FAQ

Biometric facial recognition systems are used in a wide variety of fields and uses:

  1. Security of buildings and premises: Facial recognition systems are widely used in institutional, industrial and commercial buildings, and are used for access control and security. The systems enable the identification and verification of people through the uniqueness of their facial structure, so that unauthorized access can be prevented and people who are not authorized to enter the premises can be identified.
  2. Crime prevention: Biometric facial recognition systems can be used to recognize the faces of motorists or suspected criminals in a public place. The systems are able to alert in real time on the identification of relevant people to the police or security systems.
  3. Attendance management: Facial recognition systems can be used in businesses and organizations to manage and monitor employee attendance. Instead of using stamp cards or codes, the systems allow identifying the employees by recognizing their faces, thus ensuring accurate attendance and monitoring of the hours they work.
  4. Car-sharing technologies: Facial recognition systems may be used in the field of car-sharing technologies. They make it possible to identify and verify the driver through his facial recognition, thus allowing him access to the personalized contents in the vehicle such as the personalized coverage settings, radio and music, and more.
  5. Digital Identity Verification: Facial recognition systems can be used in online systems and digital services to verify identity. For example, during online payment operations or access to secure systems, facial recognition systems can be integrated as part of the digital authentication process, in order to make sure that the person behind the operation is really the person who declares his identity.
  6. Personal user experience: facial recognition systems can also be used as part of the personal user experience in the field of technology. For example, smart phone devices and mobile computers may use facial recognition systems to authenticate the user and provide security

There are several reasons that may lead to public reluctance to use biometric technologies such as facial recognition.

  1. Privacy: the use of biometric technologies, and in particular facial recognition, can in some cases violate people’s personal privacy. The photographs and biometric data collected can be exposed to unauthorized use or potentially legal uses that can compromise people’s privacy.
  2. Inaccuracy: Biometric technologies are not perfect and can introduce inaccuracies. It is possible that errors in identification will lead to blocking people whose identity is correct or allowing people whose identity is not correct. This may cause reluctance and insecurity in biometric technologies.
  3. Exploitation and Fraud: The biometric information collected may be vulnerable to exploitation and fraud. Possibilities of data theft, improper use or transfer of biometric information for the purpose of trust deeds may cause reluctance and insecurity in the use of biometric technologies.
  4. Discrimination and social influence: Using biometric technologies can lead to discrimination and social influence, especially when specific groups lose the ability to recognize or beware of certain actions or places. This is how situations of cultivating a culture of unequal security and inequality can develop.

It is important to note that despite this reluctance, the benefits of biometric technologies regarding information security, quick and convenient identification, and reducing risks from a wide body of non-attacks. The right balance must be found between the need to secure people’s privacy and the benefits of technology.

The basic answer is no! Facial recognition software can be integrated into various processes with standard and available hardware.

Of course, each system has different work providers and different loads. In access control systems we will require a normal computer (CPU) IP camera with RTSP transmission capability regardless of the manufacturing company. Normal / reasonable resolution. and facial recognition can be performed.

This ability allows us to make use of mobile phone cameras, laptop computers, webcame, doorbell/intercom.

In Biosurveillance systems, higher computer power (GPU) is required. This is in light of the data collection load and the rapid identity verification required. Beyond that, no special equipment is required.

The basic answer is no! Facial recognition software can be integrated into various processes with standard and available hardware.

Of course, each system has different work providers and different loads. In access control systems we will require a normal computer (CPU) IP camera with RTSP transmission capability regardless of the manufacturing company. Normal / reasonable resolution. and facial recognition can be performed.

This ability allows us to make use of mobile phone cameras, laptop computers, webcame, doorbell/intercom.

In Biosurveillance systems, higher computer power (GPU) is required. This is in light of the data collection load and the rapid identity verification required. Beyond that, no special equipment is required.

The immediate answer is yes, but there are various caveats.

Identification / access control systems for facilities, devices, and systems will usually work on a one-to-one basis (an ID and a facial image) or one-to-many, only a facial image.

If we are in a facility where there are multiple pedestrian crossings, vehicle entrances / parking lots, areas with different classification levels. After all, our system knows, based on one register database, to open each door or passage according to a different method according to the customer’s needs (entering the parking lot – only with the help of a facial image, entering the server room – facial image and a smart card as a second factor.

It all depends on the level of importance.

It is also possible to integrate facial recognition into the mobile phone, and with the help of the obtained result (dynamic QR) open a door by scanning the barcode.

In large organizations, we integrate our systems into the organization’s servers, thus enabling them to perform identification processes from anywhere and in any method they wish.

We differentiate the use of the Biosurveillance system into a separate system in light of its “different” uses, the need for different hardware, and the way its alerts are transmitted.

At the same time, the system is used by us to back up access control systems for monitoring sensitive areas and preventing entry to those who are not approved for entry. Not only from security aspects, but also from safety aspects.