FACIAL RECOGNITION INTEGRATION - TOUCHLESS BIOMETRIC AUTHENTICATION INTEGRATION.
This method of biometrics uses an algorithm to filter a human face from a video or photograph. Within milliseconds, the face’s characteristics are recorded and converted into a unique code. After this code matching process, facial recognition software compares the code to a database. If it finds a match, this can be used to identify the individual in the image and determine whether or not to allow access.
Service Facial Recognition
- Personal use
- Forensic search
- Mass surveillance
- Facial recognition in access control
Facial Recognition in Access Control
Having an application that combines a set of rules with real-time facial recognition is also used in an access control environment. Similar to the way you can unlock your phone while looking at it, security gates at airport customs will compare your face with your identification. In most cases, the software will grant you access to the country, but if you are not recognised as being the same person as the owner of the passport, you will have to prove it to the customs officers.
Facial recognition software is also found in other entrance solutions. Examples are mainly found on sites that require a high-level of security. But there is more to it as data generated by facial recognition software can be used for more than just opening a door or gate. One can think of knowing who to evacuate in the case of an emergency or regulating the office climate based on who is in the building.
How Facial Recognition Works in Access Control
How it Works
- Detect the face or faces in an image or video on approach (using an integrated smart camera)
- Extract the facial features to create a faceprint or face embedding
- Compare faceprints or face embeddings to determine whether there is a match.
- Deliver the result of the comparison or search to the access control system in the entrance to authorise or deny entry of that individual