When we run seminars on security we often run a series of simple identification games like the one above. We find that approximately one person in every 500 has the ability to identify unknown people. Imagine the task now of identifying a list of hundreds of banned patrons and known high risk individuals at an entry point where hundreds or thousands of individuals pass through every day. The reality is, without reliable facial recognition it is virtually impossible.
Quality Facial recognition, when installed correctly and using camers at correct heights and angles will provide a 99.9 percent accuracy.
Extreamly high levels of accuracy are even capable in outdoor environments and large crowd environments. The secret to success is:
- Three Dimensional quality Facial Recognition algorythms
- Correctly configured cameras and software
- Camera locations that are designed to provide appropriate fields of view.
Access Control Applications
Access control is only as secure as a lost card, misplaced card, stolen card or person influenced to open the door. Additionaly tailgating (a person entering with card holder) poses another breachin the access control system.
Some systems get around this with adding pin codes to the access doors however this still does not stop a person borrowing a card and getting the pin code, or a person opening the door under duress.
Facial Recognition provides cerrification that the person presenting the access control card is in fact the person authorised to enter the premises. Additionally we c an also identify if more than one person enters the door but only one person has presented a card.
Facial recognition is a simple affordable addition that significantly improves site security.
Facial Recognition can integrate into most security management systems, it can operaate with a database of known high risk individuals, It has the ability automatically identify and then notify appropriate people.
Facial recognition free's up security staff to manage situations effectively. When configured correctly it can be used to track high risk individuaols throughout a facility, this can also be used to track multiple offenders throughout a facility. This is a task that is difficult for security operators but simple for technology.
The ability to run a face back through the video database to see when a person has previously entered a facility allows forensic search of offenders when they were in the planning phase. This can sometimes include the image of an armed offender so they can be recognised days earlier without thier balaclava or mask.
We provide access cards to contractors and visitors. Often the contracting companies will send different tradespeople and sub-contractors to sites to conduct works. Often the access card can be used by multiple individuals and often multiple companies. This behaviour that asks the question?
- Has the card holder completed the site safety induction
- Does the card holder have the required safety licenses (working at heighs etc)
- Has the contractor or subcontractor been vetted (criminal history check etc)
- People onsite with no high visibility clothing
- If a person falls over and does not get back up
The Elephant in the Room - PRIVACY !
We all use facial recognition, a lofty statement but lets look at normal everyday facial recognition use:
- Passing through an international airport
- Signing in to you computer
- Signing in to your phone
- Entering a facility that has a visitor management system
- Entering a nightclub (mandatory in many cities)