We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Facial Recognition Solution.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Facial Recognition Solution Product List and Ranking from 4 Manufacturers, Suppliers and Companies

Facial Recognition Solution Product List

1~7 item / All 7 items

Displayed results

[Case Study] Facial Recognition Solution

Real-time facial recognition with just the camera! A facial recognition solution that can also perform face detection verification.

We would like to introduce a case study of our "Facial Recognition Solution." The customer's challenge was that they had to put down their belongings and input a key or PIN code. However, by implementing our product, they were able to verify their identity simply by facing the device, allowing for easy and smooth entry and exit. 【Case Study】 ■ Challenge - Had to put down belongings and input a key or PIN code ■ Implementation Effect - Identity verification by simply facing the device - Easy and smooth entry and exit *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Surveillance Cameras
  • Surveillance Camera System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FR facial recognition solution 'GV-AI FR'

The video from the network camera is sent to the server, where face detection and authentication are performed.

"GV-AI FR" is facial recognition software that meets new needs. It sends images from network cameras to a server, where face detection and authentication are performed. 【Features】 ■ Face detection/authentication, age and gender judgment ■ Aggregation of face recognition results ■ Notifications via LINE Notify and external devices (I/O) ■ Welcome screen display ■ Search for authentication results *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Surveillance Cameras
  • Surveillance Camera System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Facial recognition solution 'WelcomID Alcohol Checker'

Achieve routine in digital operations! Easy and effortless, continuing every day.

We would like to introduce our facial recognition solution, "WelcomID Alcohol Checker." We offer the facial recognition interface terminal "WelcomID" and the alcohol detector "Tanita ALBLOFC-1200." It is possible to export data in a standard Excel format, and with an option for cloud data management, you can manage multiple locations collectively. 【Features】 ■ Digitalize management processes with facial recognition ■ No need to launch a PC or app during inspection ■ Space-saving with no PC required ■ Easy data storage with linked information ■ PC integration for data management *For more details, please refer to the PDF document or feel free to contact us.

  • Other measurement, recording and measuring instruments

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Case Studies on the Use of Embedded Devices: Face Recognition Spoofing Prevention Solutions

Support for resolving concerns in embedded development with facial recognition! Two case studies included.

In this document, we introduce case studies of embedded development using facial recognition for "spoof prevention features" that contribute to enhanced competitiveness and product value. We present examples of integrating these features into "inspection equipment" to strengthen security functions, and into "ATMs" to enable non-face-to-face identity verification and account opening. Additionally, we explain the "facial recognition spoof prevention solution" that does not require a database or network, which also contributes to enhancing product value. We encourage you to read it. 【Contents】 ■ Changes in the environment surrounding equipment manufacturers ■ What is facial recognition for "identity verification" used by operators utilizing production equipment and measuring instruments? ■ Collection of case studies on embedded development ■ Introduction to NEC's facial recognition spoof prevention solution *For more details, please refer to the PDF document or feel free to contact us.

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Why do inspection irregularities occur? An explanation of the reasons and countermeasures.

Explaining the reasons and countermeasures for unauthorized occurrences! How to protect a company's brand and trust: <Face recognition impersonation prevention solution>

When products are shipped without conducting inspections based on UL standards, and quality issues are pointed out, it is viewed as "inspection fraud" by customers and society. Inspection fraud not only lowers the quality of workers but also damages the company's brand and reliability, so companies must make every effort to prevent such fraud from occurring. We explain the basic points of what inspection fraud is, the causes of its occurrence, and countermeasures in the related link's column, so please take a look. Additionally, the catalog introduces use cases for preventing inspection fraud using face recognition spoofing prevention solutions. Please check that as well.

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is the purpose of creating a list of qualified individuals? We will also introduce some points to consider when operating it.

Information on qualified personnel that companies should be aware of. A detailed explanation of its purpose! <Face recognition impersonation prevention solution>

If qualified personnel can be managed appropriately, it can lead to improvements in the quality of the products being manufactured. Additionally, by keeping track of qualified personnel, it can prevent unqualified individuals from being involved in critical tasks (such as quality inspection and management operations). We have explained the purpose and management methods for managing qualified personnel in the related link's column, so please take a look. In the catalog, we also introduce initiatives to prevent "quality result tampering" and "inspections by unqualified personnel" using face recognition anti-spoofing solutions. Please check that as well. *For more details, please refer to the PDF materials or feel free to contact us.

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

"Numerous implementation results from hospitals to large commercial facilities" AI facial recognition solution.

Advanced facial recognition evolved through AI learning! It detects only the target individuals.

Our company offers the facial recognition system 'LYKAON-i', which achieves a level of authentication accuracy closer to human vision by incorporating an AI learning-based facial recognition engine. There is no need to carry authentication cards or memorize PIN codes, allowing for stress-free use. This also minimizes the need for personnel deployment for security, leading to cost reductions. Additionally, concerns about human errors such as distractions, misunderstandings, and forgetfulness are alleviated, enabling a greater focus on work. 【Features】 ■ Authentication similar to "human vision" through deep learning ■ Authentication at diagonal angles ■ Real-time notifications ■ Intuitive operation ■ Storage of video for a certain period ■ Information security *For more details, please download the PDF or feel free to contact us.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration