人臉辨識門禁系統兼顧個人隱私

高效能人臉辨識系統 嚴格把關個資安全

宜鼎國際的元件安全性與高效能兼具,可滿足人臉辨識應用的嚴苛要求。

引言/

某家客戶曾要求宜鼎國際提供一套高效能元件,以供人臉辨識門禁系統執行臨場即時分析。鑒於個資保護法規範甚嚴,客戶要求元件展現高效能的同時,還得兼顧最高規格的加密與數據安全標準。

成果/

針對這家客戶的門禁管理系統,宜鼎國際透過自家記憶體與儲存解決方案,不但在全方位人臉辨識和即時分析展現絕佳效能,亦能配合客戶當地的個資保護法規。

承諾/

宜鼎國際深信,我們可以透過合作克服任何挑戰。從初期諮詢到後期施作,宜鼎國際竭力保持溝通管道順暢無阻,以確保客製化解決方案符合應用需求。我們致力追求技術創新,整合旗下硬體、韌體和軟體更是我們持續關注的焦點。

挑戰/

 
  • 近乎即時人臉辨識的高效能
  • 臨場即時分析
  • 不折不扣的個資安全需求
解決方案/
  • 宜鼎國際高效記憶體與儲存解決方案
  • 支援AES加密的SSD儲存設備

A Facial Recognition Entrance System that Respects Privacy

High-performing facial recognition system that delivers excellent data security

Innodisk provided secure and high-performance components able to handle the steep requirements of facial recognition applications.

Introduction

A client required high-performance components that could handle the on-site real-time analytics necessary for their facial recognition solution used in entrance systems. Due to strict laws concerning the protection of personal information, the client also required the components to live up to the highest encryption and data security standards—all while delivering the highest possible performance.

Result

Innodisk’s memory and storage solution provided the client with the performance needed to deliver seamless facial recognition and real-time analytics in the client’s entrance system. Further, the solution provided exceptional data security, satisfying the data protection requirements in the client’s jurisdiction.

Our Promise

We at Innodisk believe that through cooperation, we can overcome any challenge. By maintaining an active line of communication from inquiry to implementation, we ensure a tailor-made solution that fits your application. We are committed to innovation with our continual focus on hardware, firmware, and software integration.

Challenges

 
  • High performance to deliver near-instant facial recognition functionality
  • Real-time analytics
  • Substantial data security requirements
Solutions
  • Innodisk’s high-performance memory and storage solutions
  • SSD storage devices with AES encryption
Scroll to Top