Date: Aug-24-2020
The split facial recognition terminal adopts
an external camera. The facial recognition security module, as the external
components should communicate with the host through a secure link, and complete
the collection and processing of facial data. This security module is a
security encryption device/module that integrates multiple functions such as
image capture, live detection, security encryption, etc. Through the security
protection function of software and hardware, the collected facial images can
be filtered and encrypted. Then, it communicates with the host computer through
a secure link and sends the facial data to the host computer.
The facial recognition security module can
be used in self-service vending machines and other similar scenes. It can also
be connected to the smart POS after adding a screen to form an external device,
which solves the need for acceptance of cards, codes, and facial images by merchants.
Moreover, reduces the cost and difficulty of host-side transformation. At the
same time, it can also reduce security risks. The use of the facial recognition
security module reduces the cost and difficulty of host-side transformation,
also lower the security risks.
According to in-depth research, investigation
of technical specifications, and current market needs, BCTC offers Facial Recognition
Security Module Testing Service. Testing items mainly include:
1. Module Technical Capabilities: including
environmental adaptability, application processors, memory, etc.
2. Physical Hardware Security Protection:
including anti-modification requirements, facial data protection, key
protection, etc.
3. System and Logical Security: including memory
clearance, facial data processing, key management, facial data encryption key
security, etc.
4. Communication Interface Security:
including transmission channel security, facial data transmission protection,
etc.
5. Live detection: including
two-dimensional static paper images, two-dimensional static electronic images,
two-dimensional dynamic images, three-dimensional masks, three-dimensional head
model, and real-person attacks.