Fast, High-Accuracy Facial Recognition will be Best for Executive Ordered Biometric Entry-Exit Tracking

In early March of this year, President Trump released a revised version of a previously released Executive Order titled “Protecting the Nation from Foreign Terrorist Entry into the United States.” Section 8 of this Executive Order directs the Department of Homeland Security (DHS) to expedite the completion of a biometric entry-exit tracking system. This new biometric enabled entry and exit vetting system poses a number of interesting challenges and opportunities for all stakeholders.

Department of Homeland Security and CBP Focus
Every day, approximately 100,000 flights take off around the globe with over 3.7 billion passengers projected to fly in 2017. The U.S. accounts for almost a quarter of that air travel currently. Our federal policy, infrastructure, manpower and technology are currently aligned to facilitate vetting individuals as they enter the country, but the same alignment is not in place to vet individuals exiting our borders. This allows foreign nationals to overstay visas and continue to live in the U.S. illegally. Addressing this exit challenge requires concerted efforts to align policy (domestic and international), invest in new border infrastructure, and leverage the best of biometric technology to ensure accurate, efficient identity vetting.

Border Entry and Exit Challenges
Luckily, the state-of-the-art in biometric vetting technology has evolved significantly since lawmakers initially envisioned the biometric entry/exit system in the wake of 9/11. Gone are the days of cost prohibitive and complex biometric technology. Fingerprints have long been considered one of the gold standard modalities of biometrics. These technologies require travelers to stop and submit fingerprints when crossing borders, thereby limiting throughput.

Face Recognition Provides Unique Benefits
The best solution for a modern biometric entry/exit system requires the stand-off, high-throughput, and extreme accuracy of facial recognition. U.S. Customs and Border Protection (CBP) has expressed an interest in a future where crossing borders leverages the security, convenience, and speed of frictionless authentication through facial recognition. NEC sees a similar world where travelers and passengers move seamlessly through transportation spaces such as airports. Their data are collected without contact so moving individuals do not need to stop to present fingerprints or a secure tokens such as a passport, border card, or driver’s license.

Furthermore, facial recognition technology does not require a large footprint or major renovations to existing border infrastructure. Where there are infrastructure challenges at the borders and ports of entry, facial recognition can be installed with minimal disruption to travel patterns or the need for additional queues or checkpoints. Fast and effective, facial recognition also works at a distance which will minimize travel friction at high-traffic areas. Effective policy that synchronizes data from the Department of State, Department of Homeland Security, Department of Defense and various federal law enforcement agencies will create an iron-clad backbone for the U.S. government to know who is currently on U.S. soil.

The next 12 to 18 months will be an exciting time of rapid change for all stakeholders involved in protecting our borders. The deployment of an effective and efficient biometric entry/exit system will undoubtedly enhance the level of security and convenience for travelers crossing our borders. This system will also support the flow of commerce, free from security threats. These attributes will contribute to the safety, security, and wellbeing of our nation.

Contact us today if you like to learn more about how NEC’s Advanced Recognition Systems can help your government agency.

Advanced Recognition Systems and Solutions

Want more information about a Safety and Security solution?

Fill out the form, and we’ll have a solutions expert reach out to you.

 

 

 



People. Patterns. Predictions. Meet the new NEC Advanced Recognition Systems.

This week I am celebrating my sixth anniversary with NEC. I recall that my original trip to visit the Headquarters in Tokyo was postponed by the unfortunate events of the 2011 Tsunami and earthquake.

Since then, we have established our Center of Excellence in North America and extended our offering to U.S. Federal clients. We also introduced a number of products and services, including ground breaking cloud-based Identity as a Service (IDaas), and we solidified our position as the premier provider to Law Enforcement and public safety clients in the United States.

These days, rather than thinking about the past I’ve been spending a lot of time thinking about the future. A future where I see continued proliferation of biometrics use, increased emphasis on crime prevention and a convergence of “identity” with access management. Through advancements in data analytics and artificial intelligence (AI), our biometrics technology can evolve from technology used to determine where people have been and what they may have done, to predict where people will go and what they will do.

In response to these emerging market trends, today I’m proud to announce that we have rebranded our former biometrics solutions division to NEC Advanced Recognition Systems. I believe that biometrics coupled with high-powered analytical engines can predict and positively alter our travel experiences providing easier access, shorter lines and improved utilization of resources; recognize patterns for real-time monitoring, threat assessment and escalation and through it all provide tools for improved planning and forecasting.

Want more information about a Safety and Security solution from NEC?
Want more information about a Safety and Security solution from NEC?

To underscore our mission and align our products and services the new Advanced Recognition Systems group will give emphasis to three key words: People, Patterns and Predictions.

People. Our primary mission is to serve citizens and the people who protect them. Whether keeping the public safe at home, supporting troops overseas, improving the experience of travelers, or providing the right identity at the right time, our advanced recognition systems supply trusted intelligence to help build safer and brighter communities.

Patterns. From fingerprint pattern recognition to arrangements of accessible data, sequences of critical information are everywhere—you just have to know where to look. Our cutting-edge advanced recognition systems can pinpoint valuable patterns for solving crime, strengthening national security, and identifying trends and efficiencies for tech-savvy businesses. All to help enable diverse missions and realize the possibilities.

Predictions. Our advanced recognition systems can transform the efficiency of your team. Instead of simply gathering and reporting data, our technologies analyze intelligence to predict public safety threats, alert agencies to emerging global concerns, pinpoint potential risks in high-traffic venues, and provide invaluable input to critical business decisions.

Our new name better aligns our extensive local and global capabilities in meeting the all-encompassing needs of our clients. Using our systems integration approach to the market we are committed to understanding our clients’ challenges first, and assist them with a full solution implementation in comparison to any specific biometric technology or tool.

While finding success in reaching these new markets, we remain committed to our roots and will continue to consistently provide high-quality, accurate solutions for government and public safety markets.


I’d like to thank everyone who has participated in NEC’s success in the past six years and who have also contributed to the study and launch of this new vision. I hope you’ll take a look around the new Web site and help us spread the word.

Here’s to the future!

Advanced Recognition Systems
People. Patterns. Predictions.
Raffie

Advanced Recognition Systems and Solutions

Want more information about a Safety and Security solution?

Fill out the form, and we’ll have a solutions expert reach out to you.

 

 

 



Congratulations to Irving’s New Chief of Police

NEC has been a part of the Irving community for over 30 years, and in that time we have seen many positive changes and been a part of the city’s growth and development. We also have a long standing relationship with the Irving Police Department and its former police chief, Larry Boyd, who retired last year. We are thankful for his leadership of the department for the last 12 years and his contributions to the community. It was a pleasure working with him and we wish him well in this new chapter of life.

Irving new police chief Accompanying former Chief Boyd on many of his visits to NECAM was Assistant Police Chief Jeff Spivey. Like Chief Boyd, Chief Spivey has a dedication to his profession and to the people of Irving that is admirable. He is also a strong supporter of the Irving Advocacy Center, awarded a grant from the NEC Foundation last year.

We are pleased that after conducting an extensive search, Irving City Manager Chris Hillman recommended Chief Jeff Spivey as the new Irving Chief of Police. He was confirmed March 23, 2017 by the Irving City Council. Join me in congratulating Irving’s new Chief of Police! We look forward to many more years of collaboration in serving the local community.

*Photo Credit – City of Irving Police Department

Ready to “face” the latest technology for shoppers?

At NRF17, we debuted our new facial payment solution, which allows registered shoppers to pay for their products with their face. No cash, checks or cards are necessary, you just use your good looks to save time and money.

You might have heard about the Amazon Go store prototype in Seattle, in which customers simply walk in, select their products, and walk out. With NEC’s NeoFace® facial recognition technology, which by-the-way has one of the world’s highest level of authentication accuracy, you can give your customers a similar experience.

How does it work?

Our technology matches pre-registered facial images against images taken and stored in the NeoFace® database by the POS (point of sale).  All a customer needs to do is opt-in to use the solution by submitting their photo and entering a PIN to keep their account secure. The PIN is entered at time of payment to confirm the person’s identity and account information.

Pretty cool! Watch our NRF video to see how it can work with you existing POS and how it can be deployed in your store.

Has it been tested?

Right now, NEC is testing the solution in Japan in cooperation with Sumitomo Mitsui Financial Group, Inc. (SMFG), Sumitomo Mitsui Banking Corporation (SMBC). In the trials, NEC, SMBC and Sumitomo Mitsui Card are testing the recognition performance, employee receptivity to biometric authentication, and functionality of the service. During the trial the goal is to gain the experience and know-how to provide a safe, secure, convenient cashless (and card-less) payment service utilizing facial recognition technology at other branches in the future.

We are also testing this solution in small shops in our headquarters building in Japan. Our trials are measuring authentication performance and accuracy, specifically when dealing with multiple conditions inside stores, such as, the types of cameras in use, camera positioning, installation, lighting and security.

Where can I learn more?

Retail solutions from NEC aim to help you “Know Your Customer” better. We work closely with our customers to develop a deep understanding of business needs to provide the best retail solutions possible and our facial payment product is just one of the innovative ways we can help retailers get things moving better — and faster — right in your own stores.

Check out NEC’s full retail suite by visiting www.necam.com/smartretail or let us know if you want more information by filling out the form below.

Learn More About NEC Retail Solutions

Want More Information?

Let us know!

Have questions about an NEC Retail Solution? Fill out the form, and one of our solutions experts will be happy to chat with you!

 
 
 
 
 



Data Centers or Infrastructure as a Service: Comparing Cost and Security

Deciding between building and maintaining your own data center or moving to the cloud or IaaS can be quite the head scratcher for an IT executive. In some cases, the terms “data center” and “cloud” might be interchangeable. The first step in decision-making is clarification of terms and a clearer understanding of your options.

Why move to the cloud? Can Infrastructure as a Service (IaaS) be used for a data center? Which option is better for the future needs of the organization?

Data Centers

“Data center” is a general term used to define an organized area of servers and storage, either onsite or offsite, that is managed by trained data center and IT specialists. The data center equipment is used to store user and organizational data and make it accessible when needed. With many data centers kept onsite, network users do not rely on an Internet connection to access the local data. As long as the local network connection is available, the data is accessible.

Cost

Building and maintaining your own data center include the following cost factors:

  1. Staffing and training – hiring IT expertise and paying for training to maintain, backup, restore and upgrade data center equipment, as needed.
  2. Architecting – forecasting for current and future data storage requirements, workload and scalability
  3. Facilities – finding an expandable location for the equipment that is secure, safe and with a low risk of break-ins and natural disasters
  4. Utilities – covering the cost of electricity, wiring, air conditioning and other utilities required to keep the servers running 24/7/365
  5. Equipment – purchasing and evaluating ever-changing equipment and storage needs, year over year
  6. Redundancy – ensuring the data is backed up or available immediately should the storage equipment or servers encounter a failure
  7. Software – purchasing the software required to keep the servers running efficiently and the data storage secure
  8. Expansion – planning for expansion of the data center as the data storage requirements increase

Free Ebook 5 Reasons You Can’t Ignore the Private Cloud Anymore

Security

If there is an emergency situation at the data center location, such as fire, flood or other physical damage, or an attempted data breach, the actual servers and storage are at risk of being harmed and unavailable. Backing up the data or maintaining a data center elsewhere may help mitigate the risk of failure or loss of data.

Cloud Computing

In plain terms, cloud computing is defined by the National Institute of Standards and Technology (NIST) as a set of shared resources and services available to end users (cloud clients), quickly and with little management, via an Internet connection. Cloud computing provides these services via three general models: software as a service (SaaS), platform as a service (PaaS) or infrastructure as a service (IaaS). An example of SaaS would be an email application accessed through a web browser. Platform as a service is typically used in the web or software development world. When developers need to collaborate on a project such as an application or software creation, PaaS offers a good option for a tool or platform to be used in this way. In the case of data centers, IT executives considering the “cloud” would be interested in using Infrastructure as a Service (IaaS). IaaS provides servers, storage, virtual machines and more for the use of running software and other necessary components needed in the IT environment.

Check out this eBook for ways to ease an SAP Implementation or Upgrade

Infrastructure as a Service (IaaS)

An IaaS environment is also considered a data center that is accessible via the cloud or Internet-based services, hence the reason the terms can cause some confusion. The difference is that the data center equipment is not purchased or maintained by the organization but rather purchased as an on-demand service from an IaaS provider. IaaS can be available via the “public cloud,” where the shared infrastructure services are open for public use. “Private cloud” is also an option, where the services are available, but only for the single organization and via a private network. Some providers are also offering a combination of these options, referred to as “Hybrid Cloud.”

Cost

The cost of building and maintaining IaaS is different from an organizationally-owned data center and can significantly assist in controlling budgets. As part of the service, the IaaS provider does the staffing and training of storage experts, provides the facilities and utilities, furnishes the equipment, backs up and builds redundancy of the data and offers security – all for a single price. With an in-house data center, the organization is paying for these requirements all the time. With “pay only for what you use,” IaaS provides customization, agility, control, dynamic scaling, optimization, security and efficiency for a lower total cost of ownership. And with an IaaS provider, there is also the ability to have the “latest and greatest” in technology, making it easier to stay up to date.

Security

When using a private cloud, IaaS offers dedicated servers for the organization’s mission critical data. The IaaS provider is offsite and builds redundancy and backups into the service so the organization’s sensitive data is always secure and available.

See also: What is a High Security Data Solution for IaaS?

Why NEC for Private Cloud IaaS?

As an original equipment manufacturer of servers and storage, NEC is uniquely positioned to offer IaaS to clients without the use of third-party sourcing. IaaS is not a “one size fits all” solution and NEC can tailor customizable configurations based on your organizational needs.

Cost

Because of the lower total cost of ownership, NEC’s IaaS solutions offer long-term scalable and quantifiable benefits to organizations at a predictable and financially manageable expense.

Security

NEC’s hosts its private IaaS infrastructure 200 feet underground at Iron Mountain’s Western Pennsylvania Data Center. Iron Mountain provides FISMA (Federal Information Security Management Act) compliance to ensure Department of Justice Level 4 security. This security level is the highest federal regulatory standard.

When considering cost and security, IT executives are weighing options for highly sensitive and mission-critical operational environments. As the organization’s needs expand, so will the cost of maintaining an onsite data center, equipment, real estate, utilities and more. Moving to IaaS, as part of a cloud computing solution, is an opportunity for enterprise environments to manage expanding requirements for security, regulatory compliance and business continuity at a lower total cost of ownership. NEC’s managed IaaS solution, as well as “best in breed” server and storage options, offers organizations dedicated servers, stored and physically secured deep in Iron Mountain’s underground data center.

Smart Enterprise

Free Ebook
5 Reasons You Can’t Ignore the Private Cloud Anymore

Need more information? Fill out the form to download the 5 Reasons You Can’t Ignore the Private Cloud Anymore ebook.