The document describes several facial recognition applications developed by FrontGate Solutions, including FrontGate Kidz for registering and identifying children, FrontGate Shoppers for identifying important visitors in businesses, and using facial recognition for biometric attendance marking and authentication. Key applications involve using video camera feeds to match faces against databases in real-time to identify children, VIPs, potential security risks, and for automated attendance/login. Benefits include improved safety, reduced identification times, and special treatment for high-value customers.
3. SLIDE 3
Front Gate Kidz
A Software Driven App That Allows Registration Of Kids
To A Security Database,
4. SLIDE 4
The Potential Market
In other words all parents / teachers /
authorities responsible for child security
Home Sector
Schools
Hospitals
Government
Agencies
6. SLIDE 6
The Product Components
Detecting Face From
Video
Recognizing face via
Detailed Face
Information
7. SLIDE 7
Example Installation
A child is
identifie
d in a
crowd
Photogra
ph
updated
on to app
Searches
the
Registere
d
database
Searches
Social
media
Identifie
s similar
images
Images
though
old
predicts
growth
9. SLIDE 9
Benefits to Customers
Significantly improves safety
Reduces identification time for missed
children
Confirmation of wandering children
Provides traceability, accountability and
online management of kids
Integration into other data management
systems, e.g. School, Police
11. SLIDE 11
Product Features
The
identification
based on age
prediction
This helps to
identify even
if the image is
not latest
This feature can
also be used to
know how you
will look like at
age ……….
Or how you
were at age…
14. “V.I.P. Identification” Software, based on face
recognition, for hotels and other businesses
“where there is a need to identify the presence of
important visitors
15.
16. This application is ideally suited to
hospitality environments or businesses where
there is a need to identify the presence of
important visitors, whether expected or
unannounced
17. In this application, the software
monitors the data from the real
time CCTV or surveillance
cameras, matching images
against what is likely to be an
opt-in database or individuals
they deem as important.
This can be integrated
with Loyalty card
Discounts and special
greetings and offers
can be given based on
the identification
18. Advantage
Special VIP guest identified as soon as they
walk in
For shopping malls no need to carry in loyalty
card ( cards are auto identified from database)
VIP entry could be auto messaged to the
manager’s mobile
High value customer’s can be given special care
from the moment they walk in by staff as
identification is done at entry point
19. Shop Lifters And Threat
Warning
Watch list application detects the presence of
unwanted individuals in a specific area. It
identifies individuals in an open environment
who provide a risk to public safety or a
security risk or possibly are known trouble
makers or offenders.( Includes marked
individuals as shop lifters)
If they are on some form of watchlist, face
recognition can be used to identify these
individuals quickly from the live CCTV footage
or security surveillance cameras
20. Our software can spot
and stop bad guys at
the gate
This advanced system
at the gate can stop
before it costs lot of
money by allowing
bad guys in
21. Facebook offers face-
matching software, called
“Tag Suggestions,” to
automatically suggest to
members the names of
people in photos they’ve
uploaded.
Advanced search engine
could also identify from
such social media the bad
guys list and maintain the
database
23. Attendance marking
Auto Login
Identification in a crowd
Data Acquisition on the go ( In large
enterprises the attendance can be captured
at the gate entrance)
In Hotels when visitors enters the
residential area can keep track
Air port booking
Banks neat ATM
Application
24. Proposed Application
A device with a logic board and a powerful camera ( small
device of the size of a thumb drive) fixed at the entrance.
Every person when crosses the gate the image is scanned and
compared with database
Attendance marked in automatically or if this device is in an
ATM, the Bank client identiffed automatically ( This system has
a 2nd phase where ATM cards can be replaced.. ) As soon as
the customer is identified an SMS will go to the registered
mobile and the person can operate ATM using this access code