You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* @brief Specifies the maximum number of consecutive spoofing attempts allowed before the device rejects further
414
+
* authentication requests.
415
+
*
416
+
* Setting this value to 0 disables the check, which is the default behavior. If the number of consecutive spoofing
417
+
* attempts reaches max_spoofs, the device will reject any subsequent authentication requests. To reset this
418
+
* behavior and allow further authentication attempts, the device must be unlocked using the Unlock() API call.
419
+
*/
420
+
unsigned char max_spoofs = 0;
392
421
};
393
422
```
394
423
395
424
Notes:
396
-
* If ```SetDeviceConfig()``` never called, the device will use the default values described above.
397
-
*```SetDeviceConfig()``` can be called once. The settings will take effect for all future authentication sessions (until the device is restarted).
425
+
* If ```SetDeviceConfig()``` never called, the device will use the default values described above.
398
426
*```CameraRotation``` enable the algorithm to work with a rotated device. For preview rotation to match, you'll need to define previewConfig.portraitMode accordingly (see Preview section).
399
427
400
428
The following example configures the device to only detect spoofs (instead of the default full authentication):
0 commit comments