Facial Recognition

Facial Recognition Access Control

Identity verification using facial recognition applications, such as Avigilon Facial Recognition and the Suprema BioStation 3, is made possible through a combination of advanced hardware and software technologies.

Find Out More

Here’s an overview of the process:

  1. Facial Enrollment: to begin, users’ facial data needs to be enrolled in the system. During enrollment, individuals’ faces are captured using high-resolution cameras, typically built into the device like the Suprema BioStation 3. The captured facial images are then processed and transformed into a unique digital representation, often referred to as a facial template or faceprint.
  2. Facial Template Creation: the facial template is a mathematical representation of an individual’s facial features, capturing key landmarks and distinguishing characteristics. This template is generated by algorithms that analyze the facial image and extract relevant data points such as the distance between the eyes, the shape of the nose, and the contours of the face.
  3. Template Storage: the generated facial template is securely stored in a database or on the device itself, depending on the system architecture. It serves as a reference for future comparisons during identity verification.
  4. Real-Time Recognition: when a person seeks identity verification, their facial image is captured again using the device’s camera. The image is processed in real-time by the facial recognition software, which extracts the facial features and generates a new facial template.
  5. Template Comparison: the newly generated facial template is then compared to the templates stored in the system’s database. Advanced matching algorithms are employed to measure the similarity between the captured template and the enrolled templates. This process involves complex mathematical computations, including machine learning and artificial intelligence techniques.
  6. Threshold Determination: to determine whether a match has been found, a threshold is set. The threshold represents a similarity score or a confidence level above which a match is declared. If the similarity score exceeds the threshold, the identity verification is successful, and the individual is granted access or authentication.
  7. Access Control or Authentication: depending on the application, the results of the identity verification process can be used for various purposes. In access control systems, such as the Suprema BioStation 3, successful verification allows authorized individuals to enter restricted areas or perform specific actions. In authentication applications, such as mobile banking, it enables users to securely access their accounts and perform transactions.

It’s important to note that the exact implementation and underlying algorithms may vary between different facial recognition systems. However, the general principles described above provide an overview of how identity verification using facial recognition is made possible by applications like SAFR Facial Recognition and the Suprema BioStation 3.

Call us on 1300 556 334 or email [email protected] to learn more.

Customers in New Zealand call 0800 345 677 or email [email protected].


JD Security is committed to respecting human rights and avoiding complicity in human rights abuses. The hardware and software that JD Security resells is only intended to be used in applications that do not cause or contribute to a violation of an internationally recognised human right.

Return to Top ▲Return to Top ▲