Many developers are modernizing the building especially at the checkpoint to equip it with facial recognition capability to increase the security level. The urgency becomes higher during the COVID19 lockdown as the need to reduce human interaction become higher.
With the adoption of this technology, any incoming or outgoing tenants will have to scan their face against a digital face frame. This device is connected to the main server where it holds the identification / images of all the tenants including video footage. The algorithm was able to identify the facial model of the individuals and runs a match within the database as stated above. If the match tally, access is granted. Otherwise, access is denied. The result can be obtained in a split second with high accuracy.
When the visitor scans their face, the image of the face is captured and analysed. The image processing technology read the geometry of your face and track the points between the eyes, the depth of the eye sockets, the distance from forehead to chin and the shape of your cheekbones. These physical traits will not change and is essential to distinguishing your face. Once these points are draw out it is turned into mathematical formula and the numerical code is called a face paint and store in the main server for matching purpose.
With the high reliability technology of facial recognition, the time that the visitor check-in, and check-out can be recorded in a breeze. The physical logbook can now be eliminated. There is save time for hassle flip through the papers to locate an empty slot and record their temperature. In addition, if you want to set a time limit to restrict the time that the visitor can stay in the premise you are able to configure it with minimal hassle. Examples: The security personnel can pre-set the time that the visitor can stay, when the time is up, the alarm will be triggered, and the security can be prompt to action such as giving the visitor a call to check on his status. Chance are once the alarm triggered; it symbolizes an act of overstaying.
Next the question of “How about using access card?”. As mentioned previously, access card makes use of the Radio Frequency Identification (RFID) technology which is the use of radio frequency waves to transfer data. A single Radio Frequency Identification access card may be programmed to work with many locks each potentially having their own access policies. This saves someone from having to carry many keys while still allowing the eight locks to be unlock. The danger lies on misplacing the access card which is caused much inconvenience. In the event of a lost access card, you will need to report the loss. Even if you retrieve the card, there is also a possibility of the card being duplicate by someone who is tech-savvy thus setting the premise to a security breach. In fact, it cost as low as RM10 to replace an access card with certain store offering this service and the time taken is only 5 seconds. Before you report a loss card, there is a possibility of someone cloning your card and return it to you. In order not to be lured into a false sense of security, we are offering our facial recognition technology for safer access and higher confidentiality.