Open Doors with Facial RecognitionNoahFace Access runs on a tablet mounted next to your door, constantly monitoring for people approaching.
When it sees a face, it compares it with known faces using facial recognition technology. If there's a match, it evaluates your configured access rules and, if appropriate, informs a small receiver mounted behind the door or in your ceiling cavity.
The receiver either directly releases the magnetic lock (in a stand-alone configuration), or informs your existing access control system (in an integrated configuration).
The configured access rules include support for day-of-week and time-of-day restrictions, and you can set different identification requirements at different times. For example, you can allow fast and convenient facial recognition access during business hours, while requiring a passcode or even an access card outside of these hours.
A photographic record of all access attempts is stored in an event log so you can examine it later if needed.
Call us on 1300 556 334 or email email@example.com to learn more.
What is Noahface Access?
NoahFace Access uses facial recognition to open doors with a glance - replacing access cards to deliver the world's fastest and most convenient access control solution.
How fast is the facial recognition process?
Once the camera can see a face, NoahFace Access can recognise it in under a second. Each time you use it it learns, making the process even faster over time.
How reliable is the facial recognition process?
With appropriate setup, NoahFace Access can correctly identify individuals over 99% of the time. And if someone is not recognised automatically, they can manually identify themselves. You can choose whether this requires a passcode (sent to their phone), your own unique identifier (eg: an employee number, member number, etc), or both.
How many people can NoahFace Access support?
NoahFace Access can support up to 2,000 people at a single door, and 50,000 or more people across an organisation.
Can I control who can enter and when?
Yes. NoahFace Access allows you to configure access rules to control who has access, and on what days and during what hours they have access.
Can NoahFace Access support multiple doors and sites?
Yes. NoahFace Access can support organisations with any number of doors and sites. You can configure access rules for individual doors, door types (eg: machine rooms, storerooms, etc), individual sites, or groups of sites.
What equipment will I need for NoahFace Access?
For each door you will need an iPad, an iPad mount, and a receiver.
What is the best height to mount the iPad?
The iPad is best mounted as close as possible to your door with the camera eye at approximately 155cm from ground level.
What happens if network connectivity is temporarily lost?
NoahFace Access will continue to evaluate and grant access as appropriate, storing event data locally. As soon as network connectivity is restored, event data will be automatically pushed to the NoahFace Cloud server.
Can NoahFace Access integrate with my existing Access Control System?
Yes. The NoahFace receiver emits Wiegand signals (the same signals generated by access card readers) which allows it to be used with almost all Access Control Systems. In an integrated configuration, NoahFace Access simply identifies people, and your Access Control Systems makes the decision to unlock your doors.
Is facial recognition more secure than access cards?
Access cards can be (and often are):
- Lent to friends or visitors,
- "Borrowed" from desks,
- Permanently lost or stolen, and
- Easily and cheaply duplicated.
In short, access cards don't tell you who entered - only which card was used. Facial recognition overcomes all of these security issues, so we would suggest that it provides you with a stronger form of identification than access cards (and FAR more convenience).
Can NoahFace Access be fooled with a selfie or photograph?
NoahFace Access includes sophisticated “liveness testing” algorithms that aim to differentiate between a live person and a photograph or replayed video. These include both 2D algorithms, which will detect and prevent most casual fraud attempts using a selfie, and a highly secure 3D algorithm that leverages the depth sensing capabilities of the iPad Pro. You can choose which algorithm is most suited to your needs.
Can NoahFace Access provide two-factor authentication?
Yes. If you have a need for more robust identification than facial recognition can provide on its own, you should consider two-factor authentication.
In a stand-alone configuration, NoahFace Access can be configured for two-factor authentication by requiring both a matching face and a passcode before allowing entry.
In an integrated configuration, NoahFace Access can provide one factor of identification to your existing Access Control System. In this case, you would set your door up for “Dual Authentication” in your Access Control System, and it would validate the other factor (eg: an access card).
Can NoahFace Access be used to control access to machines or IT systems?
Yes. NoahFace Access can be configured to authenticate users and then pass on the identity of those users through a published API.
Where is the data stored?
The configuration and user data is generally captured and stored on the NoahFace Cloud server, and is replicated to and cached on each iPad to enable high performance and offline operation. For single iPad deployments, you can choose to only store this data on the iPad.
Since events and biometrics are captured locally, they are initially stored on each iPad, and are generally replicated to the NoahFace Cloud server. Replicating events enables centralised viewing and reporting, and replicating biometrics enables centralised registration.
Is the data encrypted?
All communication between the iPads and the NoahFace Cloud server is encrypted using TLS/SSL. When sensitive user related data (eg: passcodes and biometrics) is managed locally on each iPad, it is encrypted and secured using IOS keychain services.
Are there any privacy issues?
Like all Access Control Systems, NoahFace Access allows you to record user details (eg: their name, unique identifier, and a profile picture) as well as an event log of all access attempts. In recording such information, you need to be aware of and adhere to relevant privacy laws. Privacy laws are different in each country and state, and we recommend you review your local laws.