CH

News

Current location:Home - News

BCTC offers Facial Recognition Security Module Testing Service

Date: Aug-24-2020

The split facial recognition terminal adopts an external camera. The facial recognition security module, as the external components should communicate with the host through a secure link, and complete the collection and processing of facial data. This security module is a security encryption device/module that integrates multiple functions such as image capture, live detection, security encryption, etc. Through the security protection function of software and hardware, the collected facial images can be filtered and encrypted. Then, it communicates with the host computer through a secure link and sends the facial data to the host computer.

 

The facial recognition security module can be used in self-service vending machines and other similar scenes. It can also be connected to the smart POS after adding a screen to form an external device, which solves the need for acceptance of cards, codes, and facial images by merchants. Moreover, reduces the cost and difficulty of host-side transformation. At the same time, it can also reduce security risks. The use of the facial recognition security module reduces the cost and difficulty of host-side transformation, also lower the security risks.

 

According to in-depth research, investigation of technical specifications, and current market needs, BCTC offers Facial Recognition Security Module Testing Service. Testing items mainly include:

 

1. Module Technical Capabilities: including environmental adaptability, application processors, memory, etc.

2. Physical Hardware Security Protection: including anti-modification requirements, facial data protection, key protection, etc.

3. System and Logical Security: including memory clearance, facial data processing, key management, facial data encryption key security, etc.

4. Communication Interface Security: including transmission channel security, facial data transmission protection, etc.

5. Live detection: including two-dimensional static paper images, two-dimensional static electronic images, two-dimensional dynamic images, three-dimensional masks, three-dimensional head model, and real-person attacks.

Previous:BCTC accredited by American Express to perform Type Approval activities for IC card Next:Guarding Biometric Recognition Security - BCTC Provides Google Biometric Evaluation Service