On November 29th, Fordham University hosted a conference entitled, “Ethical Vision Artificial Intelligence: Creating an Effective AI Compliance Framework” in New York. The conference was hosted by Professor Shlomit Yanisky-Ravid, a visiting professor at Fordham Law School and a Fellow Professor at Yale Law School.
Ethical-legal AI guidelines
“This is our first step toward the establishment of a forum that will discuss, propose and advance ethical-legal AI guidelines for future regulations,” said Professor Yanisky-Ravid. “In light of the rapid and constant growth in uses of AI and lack of regulations, we are holding this international conference that addresses the challenges and solutions.”
“A recent report unveils that sensitive facial recognition technology is being adopted by law enforcement across the globe, including U.S. law enforcement agencies that are increasingly using body-worn cameras, which may challenge and potentially violate human and civil rights of citizens when paired with facial recognition abilities.”
Transparency and accuracy of AI systems
Establishing ethical-legal principles should be based upon fairness, equality, privacy, responsibility, accountability"
Prof. Yanisky-Ravid noted, “Our goal is to fill the existing gap resulting from the lack of U.S. laws and regulations relating to AI systems. It also aims to cultivate dialog that is currently lacking between policymakers and private industry by building bridges of trust between these entities to foster a better understanding of various perspectives.”
“We share the same goals in establishing ethical-legal principles, guidelines, and norms. These principles should be based upon fairness, equality, privacy, responsibility, accountability, transparency, and accuracy of AI systems.”
Addressing the ethical and legal questions
“This international conference is our first step toward the establishment of an ‘incubator’ for exchanging ideas, conducting research, and promoting discourse and publications,” stated Prof. Yanisky-Ravid.
“We envision a forum that will discuss, propose and advance ethical-legal AI guidelines and principles for future regulations using academic tools, including research, roundtables, presentations, discussions, and publications. This forum is critical to tackling the ethical and legal questions stemming from the ever-changing AI ecosystem which currently lacks proper regulation.”
AI compliance framework
Ideas for companies to regulate their use of AI with active government oversight of biometrics, and facial recognition
Prof. Carole Basri, Chief Advisor of the Association of Corporate In-House Counsel Program, discussed the challenge of creating an ethical and effective AI compliance framework. Prof. Basri proposed several ideas for companies to better regulate their use of AI with active government oversight of machine vision, biometrics, and facial recognition technology.
Prof. Basri said, “There is a deep and common concern in modern society that AI technology will become uncontrollable. There is, therefore, a call for social, legal, and ethical tools for regulating AI’s functions and outcomes. An effective compliance framework can help organizations address concerns about the technology.”
AI-based face and object recognition technologies
Dean Nicolls, Oosto’s Chief Marketing Officer, represented the Visual AI and facial recognition industry in the discussion.
Oosto is a pioneering visual AI platform enabling enterprises to protect customers, guests, and employees by identifying security and safety threats in real-time by exploiting the power of AI-based face and object recognition technologies.
Facial recognition sensitivity
Mr. Nicolls presented a scale of sensitivity of facial recognition use cases ranging from unlocking users’ mobile phones for authentication to mass public surveillance of citizens by government agencies.
“The media’s focus on law enforcement’s use of facial recognition and the wrongful arrests resulting from its application has cast a negative perception of facial recognition technology -- even though these examples represent a small fraction of the total use cases in production.”
Facial recognition company Clearview AI is facing a potential fine in the UK and has also been handed a provisional notice to stop further processing of UK citizens’ data and to delete any data it already holds as a result of what the British Information Commissioner’s Office described as “alleged serious breaches” of national data protection law.
The UK’s Information Commissioner’s Office announced the provisional orders following a joint investigation with Australia’s privacy regulator. Recently, the Australian Information Commissioner ordered Clearview AI to delete all images and facial templates belonging to individuals living in Australia.
Oosto, one of the vendors in the field of Vision AI and face recognition, endorsed the Australian regulator's decision. Following the OAIC privacy commissioner’s statement in November Oosto CEO Avi Golan said, “Oosto endorses the Australian Government's decision. Scraping images of people from the web without their consent is, in our view, a serious violation of the right to privacy.”
Alternative ethical approaches to facial recognition do not require scraping images of people from social media"
“As a vendor of AI-based facial recognition products for private companies and government agencies, it is important for me to emphasize - facial recognition apps should be provided with an empty database.”
Golan added, “It's important to understand that they are alternative ethical approaches to facial recognition that do not require scraping images of people from social media, Google images, LinkedIn, Instagram, among others.”
Cryptography and biometrics
Oosto's perspective is that biometrics should be deployed with empty databases, adequate safeguards for data and privacy need to be built into the technology, and improved operational due diligence needs to be adhered to.
Oosto has employed safeguards including databases created from scratch by the customer organization to meet their specific security needs, and the use of secure cryptography of any captured biometric data. Oosto points out that it also includes a ‘GDPR-mode’ which blurs the faces of people not appearing on the watchlist.
Teledyne has announced the release of the ITC Category 1 Thermography Qualification preparation course for achieving qualification as a category 1 certified thermographer.
Teledyne FLIR ITC Category 1 Thermography Qualification course explains the basics of infrared, how to operate an infrared camera under different conditions and for various purposes, how to appropriately judge a measurement situation in the field and how to identify potential error sources to enable participants to undertake infrared inspections following written guidelines and report the inspection results.
ITC Category 1 Thermography Qualification course
The ITC Category 1 Thermography Qualification course covers:
Introduction to thermography
Basic physics of heat
Basics of infrared physics
Thermal pattern recognition and infrared applications
Infrared temperature measurement techniques
Qualitative and quantitative thermography
Inspection routines and reporting
Hands-on laboratory sessions
The content of the course complies with the requirements of ISO 18436-7 standard.
Part No. - ITC-CER-5101
Duration of course - 35-40 hours (4-5 days)
Irisity AB (publ), an AI video analytics provider, continues its international expansion with the appointment of Marc Sanders as Sales Director for GCC, based in Abu-Dhabi, UAE.
It continues its international expansion, opening a new sales office in the United Arab Emirates. The office, based in Abu-Dhabi, will be headed by Marc Sanders who will be responsible for managing the company’s sales activities in the Gulf Cooperation Council (GCC) countries – Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and UAE.
Irisity's product suits the needs of customers across the smart city, school security, and elderly care"
“We are thrilled with the opening of a dedicated sales office in the UAE and the appointment of a well-recognized and accomplished security professional as Marc Sanders. We believe our vast product offering will suit the needs of customers across multiple verticals including smart city, transportation safety, school security, and elderly care”, comments Marcus Backlund, Irisity CEO.
Sanders brings over a decade of sales and technical experience in security systems, video, and AI applications, previously holding positions of Technical Sales Manager for Briefcam in GCC and Systems Applications Manager of Abu-Dhabi Monitoring and Control Center.
AI video analytics
“I’m very excited to join Irisity and be part of its international expansion initiative. Through my work in the GCC over the past decade, I’ve seen the market for AI video analytics grow and it is starving for mature and comprehensive solutions that Irisity and Agent Vi can now offer”, commented Marc Sanders, Irisity Sales Director GCC.
The UAE sales office will serve customers across the GCC region and will offer comprehensive AI video analytics products from Irisity’s portfolio, including products from recently acquired Agent Vi. The new UAE office is the fifth office within the Irisity Group, in addition to the offices in Sweden, Israel, the USA, and Singapore.
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries.
Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces.
Effective for high volumes
Face recognition eliminates security risks and is also virtually impossible to counterfeit
Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common.
Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit.
Affordable biometric option
Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations.
In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialized equipment and devices.
Overcoming challenges with AI
So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions?
Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks.
SecurOS FaceX face recognition solution
FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces
One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution.
FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera.
Secure video management system
A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity.
The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards.
Unique digital identifiers
The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams.
Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair color, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots.
SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256
To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive.
An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard).
How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces?
FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm.
Increased speed of entry
Incorporating facial recognition into existing access control systems is straightforward and cost-effective
Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics.
A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually.
A vital tool
Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management.
All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.
Gregor Schlechtriem has worked in the access control market for over 20 years and is now responsible for the Access & Intrusion Business Unit at Bosch Building Technologies. In this interview, the expert talks about key industry trends, the impact of the COVID-19 (Coronavirus) pandemic, technical innovations and his company’s strategy.
Mr. Schlechtriem, you have many years of experience in the security technology market. What is your background and what are your responsibilities as Senior Vice President at Bosch Building Technologies?
Gregor Schlechtriem: I am a trained engineer and electrical technician, and have been involved with access control in the broadest sense, since I started my career in the late 1980s. I started in the field of parking garage technology and then switched to security technology in 2001, as Managing Director of micos GmbH, which specialized in traditional access control.
micos GmbH was known for its highly available and highly secure access control systems, for critical infrastructure and government applications. Many systems from that time are still in use today and continue to be supported and upgraded.
Bosch is continuing micos’ business here?
Gregor Schlechtriem: Exactly, micos was taken over in 2004 by Bosch Security Systems, now known as Bosch Building Technologies. Since then, we have continuously been developing the access control business.
Being part of the Bosch Building Technologies division, we benefit a lot from international cooperation with colleagues
Being part of the Bosch Building Technologies division, we benefit a lot from international cooperation with colleagues and from overlap with other product lines, such as intrusion detection technology and video security. This gives us the opportunity to implement outstanding project solutions for demanding customers in an international environment.
In developing this business, I rely on my experience from other interesting roles at Bosch that I took on, after micos was bought in 2004. For a time, I worked in the European System Integrator Business, which I also had the privilege of managing for several years, as well as being directly responsible for business units.
In Fairport, USA, I had the overall responsibility for intrusion detection technology for many years, as I later did in Eindhoven for video systems. Since 2018, the global access control and intrusion detection business has once again been my direct responsibility.
At Bosch Building Technologies, we have in the meantime assigned sales to the respective business units, so that we can develop our product and solution portfolio, in close cooperation with sales and our regular customers. Our main task now is to make our access control portfolio accessible to a broader market. We want to make Bosch much better known, as an access control provider, in the international market. After all, with our own access product portfolio, the power of the Bosch Group and over 40 years of experience in this sector, we have a lot to offer.
As an expert in access control, how do you see the industry developing? In which direction is it currently evolving?
Gregor Schlechtriem: First of all, I see that security requirements are constantly increasing. Whereas there are currently still simple ‘key replacement systems’ that merely record card numbers, such an approach, to a large extent, no longer meets today’s security and user experience requirements.The core task of access control has not changed over the years
In the beginning, access control was more or less a kind of key replacement. Later, there was the possibility of increasing security via a pin code, i.e., via verification through simple data inputs. The next step in this direction was biometrics, which is another key step up, because it allows verification by means of unmistakable characteristics.
However, the core task of access control has not changed over all the years and has basically always remained the same: access control means determining who has an access request and checking whether this request can be fulfilled.
What’s next on this path to greater security?
Gregor Schlechtriem: Biometrics-based access control is becoming increasingly powerful and user-friendly through the use of artificial intelligence (AI). Here, data protection plays a major role, as wherever identities are established and movement data is recorded, it is necessary to reconcile the evolving technology with data protection.Biometrics-based access control is becoming increasingly powerful and user-friendly through the use of artificial intelligence
The question of data protection is becoming even more significant, as systems increasingly migrate to the Cloud. Bosch puts particular emphasis on ensuring that, even in the cloud, the data generated in access control is always in line with data protection rules, regardless of where it is located.
In my opinion, this trend towards the Cloud will continue, because companies are increasingly looking for complete service offerings, so that they can focus on their core business. Also, a system in the Cloud is easier to maintain and always up-to-date with the latest software, which makes cloud solutions even more attractive for providers and users.
How can higher security be reconciled with a good user experience?
Gregor Schlechtriem: Today, the card still plays a central role in the user experience, as the essential credential. Another current trend is ‘one card for everything’: with the increasing availability of secure multi-function smart cards, the possibility arises to use cards beyond the pure access function, for example, for payment in the canteen, at the catering and coffee machines, and in the parking garage, as well as simple access to other properties and so on.The security of cards has evolved significantly and kept pace with requirements
The security of the cards, the reading and encryption processes, has evolved significantly and kept pace with requirements, although we are also facing an installed base that no longer meets these requirements, due to outdated systems.
Today, it is standard for communications between reader and card to be encrypted. In some cases, the keys are also only held centrally to further increase security.
The security systems industry was also affected by the COVID-19 (Coronavirus) pandemic. How do you think the industry has changed? What technical solutions have emerged during this time?
Gregor Schlechtriem: First of all, there is a certain need for retrofitting in the industry due to changes in how buildings are used. For example, American retailers used to be open around the clock and always had staff on site. Now, due to COVID-19, stores are also closed, and this results in a whole new need for intrusion detection and access control systems to protect the buildings.
For access control, an obvious task has arisen as a result of the COVID-19 pandemic, namely to track contacts, as far as this is compatible with data protection. We actually expected more to happen here, but in our observation, many companies did quite little, despite clear and simple steps that could have been implemented relatively quickly. The installed access control systems clearly lag behind the technical possibilities.
Another topic that the COVID-19 pandemic has brought into focus is hygiene
Another topic that the COVID-19 pandemic has brought into focus is hygiene. Companies should actually have invested in contactless systems here and retrofitted speed gates or motorized doors. But in many cases this was not put into practice.
The door opener is still often used, which has to be operated manually and therefore, is touched multiple times. But, if everyone presses the same button, that doesn't help hygiene. Surprisingly, this is different in North America.
Here, ‘request-to-exit’ proximity detectors are used almost everywhere, which avoids this problem completely and releases the door, when an authorized person approaches it.
Mobile access and smartphone-based access control are also growing markets. What kind of developments do you see in these areas?
Gregor Schlechtriem: I already mentioned that users increasingly want to be able to use one card for several applications. But, what we are seeing here is that even with the most modern cards, which have a lot of applications loaded on them, we are reaching performance limits and the user experience suffers.
If you compare the card with the smartphone as a credential, you have a much more attractive integration platform there, which is significantly faster and delivers much better performance. For us, the mobile credential or the smartphone is the future, because it simply offers more possibilities that the card will not be able to provide in the long term.
What is the specific direction Bosch is taking here?
Gregor Schlechtriem: We are currently working on a broad implementation. A whole team is working on the user experience around the smartphone, because it’s understood that smartphone-based access has to work just as easily, as it currently does with a card.A whole team is working on the user experience around the smartphone
The user experience is one side of the coin, the other side concerns establishing security in the smartphone as a whole. In other words: How do I make the smartphone secure enough as a mobile credential, to meet my access control requirements? We are also working intensively on this.
That's actually an IT task. Do you do this yourself at Bosch or do you work with external experts here?
Gregor Schlechtriem: We have our own powerful Bosch IT, which also manages our company smartphones. If our company smartphones are lost, the data on them is automatically deleted.
The devices use biometrics to identify users, before they can access the data. It is a sound security concept that a card cannot offer. Moreover, we are working with other partners in the IDunion project, to create the additional infrastructure around mobile credentials as well.
What exactly is the IDunion and what role does Bosch play?
Gregor Schlechtriem: Digital identities must be openly accessible, widely usable, interoperable, and secure. This applies not only to access control, but to the digitised economy in general. The IDunion project has set itself the task of creating the infrastructure for this, in the form of an independent wallet, i.e., secure identity storage on smart devices.
The project is funded by the German Federal Ministry for Economic Affairs and Energy (BMWI), because digitisation is also a critical social issue. We are intensively involved in the ‘Physical access to the building’ work package in this consortium. Through this involvement, we want to ensure that our access control systems benefit from this infrastructure and are open to future digital business models.
Does ‘digital identity management’, which includes biometrics and mobile access, also play a role for Bosch?
Yes, it plays an important role for us, and I wouldn’t consider these topics separate
Gregor Schlechtriem: Yes, it plays an important role for us, and I wouldn’t consider these topics separate. For me, a mobile device has the advantage that it has already ensured and verified my identity from the moment of interaction. That’s the fascinating thing about it. If I only allow the device to communicate with the access control system, if I have identified myself first, I have implemented biometrics and access control together in a widely accepted process.
From my point of view, this is a very interesting perspective, in terms of security and user experience, because the biometrics procedures in smartphones are, I think, the best currently available. In my view, the smartphone has the potential to take over central functions in access control in the future.
What are your goals for the access control business of Bosch Building Technologies in the near future?
Gregor Schlechtriem: We will continue to focus on specific solutions for large customers. That is the continuation of our current strategy. In these projects, we will introduce new topics as I have just described, i.e., primarily new technology elements. I believe that, precisely because of the longevity of access control, a long-term migration capability is also of particular importance.
We want to reach out to the broader market and make more widely available, what we have developed in terms of technology and innovation. We are currently in the process of setting up and optimising our sales organization, so that it becomes much more widely known that we at Bosch have our own powerful access control portfolio, which can be used for all kinds of applications.
In addition, we want to differentiate ourselves in the market with our systems, in line with the motto of our founder, Robert Bosch: ‘Technology for life’. The user experience with Mobile Access should be simple, straightforward, and secure: You hold your smartphone in front of the reader and the door opens.
How AI and humans can work together is a longstanding debate. As society progresses technologically, there’s always the worry of robots taking over jobs.
Self-checkout tills, automated factory machines, and video analytics are all improving efficiency and productivity, but they can still work in tandem with humans, and in most cases, they need to. Video analytics in particular is one impressively intelligent piece of technology that security guards can utilize. How can video analytics help with certain security scenarios?
Video analytics tools
Before video analytics or even CCTV in general, if a child went missing in a shopping centre, we could only rely on humans. Take a crowded Saturday shopping centre, a complex one with a multitude of shops and eateries, you’d have to alert the security personnel, rely on a tannoy and search party, and hope for a lockdown to find a lost or kidnapped child. With video analytics, how would this scenario play out? It’s pretty mind-blowing.
As soon as security is alerted, they can work with the video analytics tools to instruct it precisely
With the same scenario, you now have the help of many different cameras, but then there’s the task of searching through all the CCTV resources and footage. That’s where complex search functions come in. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely on what footage to narrow down, and there’s a lot of filters and functions to use.
Expected movement direction
For instance, they can tick a ‘human’ field, so the AI can track and filter out vehicles, objects etc., and then they can input height, clothing colours, time the child went missing, and last known location.
There’s a complex event to check too, under ‘child kidnap’. For a more accurate search, security guards can then add in a searching criterion by drawing the child’s expected movement direction using a visual query function. A unique function like this enables visual criteria-based searches rather than text-based ones. The tech will then narrow down to the images/videos showing the criteria they’ve inputted, showing the object/child that matches the data and filter input.
Detecting facial data
There are illegal demonstrations and troublesome interferences that police have to deal with
A white-list face recognition function is then used to track the child’s route which means the AI can detect facial data that has not been previously saved in the database, allowing it to track the route of a target entity, all in real time. Then, security guards can confirm the child’s route and current location. All up-to-date info can then be transferred to an onsite guard’s mobile phone for them to confirm the missing child’s movement route, face, and current location, helping to find them as quickly as possible.
Often, there are illegal demonstrations and troublesome interferences that police have to deal with. Video analytics and surveillance can not only capture these, but they can be used to predict when they may happen, providing a more efficient process in dealing with these types of situations and gathering resources.
Event processing functions
Picture a public square with a number of entries into the main area, and at each entry point or path, there is CCTV. Those in the control room can set two events for each camera: a grouping event and a path-passing event. These are pretty self-explanatory. A grouping event covers images of seeing people gathering in close proximity and a path-passing event will show when people are passing through or entering.
The video analytics tool can look out for large gatherings and increased footfall to alert security
By setting these two events, the video analytics tool can look out for large gatherings and increased footfall to alert security or whoever is monitoring to be cautious of protests, demonstrations or any commotion. Using complex event processing functions, over-detection of alarms can also be prevented, especially if there’s a busy day with many passing through.
Reducing false alarms
By combining the two events, that filters down the triggers for alarms for better accuracy to predict certain situations, like a demonstration. The AI can also be set to only trigger an alarm when the two events are happening simultaneously on all the cameras of each entry to reduce false alarms.
There are so many situations and events that video analytics can be programmed to monitor. You can tick fields to monitor any objects that have appeared, disappeared, or been abandoned. You can also check events like path-passing to monitor traffic, as well as loitering, fighting, grouping, a sudden scene change, smoke, flames, falling, unsafe crossing, traffic jams and car accidents etc.
Preventing unsafe situations
Complex events can include violations of one-way systems, blacklist-detected vehicles
Complex events can include violations of one-way systems, blacklist-detected vehicles, person and vehicle tracking, child kidnaps, waste collection, over-speed vehicles, and demonstration detections.
The use of video analytics expands our capabilities tremendously, working in real time to detect and help predict security-related situations. Together with security agents, guards and operatives, AI in CCTV means resources can be better prepared, and that the likelihood of preventing unsafe situations can be greatly improved.
It’s a winning team, as AI won’t always get it right but it’s there to be the advanced eyes we need to help keep businesses, premises and areas safer.
For security professionals who thought analog systems were a thing of the past, a new approach by Mythic Inc. demonstrates that everything old is new again.
Using older technology in a new way, the Mythic M1076 Analog Matrix Processor leverages analog computer chips from a previous generation to drive new levels of artificial intelligence (AI) performance with lower power requirements.
Low power and high speed
Mythic provides power-efficient AI at the edge, including inside video cameras. The design combines embedded flash memory with analog computing power to achieve faster AI processing, supporting up to 25 trillion operations per second (TOPS), with the very-low power levels conducive to edge devices.
The scalable, single-chip analog compute-in-memory architecture provides high-performance inference without consuming the power and energy that digital solutions require to move data at high speeds between separate processing and storage components.
High-resolution video analytics with low latency, comparable to a GPU, is provided by AI, but at 10 times less power
“We use a different approach to processing and storage by resurrecting analog technology for faster computing power in a limited size and cost,” says Tim Vehling, Senior Vice President, Product and Business Development at Mythic. The Mythic chip solves several design challenges for camera manufacturers.
The single-chip design with no DRAM (dynamic random-access memory) caters to limited space requirements. High-resolution video analytics with low latency, comparable to a graphics processing unit (GPU), is provided by AI, but at 10 times less power than a typical system on chip (SoC) or GPU. The typical 3-4-watt power draw is consistent with a limited power budget for power over Ethernet (PoE). Passive heat dissipation does not require active thermal management.
Applications of the analog chip
For video applications, the chip provides faster speed to accommodate more cameras, more resolution, and more details in images. In addition to providing scalability, the chip supports a variety of host platforms, including X86, NVIDIA Jetson Xavier NX/TX2, Qualcomm RB5, and NXP i.MX8M. It supports Linux Ubuntu 18.04 and Linus for Tegra (NVIDIA) operating systems.
The chips can plug into NVIDIA or Qualcomm platforms to enhance AI capabilities for a variety of applications. The chip also has utility in other deployments, including drones, where Mythic works with the Qualcomm RBS platform to enable multi-thousand-dollar drones for larger applications.
Integration into devices
The chip can augment the capabilities of a CPU without replacing it or completely redesigning a product
The chip handles image sensing, multiple cameras, radar, and lidar sensors, in addition to flight navigation, control, and communication, in addition to in-flight analytics. Inside NVRs, Mythic chips provide high-level processing at a fraction of the cost, says Vehling.
Integration of the technology into cameras and other products is simple – it simply plugs into an M.2 expansion slot, and the software is downloaded to drive the AI algorithms. The chip can augment the capabilities of a CPU without replacing it or completely redesigning a product, in effect providing an instantaneous improvement in performance.
Because Mythic uses older technology, there are no shortages compared to some later-generation chips. The 40-nanometer chips are a mature technology, manufactured in Japan, while newer processors are smaller at 5 or 7 nanometers. The newer chips are more likely to be in short supply.
The Mythic M1076 chip is currently being evaluated but is not yet in production. The company expects to be shipping the product in the second half of 2022, and it will be sold to camera manufacturers and other OEMs to be incorporated into their products.
Adds value inside cameras
For security end-users, Mythic’s AI chips will add new value inside video cameras and other equipment in terms of better performance, small size, and less power.
For integrators, the technology will expand equipment options, such as providing high-level analytics in cameras while requiring only 2 to 3 watts of power, consistent with the use of PoE.
The trend of video customers moving to the cloud has reached a tipping point. At the same time, artificial intelligence (AI) is being adopted on a massive scale. Combining the two trends adds a higher level of value than either component individually.
Merging the power of AI and the cloud is a driving force behind cloud surveillance company Eagle Eye Networks’ acquisition of Uncanny Vision, an AI and video analytics company headquartered in Bangalore, India.
Expensive AI resources
Cloud systems empower customers to leverage AI without having to install and program complicated and expensive hardware, in effect stripping away the barriers to entry that customers face when seeking to embrace AI. The cloud also enables customers to share expensive AI resources.
One of the key components is ease of deployment – click, click and turn on the AI for any camera"
Simplicity of implementation is crucial to the combined value proposition of Eagle Eye Networks and Uncanny Vision. “One of the key components is ease of deployment – click, click and turn on the AI for any camera (in a cloud system),” says Dean Drako, Eagle Eye Networks CEO. There is also a benefit of having AI systems networked, enabling 25 banks to perform facial recognition of customers from a single cloud-based system, he adds. A transition is also under way in the perception of AI.
Video surveillance applications
While previously it was seen as an add-on to surveillance systems, now it is seen as a very desirable feature on any system. “Centralized management of the cloud benefits the AI database,” says Drako. “In a project built around license plate recognition (LPR), for example, all the data goes up to the cloud into a single database, and the customer can get a mobile view of everything going on across the world. You can’t do that without the cloud. And AI for LPR is more accurate.”
Uncanny Vision’s targeted focus on AI for video surveillance applications was one factor that attracted Eagle Eye Networks to make the acquisition, says Drako. In contrast, some other companies have embraced broader applications of video AI. Uncanny Vision also has more customers using their system in real-world applications than competitors. Finally, the acquisition will help to expand Eagle Eye Networks’ presence in the LPR market, where Uncanny Vision is especially strong.
Improving business operations
The 60 employees at Uncanny Vision are mostly engineers and programmers
Uncanny Vision’s deep learning algorithms enable recognition, identification, and prediction, improving business operations, customer service, and site safety. Applications include smart parking, retail, smart cities, ATM monitoring, worker safety and perimeter security.
The 60 employees at Uncanny Vision are mostly engineers and programmers. “These guys understand how to translate AI algorithms to run very efficiently on various types of hardware,” says Drako. “They optimize how they get the code to run so we can implement in the cloud cost-effectively. They do it at a modest cost to make it more accessible. They understand how to deploy software for high performance on low-cost hardware.” For Uncanny Vision, the new ownership provides more reach. “We have a huge channel and a huge brand,” says Drako. “They are strong technical guys who need a sales and solution channel.”
Video analytics solutions
Even in light of the acquisition, Eagle Eye Networks will continue to provide a selection of third-party AI and video analytics solutions to customers. Use of AI and video analytics is specific to the application and business needs of each customer.
Use of AI and video analytics is specific to the application and business needs of each customer
In addition to AI functionality, systems need a ‘business logic’ component that drives how that capability is integrated into a system. System needs vary widely by vertical market, and many third-party vendors are focused on a specific vertical and how AI can benefit that market.
Recurring monthly revenue
“Third parties can provide analytics and the business logic, which is different for a factory, an office building or for a drive-thru restaurant,” says Drako. “The market is looking for many solutions, and one company couldn’t own a majority of them.” To ensure flexibility, Eagle Eye Networks will accommodate third party solutions, deploy their own analytics, or leverage analytics embedded in cameras.
For Eagle Eye Networks’ dealer and integrator customers, the expansion into AI presents a new opportunity for recurring monthly revenue (RMR) and provides greater value to customers. Drako says the impact of the acquisition will be global as AI applications grow in popularity worldwide.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex.
Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’.
CV5S and CV52S AI-powered SoCs
The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond.
The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing.
Faster and ubiquitous AI capabilities
Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions"
“Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm.
John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.”
Edge AI vision processors
Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive.
By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing.
4K multi-imager cameras
“However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot.
In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation.
The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022.
Reference boards for camera manufacturers
The software on these new SoCs is an evolution of our unified Linux SDK"
As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families.
“The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot.
Better crime detection
Detecting criminals in a crowd, using face recognition and/or license plate recognition, has been a daunting challenge for security, and one the new chips will help to address.
“Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot.
Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution.
4K AI processing on-camera
The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analyzed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras.
This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and license plates that are hundreds of meters away,” said Jerome Gigot.
The advent of on-camera AI at 4K changes the paradigm
Enhanced video analytics and wider coverage
“Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot.
He adds, “So, next-generation cameras will now be able to identify more criminals, faces and license plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.”
Deployment in retail applications
Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once
Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement.
The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out.
This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics.
Use in cashier-less stores
Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item.
In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking.
Updating on-camera AI networks
Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames.
So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, color, license plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle.
If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene.
Efficient traffic management
With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself
Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyze, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.).
With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control center. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server.
Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video.
On Ambarella’s CV5S and CV52S SoCs, the video can be analyzed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy.
In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualization. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level.
Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas.
“With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.”
Physical security in parking lots
With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot
One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred.
With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the license plates of all the cars going in and out, to automatically bill the owners.
If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go.
Advantages of using edge AI vision SoCs
Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.”
He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.”
He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
Croatia has selected Intersec’s GeoSafe technology as the basis for its new national public warning system (PWS). The decision sees Croatia adopting a best practice response to the European mandate that all EU member states must implement a modern digital public warning system by June 20221.
Ingolf Ruh, Chief Revenue Officer, for Intersec says: “The Croatian government wanted the best technology possible in order to serve its population in a crisis. Simply complying with the European regulations regarding public warning systems was not enough: they wanted to innovate and prepare for the future.”
Public warning system
“As part of an end-to-end solution that enables government and network operators to work seamlessly together from the outset, GeoSafe will deliver a public warning system for Croatia that will keep citizens informed and protected for many years to come.”
Croatia has a population over 4 million but attracts almost five times as many tourists annually (19.6 million in 2019). Croatia’s Ministry of the Interior and Civil Protection Directorate (MoI/CPD) was tasked with improving its current processes and introducing new communication channels to provide a single national system to alert citizens and visitors during crisis situations. A key requirement was the ability to target specific segments of the population in real time using mobile messaging, dependent on their (changing) position relative to the crisis.
Powerful data processing
GeoSafe can differentiate between users of Croatian mobile networks and foreign national operators
Using a combination of cell broadcast and location-based SMS, Intersec GeoSafe provides the technology that will enable the MoI/CPD to provide early warning and subsequent crisis communications in case of national emergencies such as floods, fires, epidemics or terrorist incidents.
Providing critical alert aggregation capability, its powerful data processing will enable anonymized geolocation data to be used to provide the best possible information in an emergency. The system will also help to track whether messages have been received and how people are responding. GeoSafe can differentiate between users of Croatian mobile networks and foreign national operators, so crisis communications can be sent in foreign languages, in real time, without violating personal data protection regulations.
Intersec partnered with Croatian companies King ICT and GDI to respond to the competitive tender. As one of four businesses bidding for the project, the Intersec consortium won by proving that its system was technically superior, offered robust data anonymization processes for maintaining citizen privacy, and could deliver a cost-efficient, future-proof solution at both governmental and network operator level.
All three national telecommunications operators in Croatia have confirmed their participation in the project, thereby ensuring coverage of the entire Republic of Croatia, and enabling the government to reach up to 100% of mobile device users.
Nestled on the Western shore of Lake Como, the Grand Hotel Victoria in Menaggio is one of the latest 5-star luxury properties in the Larian landscape.
The magnificent resort in Art Nouveau style, which encompasses a late 19th-century palace and a former monastery, has been completely renovated to host 81 rooms, lush gardens with pool, more than 2,000 m2 spa, 2 restaurants, and 90 car places in the underground parking.
End-to-end security solutions
The Grand Hotel Victoria in Menaggio, wedged between the lakeside and the heights of the Lepontine Alps, promises its guests a unique experience. To make this happen, it is essential to improve the security level.
Dahua Technology is a world-pioneering video-centric smart IoT solution and service provider. Based on technological innovations, it has offered end-to-end security solutions, systems, and services to create value and solve problems for clients. This is why the hotel management entrusted Dahua and MD Impianti – its system integrator partner – the realization of the perimeter and indoor surveillance system.
AI-based cameras and deep learning
With deep learning, Dahua Perimeter Protection technology can recognize humans and vehicles accurately
In the solution provided by Dahua Technology, 15 units of IPC-HFW5241E-ZE 2MP bullet cameras with 2.7~13.5 mm motorized varifocal lens of Dahua WizMind series – equipped with various AI functions such as perimeter protection and people counting – were installed to guard the outside of the building providing clear images even in the low-light environment due to IR LEDs (range up to 50 m), WDR (120 dB) and Starlight technology (till 0.0002 Lux before switching to B/W).
With the deep learning algorithm, Dahua Perimeter Protection technology can recognize humans and vehicles accurately. In the restricted areas (such as pedestrian areas and vehicle areas), the false alarms are largely reduced.
Dahua Lite series network camera
After crossing the main entrance surmounted by a balcony that rests on four Doric columns, no less than 110 units of IPC-HDW2431T-AS-S2 4MP eyeball network cameras – featuring IR LEDs and Starlight themselves - discretely watch over the premises of the historical and new wings.
With upgraded H.265 encoding technology, the Dahua Lite series network camera has efficient video encoding capacity, which saves bandwidth and storage space. This camera adopts the latest Starlight technology and displays better color images in the condition of low illumination.
NVR features a mouse shortcut operation menu, remote management and control, central storage, edge storage
Two 128-channel NVR608R-128-4KS2 network video recorders with 8 hard disks and redundant power manage all streams, while the networking was implemented with ePoE, PoE, and aggregation switches, connected by CAT6 cables and optical fiber.
For applications where details are critical for identification, this enterprise-level NVR provides a powerful Intel processor with up to 4K resolution. Additionally, the NVR features a mouse shortcut operation menu, remote management and control, central storage, edge storage, and backup storage.
All images collected by the whole system can be visualized both in the concierge and remotely. The latter is a feature that allows great flexibility to meet the needs of the end-user, who is already evaluating the integration of DSS centralization software and a video wall.
The system protecting the prestigious Gran Hotel Victoria in Menaggio demonstrates once again how Dahua Technology, along with its partners and supply chain, is capable of providing high-profile and tailor-made integrated security solutions, suitable for any scenario and compliant with current legislation.
Dahua Technology is a globally renowned video-centric smart IoT solutions and services provider. Based on technological innovations, Dahua Technology offers end-to-end security solutions, systems, and services, in order to create value for city operations, corporate management, and consumers.
Dahua Technology has designed a video surveillance and control solution for a popular Panamanian Food Company - Empresa Panamena de Alimentos (EPA).
Dahua’s Security solution
Empresa Panamena de Alimentos is a renowned company in the processed food industry in Panama, Central America. It was founded in 2012 and owns production plants and warehouses in the capital city, as well as agencies around the country.
EPA’s products, including all kinds of cookies, coffee, and pasta, are already important parts of consumers’ day-to-day life. With the prevailing COVID-19 pandemic risks, EPA needed a system to sustain efficient management and operation, over their staff and facilities.
Implementing multiple access controls in the facilities
As a food company, the operations of the company need to be under caution, especially during the pandemic
As a food company, the operations of the company need to be under caution, especially during the pandemic. It was necessary to implement multiple access controls in the facilities.
With multiple plants located around the nation and accelerated growth, a centralized monitoring system for all equipment, alert management and user reports was needed. The solution, applied at EPA’s facilities, integrates various electronic security systems under a single platform and was evaluated based on the company’s needs.
ANPR, AI-based cameras and access control systems
“Currently, 480 Dahua devices have been arranged. Among them are different models of cameras, access control systems, and automatic number plate recognition products. AI-based cameras enhance the level of personnel protection. Everything is monitored by a DSS Express server in the main plant,” said Luis Araujo, the Manager of Infrastructure and Telecommunications of the Secutec Panama.
Every day, more than 800 employees enter EPA facilities nationwide, the access control system allows a faster and safer automated entry of the staff and their cars.
access controllers and Pro Network Video Recorders
Besides, three Pro Network Video Recorders (NVR5864-4KS2) were also adopted Apart from automatic number plate recognition (ANPR) devices, more than 20 access controllers (ASI7213X-T1) were installed in main offices for temperature monitoring and attendance management.
Besides, three Pro Network Video Recorders (NVR5864-4KS2) were also adopted. With a powerful processor, they have the capability of 4K resolution processing and high definition recording quality.
Perimeter protection and access control
In Dahua Technology’s security solution, perimeter protection and access control are both realized. “We have had Dahua equipment for 7 years. It is a brand that has been of great help to our safety. It has contributed to continuous and steady operations throughout the COVID-19 pandemic,” said Guillermo Figueroa, EPA’s Safety and Control Manager.
Javier Rodríguez, Secutec Panama’s Operations Manager, valued the quality and technology of Dahua’s solution, which has been ‘key’ for the development of their projects, the support and accompaniment to the brands that are planned to be developed.
Trust in Dahua Technology’s solution
“We are very proud that our teams are here for EPA and that companies, like EPA and Secutec, trust Dahua Technology. We continue to innovate to offer solutions that help companies to work in a safer and smarter way,” said Fermín Osorio, an Engineer at Dahua Technology Ltd.
Gindi TLV, a residential complex in the heart of Tel Aviv, Israel, maintains the safety of its community, by using Oosto’s face and object recognition, to reduce contact with surfaces and enforce a policy of density, distance and wearing masks in public areas.
Securing Gindi TLV complex
Gindi TLV is an innovative residential complex, located in the heart of Tel Aviv, which includes 4 towers, restaurants, cafes, a country club and a mall. The complex has been planned and designed to allow community life for families and individuals, who have chosen to live in the beating heart of Tel Aviv, located within walking distance of the city’s business and entertainment areas.
Gindi TLV residents use a dedicated app for convenient booking of the complex’s facilities
Gindi TLV residents use a dedicated app for convenient booking of the complex’s facilities, parking, guest invitation and as a social network that is the basis for community life in the complex. Gindi TLV is also equipped with advanced and interconnected technological systems that enable efficient and cost-effective management of infrastructure and service for tenants.
Oosto’s facial recognition technology
The Prop-tech technology in the complex was developed and managed by the start-up, MyTower, which serves as a design partner in the project and is responsible for making it the first smart residential neighborhood in Israel. Gindi TLV uses Oosto’s facial recognition technology, in order to provide tenants with touchless and secure entry.
Dan Stern, the Vice President (VP) – Digital, at Gindi TLV, explains “On the one hand, the tenants in the complex are highly sensitive to personal security and privacy, and on the other hand, because it is their home, we did everything to avoid using cards, chips or fingerprints, and allow easy access control for tenants, and their guests, using Oosto’s advanced facial recognition technology.”
Visual AI and touchless access control
Dan Stern adds, “Following the ongoing COVID-19 epidemic, there has been a need to expand the use of visual AI, to maintain community safety, by reducing contact with surfaces, monitoring density in facilities and public areas in the complex.”
Ofer Schmidt, Sales Director of Central Europe & Israel, Oosto, said “Pre-COVID-19, maintaining tenant safety was primarily about security - letting tenants and their guests in and keeping unauthorized people out, in a transparent and smooth manner.
Deployment of facial and object recognition solutions
These days, we are seeing more and more prestigious residence complexes using face and object recognition"
Ofer Schmidt adds, “These days, we are seeing more and more prestigious residence complexes using face and object recognition, to maintain the health of the tenant and staff, for example by enforcing a policy of on distance, density, wearing masks and allowing only vaccinated, or those with a negative test, access to common facilities, such as the gym.”
He further stated, “The high accuracy of the computer vision algorithms, operating in Gindi TLV, enables the maintenance of the health of those who live or visit the complex, while minimally interfering with their daily routine. “
Video analytics using AI
Video analytics using artificial intelligence (AI) to reduce COVID-19-related risks is not unique to residential complexes.
According to a recent survey, 82% of academic institutions in the US and Western Europe will adopt face and object recognition technologies, in order to maintain safety through enforcing mask wearing, social distancing and reducing contact with surfaces to a minimum.
Many of the threats facing the energy and utility sector are related to cybersecurity, as recent incidents have confirmed. Another problem is that operating systems for utilities tend to be outdated, which presents extra challenges in a connected world. There are also physical security demands, not to mention regulatory and social issues. We asked this week’s Expert Panel Roundtable: What are the security trends in energy and utilities?
Air travel is returning to pre-pandemic levels. COVID and its aftermath have added new compliance and operational concerns for airport security, and social and political volatility around the world emphasises the need for constant vigilance. A range of new technologies are enhancing airport security, not to mention providing new tools to simplify processes throughout the airport. We asked our Expert Panel Roundtable: Which technologies are transforming airport security?
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labor pool will need to be able to meet the host of new challenges.
We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?