Displaying present location in the site.

Overview and Features

Bio-IDiom KAOATO

Operation Image

Advantages of Face Recognition

Easy-to-understand log display

You can keep not only text but also images as logs to recognize "when, where, who entered (visited) the shops". Also, you can check the images in the log lists, and register specific persons at ease.

Operating cost reduction

After installation, it is necessary to register face images to the system. However, the amount of effort can be decreased by using the captured images as described above. Hence, running cost can be reduced.

Features

NEC's facial recognition engine called "Bio-IDiom" with the world-acknowledged accuracy of facial recognition is adopted.

No. 1 in face recognition benchmark testing by the U.S. National Institute of Standards and Technology (NIST) multiple times to date.

  • *
    NIST evaluation results do not constitute an endorsement by the U.S. government of any particular system, product, service, or company.

Automatic registration of additional face images when performing identity verification operations

The system is equipped with a function that automatically registers additional facel images when an identity verification operation is performed. This function helps improve the authentication score for the next authentication.
This function creates a cycle in which the more the system is used, the higher the authentication rate, and the more convenient entry/exit can be experienced nonstop.

Support a variety of different cameras

You can select a variety of cameras depending on your usage such as Web cameras, network cameras, analog cameras, near-infrared camera, etc.

Facial Recognition without having to choose the location of the camera

When cameras need to be installed in locations where uncontrolled areas, such as other people's property, are visible, the camera can be used to mask the areas where they are visible.
This allows for the hiding of information that is not allowed to be reflected, thereby reducing the burden of information management.

Excellent security

After the images have been encrypted and saved, they are automatically deleted in a certain period of time. Furthermore, the facial images can be checked only by authorized users.

High availability with minimized system failures

In a private cloud configuration, even if the database information on the server becomes inaccessible, the registration information stored on the edge side is used to continue operation.
In addition, during communication failures, face recognition record data is also stored on the edge and transferred to the database information upon recovery, so that no authentication records are lost.
In addition to communication and hardware failures, the system is also equipped with a health check function that automatically recovers in the event that the face recognition application itself terminates abnormally.

Reduce HDD capacity

You can save HDD capacity since the log is stored as images rather than pictures.

Flexible scalability

The system can be installed in a small-scaled structure with several cameras. Then cameras can be added upon users' demands.

Services for each user's needs

You can keep not only text but also images as logs to recognize "when, where, who entered (visited) the shops". Also, you can check the images in the log lists, and register specific persons at ease.

Customized cases

  • Connecting to a special camera
  • Linking to external device
  • Entering various sensor information