Welcome to the official website of goalkeeper technology group.
The face image collection terminal is arranged in the entrance channel of the personnel intensive and key personnel control and other places. The system compares the collected face image with the face image library. After the comparison is successful, it is supplemented by manual development. The warning information is sent to the responsible person or responsible terminal through SMS or platform instruction. Carry out disposal work.
Product category:Arrange the face image collection terminal in the import channel of personnel intensive and key personnel control and other places. The system compares the collected face image with the face image library. After the comparison is successful, it is supplemented by manual development. The warning information is sent to the responsible person or responsible terminal through SMS or platform instruction. Carry out disposal work.
Face Image Acquisition Terminal
Face capture camera
After the photographer captures the image through the face, the camera automatically captures the captured face for face deduplication, face quality evaluation, etc., and finally passes the qualified face. The photos are passed to the background and compared with the key personnel face database for identification.
Normal webcam
After the passenger monitors the area through the webcam, the camera automatically obtains the video stream and sends it to the face detection server. The face detection server performs face detection and face on the video stream. Process operations such as de-weighting and face quality evaluation, and finally pass the qualified face photos to the background and identify them with the key personnel face database.
Product Features:
☆ System privilege rating: The city bureau grants authority, assigns different accounts to the branch office, and realizes multi-account information sharing
☆A(yù)lert Send: SMS, WeChat, etc. are sent to the responsible person terminal for control, and the key personnel information is grasped in real time
☆ Research and judgment tools: According to the investigation of the case, the key personnel can be controlled and tracked according to time and region.
☆Chengdu City Video Docking: Interfacing with Ping An City Video Surveillance, Conducting Key Staff Control
☆Public Security Bureau platform docking: docking public security system platform, early warning information is sent in real time
Applications:
★Train station, bus station, coach station, subway station, bus station, airport, etc.
★People intensive places, large conference security, temporary staff control
Static Face Search System
In recent years, due to the need for counter-terrorism, homeland security, and social security, countries around the world have increased their investment in security. Identity is a core issue of security.
Static face search, mainly complete 1:1 or 1:N face comparison, that is, upload pictures to the system specified search library, specify topN range, search out The top N face images, if the image contains character attribute information, are also displayed together. For example, the public security case input needs to query the face image of the personnel, and the identity information of the key personnel can be confirmed from different key personnel pools (the petitioner library, the anti-personnel library, the drug library, the fugitive library....).
Product Features:
☆Target Library Management: Create, modify, query, empty, delete target libraries, etc.
☆Face picture management: the same, the people's picture into the library to extract features, query picture information, delete face pictures and features, etc.
☆1:N face image search comparison: single image is compared with the target library, return topN comparison result
☆1:1 Face Image Search Comparison: Single image is compared with a single image, returning the ratio
☆Face image attribute extraction: Get the attributes of a single image
Product Features:
★Inbound speed: 150 frames per second
★L(fēng)arge library capacity: 1 million standard, can expand billion-level storage capacity
★1:N multiple concurrent task processing, scalable
★1:1 concurrent task processing, scalable
★ Faster comparison, tens of thousands of face seconds search
Applications:
Public, Judicial, and Criminal Investigation: Corporate, Residential Security, and Management.