Entrance Control Application
AFCON Holdings, traded on the Tel Aviv Stock Exchange, is one of the oldest, most experienced, and leading groups in Israel in providing comprehensive solutions for infrastructure, electromechanical systems, control and automation, and communication in the field of rich technological projects.
The entrance control application is an implementation that enables large organizations to better manage entrance control and subsequently track the location of each guest within the premises.
The application was chosen by the European Union management as a leading implementation for entrance control to the offices of the European Union and its various agencies.
About the Project
The customer competed in a European Union tender to supply an application-based entrance control system. The solution chosen was a face recognition-based access control.
Client Objectives
- Enhanced security: Implementation of a robust access control system with minimal intervention by system administrators.
- Efficient entry processing: Reducing security personnel involvement during office entry while ensuring thorough verification.
- Scalability: The system's demand was to handle a large number of users without compromising performance.
- Integration: The system needed to integrate with existing security infrastructure.
Challenges in Application Development
- Real-time face recognition: Immediate matching of faces against a pre-verified database.
- Visitor logs: Detailed log management of all entries and exits with timestamp markers.
- Alert system: Immediate alerts for unidentified faces or security breaches.
- Multi-location support: Capability to manage access control for multiple sites/entry points simultaneously.
- Cloud backup: All data stored securely and backed up on cloud servers.
Our Solution in Application Development
- Advanced Open Source FaceNet-based algorithms developed in Python known for its precise face recognition methods.
- Privacy-focused model: Only essential data stored, and facial identification data encrypted. Upon system entry, a highly encrypted token is preserved, enabling real-time user identification when attempting to enter the building.
- Modular design: Modular app development allowing easy integration with various existing security systems.
- Performance optimization: Implementation of optimal data processing techniques ensuring smooth system operation even during peak entry and exit hours.
Results
- Swift access: Entry processing times reduced by 70%, allowing smooth traffic even during peak hours.
- High reliability: The system maintained a 99.8% accuracy level in facial recognition.
- User satisfaction: Both security personnel and users praised the system, with a satisfaction rate of 94% post-launch.
Application Advantages:
1. Smart management of all access permissions with a user-friendly interface.
2. Biometric identification based on facial recognition ensuring unique identification of the requesting visitor.
3. Alerts for unauthorized access attempts and/or non-conventional hours.