Our customers are improving interconnectedness through turn-key products that allow them to scan ID cards, capture selfies, and confirm identity. They choose Rank One because our technology meets their accuracy requirement, is robust to spoofing, and is easy to deploy.
As most access control devices operate on a tight bill of materials, ARM processors are chosen over x64, and every dollar saved on the camera sensor represents increased competitiveness. For these reasons, Rank One is enabling face recognition-based access control applications that other vendors simply cannot support due to their high computational cost, or requirements for high-end cameras.
The ROC SDK is well suited for forensic identification due to its robust accuracy on unconstrained media, and efficiency that enables tens of millions of records to be searched in under a second.
There are generally three factors that matter the most when choosing a face recognition algorithm for use in real-time screening:
1. Algorithmic efficiency. It is computationally demanding to process streaming video. With up to 6x the enrollment speed of our competitors, systems using the ROC algorithms require only a fraction of the compute power.
2. Accuracy on unconstrained imagery. As shown by NIST FRVT benchmarks, Rank One is amongst the few vendors with accuracies above 90% on in-the-wild data. Many vendors, who are otherwise strong on frontal faces, simply cannot handle unconstrained imagery.
3. Usability. It is rather straightforward to detect a face in a single image and compare it against a claimed identity or a database. It is far less simple to perform these same tasks while tracking a face in a live video stream. Rank One takes the hard work out of this process. Our API for facial tracking, frame consolidation / down-sampling, clustering, and fusion reduces development time and our support team (the same engineers who develop the ROC SDK) is always available should you need help.
There is no escaping the adverse impact a few select technology companies have had on nearly everyone's privacy. Whether it is social networks providing generous access to users' personal data, or backdoors planted in biometrics software, the message is clear to developers and users that privacy can no longer be assumed.
When developing solutions with the ROC SDK, decisions regarding data retention, storage and transmissions are up to the integrator. No hidden actions are performed by the SDK. It behaves exactly as described in the documentation.