 4/11/2022 6:33 PM data
d---- 4/11/2022 6:33 PM docs
d---- 4/11/2022 6:33 PM examples
d---- 4/11/2022 6:33 PM include
d---- 4/11/2022 6:33 PM libs
-a--- 4/2/2022 11:03 PM 3279 README.txt
It contains the following directories:
3rdparty
– Licenses for the third-party open source software that is used by the SDK.data
– Data files needed for IDLive Face.docs
– API documentation.examples
– Code examples and sample images that demonstrate how to use the SDK.include
– Headers for the IDLive Face C++ and C APIs.libs
– IDLive Face native libraries and language wrappers.
Verify archive ¶
If you want to verify that the downloaded IDLive Face SDK archive is authentic and wasn't corrupted or tampered in any way, you can check its signature.
Follow these steps to verify the archive with the gpg utility:
-
Download the ID R&D public key.
-
Import the key:
gpg --import idrnd.pub
-
Trust the key. For this run the key editor:
gpg --edit-key auto@idrnd.net
At the
gpg>
prompt, typetrust
, then type5
for ultimate trust, theny
to confirm, and thenquit
. -
Verify the archive using the signature:
gpg --verify facesdk-linux-v1.47.0-gcc7.5-eval.tar.gz.sig
If the archive is authentic, the gpg will report that the signature is Good:
gpg: assuming signed data in 'facesdk-linux-v1.47.0-gcc7.5-eval.tar.gz'
gpg: Signature made Mon Oct 10 10:59:51 2022 UTC
gpg: using EDDSA key 449B7C4E7F9890922585AFFA0CE43577A976B0E6
gpg: checking the trustdb
gpg: marginals needed: 3 completes needed: 1 trust model: pgp
gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
gpg: next trustdb check due at 2027-10-09
gpg: Good signature from "ID R&D Technical Account (Release Signing) <auto@idrnd.net>" [ultimate]