The YOUR TECH Blog

Facial Recognition in Homes & Businesses

Facial Recognition in Homes & Businesses

With today’s high definition security cameras facial recognition is not just for the X-Box any more! Technology can be integrated to identify not only faces but objects. While the technology isn’t yet available as an out of the box solution, Your Tech specializes in integrating facial recognition into systems for all types of uses. Contact us now if you want the technology of the future in your hands today!

Smart Home Uses:

While a sensor-based automation system is useful, it is at best limited, and we believe facial recognition imaging technology – while much more complex – is a more sustainable and intelligent solution that will take the connected home to a whole new level. Of course any automation system can co-exist with sensors in private areas and cameras in common areas for more advanced functions.

PERSONALIZATION
Think of your smartphone’s home screen or your personal computer: You’ve hopefully customized the settings exactly how you like them and you find they are completely different from the settings of even your spouse’s electronics. Now, imagine your home being that customized. The remote has your favorite channels and music, the color of the lights, the position of the window shades and even the artwork on the wall is to your preference all without even pressing a button because the smart home knows it’s you in the room. The personalization feature can customize any system under the control of your home automation system. The applications are limitless.

MOOD ENHANCEMENT
An elaborated version of personalization, the cameras determine and set your home’s mood based on yours.

PEOPLE COUNTING
Cameras can count the number of people in the home and automatically activate a scene based on that number, Likewise when that number goes down the home can go back to the normal scene.

LAST KNOWN LOCATION
Some of our customers homes are quite literally large enough to get lost in. If you ever wonder what part of the home a family member is near check the last known location in the app.

DETECTION OF UNWANTED INDIVIDUALS  
One of the most common applications is identifying individuals who provide a risk. Using a watch-list database or objects including weapons and ski masks, as well as other facial recognition blocking techniques. Facial recognition can be used to identify these individuals quickly from the live security surveillance cameras.

ACCESS CONTROL  
Face recognition can also be used for access control solutions. This can include physical building security where face recognition is used as part of the entry process to the home or a secure storage space such as a liquor cabinet, study or safe. A positive match in the database triggers the opening of the door, allowing the individual entry.

 

Smart Business Uses:

VIP CUSTOMERS
Identify VIP customers in real time, sending an alert to staff that someone is in immediate need of doting service. Being able to identify VIP guests immediately could enable the front desk staff to have room information pulled up before the guest steps up to the registration desk and be able to greet the guest by name. This capability helps enhance a VIP guest’s experience through personalization of services and increases customer satisfaction with the business.

MONITORING
Waiting is an annoyance, The time management solution measures the flow of individuals between multiple points, providing information on the number of individuals and the time between points. The system is configured with certain parameters, enabling it to monitor queuing times and estimate waiting times. The solution can then trigger alerts to help reduce queue lengths and times, improving the customer experience.

BUSINESS INTELLIGENCE 
Face recognition can also be used to monitor, measure and collect data about people in a specific area to gather priceless intelligence to improve business activities and operations. For example, this can include counting people, age, gender, facial expressions and time in the area. This data can even be used dynamically to trigger a real time event such as changing a message or content on digital signage.

DETECTION OF UNWANTED INDIVIDUALS  
One of the most common applications is identifying individuals who provide a risk. Using a watch-list database or objects including weapons and ski masks, as well as other facial recognition blocking techniques. Facial recognition can be used to identify these individuals quickly from the live security surveillance cameras.

ACCESS CONTROL  
Face recognition can also be used for access control solutions. This can include physical building security where face recognition is used as part of the entry process to the building or a secure storage space. A positive match in the database triggers the opening of the door, allowing the individual entry. In addition, the system can identify any other people trying to enter on the back of an approved individual.

SECURE AREA  
Secure area monitoring works in identifying individuals within a specific area. If an individual is not matched in the database, then they are instantly identified as a risk or threat. Alerts can then be sent.

 

How it Works?

Security cameras are integrated with identification software that monitors the live camera feeds, matching images against a database. If it spots a match, an alert can be sent out to contacts or otherwise just trigger a event. Different events or notifications can be programmed based on the software’s certainty of the database match.

The matching process can take less than a second, meaning Donald Trump will barely have a chance to get into the store before receiving immediate doting service.

Adding a new face or object to the facial recognition database is easy as uploading a photo or series of photos for additional certainty in the automated matching process. Additionally, you can use past recordings to add a person that was their prior.

 

More info on Facial Recognition from others:

Wikipedia – Wikipedia’s encyclopedia offers extensive reading on Facial Recognition and components.

2 Responses to Facial Recognition in Homes & Businesses

  1. […] GANGWAY ACCESS The system tracks and identifies objects and people around the vessel’s passerelle when the vessel is alongside and the gangway is extended. The system is paired with a access control pedestal placed on the dock while docked. If an unauthorized person steps on the gangway or other areas of the boat, audible notifications and lights can be activated from both the boat and dock pedestal in addition to event commands such as door lock down or notifications. The system can be paired with facial recognition in lieu of the dock pedestal. Click here to read more […]

Leave a reply

Topics

Keep up to date:

Your Name (required)

Your Email (required)

Subscribe to Your Tech's:
BlogNewsletter

*Note*
Your Tech sells consulting, programming and installation services for technology components in all 50 states and the Caribbean. Licensure requirements, for wiring, vary by location. One of our team members will act as your personal representative to make recommendations, get bids and negotiate contracts, on your behalf, with licensed contractors to wire your home in preparation for our technology.

css.php
Your Tech Logo