1~21 item / All 21 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~21 item / All 21 items
We would like to introduce a case study on the implementation of facial recognition in the attendance management system of Nikken Academy, operated by Kenchiku Shiryō Kenkyūsha Co., Ltd. Nikken Academy is a vocational school specializing in the acquisition of qualifications for architects, real estate transaction agents, and various construction management engineers, with 114 directly operated schools nationwide. Before the implementation, there were the following customer challenges: - The hassle of preparing conventional IC cards - The desire to conduct strict identity verification, such as comparing with facial photos to prevent proxy attendance, but lacking sufficient manpower For details on how these challenges were resolved, please refer to the published catalog. This case study was released via PR TIMES by our sales partner, Sanshin Electric Co., Ltd. You can view it through the related links.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationAs the labor shortage becomes more serious, introducing facial recognition can streamline reception tasks and identity verification processes. Furthermore, by adding "visualization," it becomes possible to reduce manpower through unmanned or remote responses, leading to digital transformation (DX). Are you aware of this? In this seminar, we will introduce case studies and utilization scenarios using facial recognition products. Additionally, for customers who are unsure about what can be done with "facial recognition" or are wondering where to start with their challenges, we will provide tailored proposals. ◆Recommended for: - Those who do not know how facial recognition can be applied in various fields. - Those who have given up on implementing facial recognition due to high hurdles such as network security and management of facial data. - Those who want to improve their operations with a small start. - Those who are unsure about where to begin with their challenges.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "Face Recognition Spoofing Prevention Solution" is a face recognition system that does not require a database or network. It unlocks only when the facial features (i.e., QR code or IC card) and the facial image from the camera belong to the same person, preventing use by anyone other than the cardholder (thus preventing spoofing). By achieving two-factor authentication through ownership verification (QR code or IC card) and biometric authentication (face recognition), it not only enhances security for factory entry and exit but also contributes to fraud prevention and efficiency. 【Features】 ■ Since facial information is stored on a medium possessed by the user, management on the system side is unnecessary. ■ Multi-factor authentication is achieved through ownership verification (QR code or IC card) and biometric authentication. ■ Since there is no need to build a database or network, integration with business systems is easy. *For more details, please refer to the PDF document or feel free to contact us. *“QR code” is a registered trademark of Denso Wave Incorporated.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "Face Recognition Impersonation Prevention Solution" is a face recognition system that does not require a database or network. It only permits entry and exit when the facial features (i.e., QR code or IC card) and the camera's facial image belong to the same person, preventing entry and exit by anyone other than the cardholder (thus preventing impersonation). Since the verification is completed within the device, there is no need to build a network for authentication. By achieving two-factor authentication with ownership verification (QR code or IC card) and biometric authentication (face recognition), it not only enhances security for entry and exit at work sites but also contributes to efficiency. [Features] - Since facial information is stored in a medium possessed by the user, management on the system side is unnecessary. - Multi-factor authentication is achieved through ownership verification (QR code or IC card) and biometric authentication. - As there is no need to build a database or network, integration with business systems is easy. *For more details, please refer to the PDF document or feel free to contact us. *“QR code” is a registered trademark of Denso Wave Incorporated.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "Face Recognition Spoofing Prevention Solution" is a face recognition system that does not require a database or network. It unlocks only when the facial features (i.e., QR code or IC card) and the facial image from the camera belong to the same person, preventing use by anyone other than the cardholder (thus preventing spoofing). By implementing two-factor authentication with ownership verification (QR code or IC card) and biometric authentication (face recognition), it not only enhances security for access to important facilities but also contributes to fraud prevention and efficiency. 【Features】 ■ Since facial information is stored on a medium possessed by the user, management on the system side is unnecessary. ■ Multi-factor authentication is achieved with ownership verification (QR code or IC card) and biometric authentication. ■ As there is no need to build a database or network, integration with business systems is easy. * For more details, please refer to the PDF document or feel free to contact us. * "QR Code" is a registered trademark of DENSO WAVE INCORPORATED.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWith the spread of the internet and social media, not only resellers but also individual reselling has become active. As a result, the phenomenon where people who want tickets end up purchasing them at prices above the original price has been raised as a social issue. In this article, we will explain the law regarding reselling, known as the "Prohibition of Unlawful Ticket Resale Law." We will also introduce measures for event organizers to prevent unlawful ticket reselling using facial recognition systems. You can view the detailed content of the column through the related links. *For more information, please refer to the PDF document or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationDespite the negative aspects being recognized by companies, in recent years, issues such as deficiencies in quality inspection systems, violations of emission standards, and falsification of measurement data have been frequently reported in the media, highlighting not only quality issues but also fraud related to certifications. This article will explain why quality fraud occurs and how to address it. You can view the detailed content of the column through the related links. *For more information, please refer to the PDF document or feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIf qualified personnel can be managed appropriately, it can lead to improvements in the quality of the products being manufactured. Additionally, by keeping track of qualified personnel, it can prevent unqualified individuals from being involved in critical tasks (such as quality inspection and management operations). This article explains the purpose and methods of managing qualified personnel. For more details, you can view the related links. *For more information, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWhen products are shipped without conducting inspections based on UL standards, and quality issues are pointed out, it is viewed as "inspection fraud" by customers and society. Inspection fraud not only lowers the quality of workers but also damages the company's brand and reliability, so companies must make every effort to prevent such fraud from occurring. This article explains the basic points of what inspection fraud is, the causes of its occurrence, and the methods to counteract it. You can view the detailed content of the column through the related links. *For more information, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe will be exhibiting our facial recognition spoof prevention solution at the booth of Shimizu Sintech Co., Ltd. during "e-messe kanazawa 2024," which will be held at the Ishikawa Industrial Exhibition Hall No. 1 from May 16 (Thursday) to May 18 (Saturday), 2024. On the day of the event, not only will we introduce our products and use cases, but we will also provide a facial recognition experience with demo units. We invite you to visit the Shimizu Sintech Co., Ltd. booth (booth number: 066) when you attend! We sincerely look forward to your visit. *If you wish to attend, please register in advance on the official website of e-messe kanazawa 2024. 【Exhibition Information】 Exhibition Name: 39th Ishikawa Information System Fair "e-messe kanazawa 2024" Date and Time: May 16 (Thursday) to May 18 (Saturday), 2024, from 10:00 AM to 5:00 PM Venue: Ishikawa Industrial Exhibition Hall No. 1 Booth Number: 066 (Shimizu Sintech Co., Ltd.)
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn Nagareyama City, Chiba Prefecture, which boasts the highest population growth rate in the country for six consecutive years, efforts are being made to improve the childcare environment aimed at the parenting generation in their 30s and 40s, making it a city that is easy to raise children. As the number of childcare-related facilities increases, a new initiative launched in December 2022 at the children's center is attracting attention. The "Sankotechno Plaza Minami-Nagareyama Children's Center" is utilizing a "facial recognition impersonation prevention solution" for managing the entry and exit of children. *For more details on the column, please refer to the published catalog. For more information, feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn Nagareyama City, Chiba Prefecture, which boasts the highest population growth rate in the nation for six consecutive years, efforts are being made to improve the childcare environment aimed at the child-rearing generation in their 30s and 40s, making it a city that is easy to raise children in. Amidst the increasing number of childcare-related facilities, a new initiative launched in December 2022 at the children's center is attracting attention. The "Sankō Technoplaza Minami-Nagareyama Children's Center" is utilizing a "facial recognition impersonation prevention solution" for managing the entry and exit of children. *For more details on the column, please refer to the published catalog. For more information, feel free to contact us.*
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce the use case for our "Face Recognition Impersonation Prevention Solution" for children's centers and public facilities regarding entry and exit management. After verifying the identity in person beforehand, a two-dimensional code is generated, and a user card is issued. At the facility entrance, identity verification is conducted using face recognition, and if authentication is successful, the system records the entry and exit information. By adopting face recognition for identity verification during entry and exit at children's centers, we contribute to preventing unauthorized access. 【Overview of Use Case (Partial)】 ■ Issues - The entry and exit times are handwritten, making it cumbersome. - User cards can be borrowed and lent, leading to inaccuracies. - We want to increase users by implementing face recognition. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationWe would like to introduce a use case for age verification at self-checkout using our "Face Recognition Spoof Prevention Solution." Prior to purchase, we verify that the customer is over 20 years old in person and issue a purchase permit. During the purchase at the self-checkout, age verification is conducted using face recognition. If the face recognition is successful, the payment selection screen is displayed, allowing the purchase to proceed. By implementing age verification through face recognition, we achieve contactless, unmanned, and labor-saving operations in stores and facilities. 【Use Case Overview (Partial)】 ■ Challenges - In the case of alcohol sales, face-to-face age verification is required. - We want to expand our stores but lack sufficient staff. - We want to extend business hours to improve convenience. *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis document is a collection of case studies on the use of "facial recognition impersonation prevention solutions" in financial institutions. It includes two case studies addressing challenges in counter service operations and ATMs. We introduce efforts to reduce customer burden and prevent impersonation. We also explain facial recognition that enables secure identity verification. Please feel free to download and take a look. [Contents] ■ Transitioning to stamp-less/document-less identity verification: IT modernization required in the financial industry ■ What is facial recognition that achieves secure identity verification? ■ Case studies addressing challenges in financial institutions ■ Introduction to facial recognition impersonation prevention solutions *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis document is a collection of case studies on the use of facial recognition anti-impersonation solutions in events and theme parks. It includes two case studies addressing challenges and introduces initiatives for "smooth entry" and "ticket resale prevention." It also explains facial recognition technology that performs "identity verification" for ticket purchasers with high accuracy and smoothness. We encourage you to read it. [Contents] ■ "Ticket Resale" and "Unauthorized Entry" at Events and Theme Parks ■ What is facial recognition that performs "identity verification" for ticket purchasers with high accuracy and smoothness? ■ Case studies on problem-solving in events/theme parks ■ Introduction to facial recognition anti-impersonation solutions *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThe "Face Recognition Spoofing Prevention Solution" is a face recognition system that does not require a database or network. It can be implemented using a QR code or IC card along with a single smart device, allowing for reduced implementation costs compared to conventional face recognition systems that require a face recognition server. Additionally, it contributes not only to enhanced security but also to fraud prevention and efficiency improvement. 【Features】 ■ Since face information is stored on a medium held by the user, management on the system side is unnecessary. ■ Multi-factor authentication is achieved through ownership authentication (QR code or IC card) and biometric authentication. ■ No need for database or network construction, making integration with business systems easy. We are currently offering a "Case Study Collection on Utilization in Manufacturing" for this solution. ◎ Contributes to preventing inspections by unqualified personnel with "IC Card + Face Recognition." ◎ Contributes to preventing inspections by unqualified personnel with "QR Code + Face Recognition." ◎ Contributes to preventing unauthorized use of keys with "QR Code + Face Recognition." This document includes not only these examples but also an introduction to the solution. *You can view it immediately from the PDF download. Feel free to contact us for inquiries. *“QR Code” is a registered trademark of DENSO WAVE INCORPORATED.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis document introduces case studies of problem-solving in the manufacturing industry utilizing the "facial recognition spoofing prevention solution." It includes examples such as preventing inspections by unqualified personnel with "IC card + facial recognition" and preventing unauthorized use of keys with "QR code + facial recognition." Additionally, an overview of the product is provided, so please make use of it when considering implementation. [Contents] ■ Increasing "quality fraud" in the manufacturing industry ■ What is facial recognition to prevent quality fraud? ■ Case studies of problem-solving in the manufacturing industry ■ Introduction to NEC's facial recognition spoofing prevention solution *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationQuality fraud issues in the manufacturing industry. By identifying workers, we can deter opportunities for tampering with inspection results and support fraud prevention. This document presents a use case for preventing inspection fraud in the manufacturing industry, introducing customer challenges, the effects of solution implementation, and usage images. Additionally, it provides an overview of our product, making it a useful reference when considering implementation. Please feel free to contact us if you have any inquiries. [Contents] ■ Customer challenges and effects of solution implementation ■ Usage images ■ Overview of facial recognition impersonation prevention solutions *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationIn this document, we introduce development examples of an embedded "spoof prevention feature" using facial recognition, which contributes to enhancing competitiveness and product value. We present a case where this feature was integrated into "inspection equipment" to strengthen security functions, and another case where it was incorporated into "ATMs" to enable non-face-to-face identity verification and account opening. Additionally, we explain the "facial recognition spoof prevention solution" that does not require a database or network, which contributes to enhancing product value. We encourage you to read it. [Contents] ■ Changes in the environment surrounding equipment manufacturers ■ What is facial recognition for "identity verification" used by operators utilizing production equipment and measuring instruments? ■ Collection of case studies on embedded development applications ■ Introduction to NEC's facial recognition spoof prevention solution *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationOur company offers a terminal-based facial recognition solution that does not require a server environment. The door unlocks only when the facial feature quantity (QR code) and the camera's facial image belong to the same person. Use by anyone other than the cardholder is not permitted (to prevent impersonation). This solution enables appropriate identity verification for worker qualification checks, facility entry and exit management, and integration into KIOSK terminals. 【Features】 ■ Low management burden of personal information as it does not use a database ■ Facial recognition possible in locations without network connectivity ■ Easy system integration due to its simple structure ■ Equipped with NEC's advanced facial recognition engine *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration