MY ID

FAQ

Biometrics is an automated technology used for people recognition using physiological identifiers. Biometrics covers a variety of technologies in which unique identifiable attributes of people are used for identification and authentication. These include a person’s fingerprint, face, iris, voice, palm prints, which can be used to validate the identity of individuals. Biometric data is unique for each person so it can be used in almost any application that requires the accurate identification or verification of any individual

My-ID face identification system does not require any advanced hardware, as it can be used with existing image capture devices (smartphone IOS and android, webcams, security cameras etc.).

Usually these systems extract certain features from face images and then perform face matching using these features. A face does not have as many uniquely measurable features as fingerprints and irises, so facial recognition reliability is slightly lower than these other biometric recognition methods. However, it is still suitable for many applications, especially when taking into account its convenience for user. Facial recognition can also be used together with fingerprint recognition or another biometric method for developing more security-critical applications. The multi-biometric approach, followe by MY-ID, is especially important for identification (1-to-many) systems. In general, identification systems are very convenient to use because they do not require any additional security information (smart cards, passwords etc.). However, using 1-to-many matching routines with only one biometric method, can result in a higher false acceptance probability, which may become unacceptable for applications with large databases. Using face identification as an additional biometric method can dramatically decrease this effect. This multi-biometric approach also helps in situations where a certain biometric feature is not optimal for certain groups of users. For example, people who do heavy labor with their hands may have rough fingerprints, which can increase the false rejection rate if fingerprint identification was used alone.

My-ID face identification technology offers fast, reliable identification with live face detection, the ability of multiple face processing in a single frame and fast face matching in 1-to-1 and 1-to-many modes.

My-ID face algorithm implements advanced face localization, enrollment and matching using robust digital image processing algorithms, which are based on deep neural networks : Simultaneous multiple face processing. Face algorithm performs fast and accurate detection of multiple faces in live video streams and still images.

• Gender classification. Optionally, gender can be determined for each person on the image with predefined degree of accuracy during the template extraction.

• Live face detection. A conventional face identification system can be tricked by placing a photo in front of the camera. Face algorithm is able to prevent this kind of security breach by determining whether a face in a video stream is “live” or photograph.

• The liveness detection can be performed in passive mode, when the engine evaluates certain facial features, and in active mode, when the engine evaluates user’s response to perform actions like blinking or head movements.

My-ID Face recognition uses algorithm that can optionally estimate person’s age by analyzing the detected face in the image

My-ID allows optionally a quality threshold; it can be used during face enrollment to ensure that only the acceptable quality face template will be stored into database.

NO ; IT HAS DECIDED TO PROVIDE A SOFTWARE ARCHITECTURE THAT WILL PREVENT THE SHARING OF RESOURCES THROUGH A SINGLE INSTANCE OF MY-ID. IN A COMPLETELY THEORETICAL WAY WE COULD CHANGE THE SOFTWARE ARCHITECTURE BY VIRTUAL PARTITIONING THE DATA AND THE CONFIGURATION OF MY-ID, ALLOWING EVERY TENANT TO INTERACT WITH A CUSTOMIZED INSTANCE. THE RISK STRICTLY LINKED TO THE TREATMENT OF BIOMETRIC INFORMATION (OR TRACKS) PROMOTES US NOT TO ADOPT MULTI-TENANT LOGICS