Skip to content

訊連科技FaceMe®獲日本NTT DATA採用 使用於東京澀谷Tokyu Hands打造遠距零售概念店

202086日,台北訊】 AI臉部辨識技術領導廠商訊連科技(5203.TW)宣布,旗下FaceMe® AI臉部辨識引擎獲日本NTT DATA株式會社(NTT DATA)採用,於東京澀谷的Tokyu Hands零售店,打造遠距零售概念店之實地驗證專案。於本專案中,NTT DATA整合了遠距接待、數位看板及AI數據分析等功能,並透過FaceMe®臉部辨識獲取來客之年齡、性別、情緒等資料,搭配語音數據進行分析,打造新一代無人商店智慧零售解決方案。

日本NTT DATA集團是全球排名前10之IT服務供應商,亦是日本最大的資訊系統整合公司。近年來勞動人口降低,零售業實體店面擴張有限。此外,因新冠病毒(COVID-19)影響,實體店面店員需減少接觸風險。有鑑於此,NTT DATA打造了一套非接觸性的零售解決方案,並於2020年6月1日至15日,透過設置於東京澀谷Tokyu Hands(SCRAMBLE SQUARE分店)打造之UV商品無人櫃位,進行本解決方案的實地驗證。

此解決方案以電子看板指引來客,並使用一體化、含商品展示及顯示螢幕之櫃位進行商品陳設及來客互動。位於新宿辦公室的專業工作人員透過虛擬分身,向前來專櫃之客戶遠距進行產品介紹及使用建議,可有效解決專業人員人數有限、無法同時服務多個實體店鋪的資源及地理限制。並藉由訊連提供的FaceMe® AI臉部辨識,進行來訪客戶之年齡、性別、情緒等訊息之擷取,整合NTT Data的語音轉文字內容,收集的資料可用來改善客戶服務品質、產品開發及評估行銷活動之成效等。

NTT DATA本次進行之實地驗證係採用訊連科技開發之FaceMe® AI臉部辨識引擎。FaceMe®可支援各IoT/AIoT物聯網技術及平台,包含多種處理器(如:支援OpenVino™之Intel®處理器、ARM處理器)、AI視覺運算晶片(如: Intel® Movidius)及IoT平台(如: NVIDIA Jetson™)。此外,FaceMe®亦可應用於Windows/ Linux/ Android /iOS 等作業系統。以IoT/AIoT物聯網來說,FaceMe®可運行於輕量化、低功耗之物聯網平台,協助開發者快速於現行解決方案中導入臉部辨識功能。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

訊連科技FaceMe® AI臉部辨識引擎獲日本Bitkey公司採用 打造「Bitkey Platform」之零接觸刷臉門禁解決方案

AI臉部辨識技術領導廠商訊連科技(5203.TW)宣布,旗下FaceMe® AI臉部辨識引擎獲日本Bitkey公司(ビットキー社)採用,整合至Bitkey打造的「Bitkey platform」刷臉門禁解決決方案,可提供身分辨識、認證及特定區域進出管理等多樣化應用。該方案可應用於智慧住宅、智慧門禁等多種場域。

訊連科技FaceMe® AI臉部辨識引擎獲日本Bitkey公司採用 打造「Bitkey Platform」之零接觸刷臉門禁解決方案

Bitkey為2018年成立之日本新創公司,提供多樣化之智慧門鎖解決方案,可建置於智慧居家、智慧住宅、智慧門禁等多樣化場景。全新的「Bitkey platform」係針對智慧建築設計之解決方案,可透過非接觸性的臉部辨識進行身分認證及門禁。首個安裝案例為位於東京江東區的住宅大樓之智慧門鎖,居民可透過臉部辨識進行開鎖,省卻使用門禁卡、鑰匙的不便。

「於新一代的智慧住宅中,採用物聯網技術的門禁及保全系統是不可或缺的一環,而其中臉部辨識是此類建置最廣為應用的技術。」訊連科技黃肇雄執行長表示:「透過FaceMe®的臉部辨識技術,Bitkey開發的Bitkey platform可大幅提升智慧門禁的便利性及安全性。」

「Bitkey platform」的臉部辨識技術係採用訊連科技開發之FaceMe® AI臉部辨識引擎。FaceMe®可支援多種IoT/AIoT物聯網技術及平台,包含多種處理器(如:支援OpenVino™之Intel®處理器、ARM處理器)、AI視覺運算晶片(如: Intel® Moviduis)及IoT平台(如: nvidia Jetson™)。此外,FaceMe®可支援Windows/Linux/Android/iOS等多種作業系統。以IoT/AIoT物聯網應用來說,FaceMe®可運行於輕量化、低功耗之物聯網平台,可協助開發者快速於現行解決方案中導入臉部辨識功能。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

GREYCORTEX MENDEL 3.6.1 NOW AVAILABLE

GREYCORTEX has released the latest version of its MENDEL network traffic analysis solution. Version 3.6.1 brings important  improvements and bug fixes.

ENHANCEMENTS

Improved Incident management

  • Added incident label management (custom labels)
  • Excluded false positive incidents by default
  • Possibility to add watchers from incident page form
  • Ability to change incident state
  • Changed PDF report title
  • Added time range into PDF report title page
  • Added new items into incident overview header in PDF report

Faster representation of event queries in the lightbox
Removed user information from managerial/security reports and emails
Reworked firewall plugins compatibility with PaloAlto
Added ability for no-reinstall recovery after motherboard replacement on DELL server

FIXED ISSUES

In general, our development team focused on improving user experience and reporting, as well as more improvements to user experience, system stability, and performance.

OFFICIAL MENDEL PRODUCT SUPPORT

Full-service support is provided for the versions 3.6.x and 3.5.x. Limited service support is provided for previous version 3.4.x. Versions 3.3.x and older are no longer supported, end-users with valid support and maintenance or active SW subscription can upgrade to the supported version(s).

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

Why It’s Important to Control What’s on Your Wireless Network at All Times


There is no doubt that your wireless network is a critical component of business operations. Strong wireless connectivity enhances productivity and flexibility, especially for organizations that have a Bring Your Own Device (BYOD) policy, IoT infrastructure components, contractors, guest users, and so forth. A wireless network is also inherently scalable, making it ideal for companies undergoing rapid growth. There are a number of daily usage scenarios, however, that can put your wireless network at risk.

Scenario 1: Rogue Devices
It’s inevitable…employees will bring their personal devices (smartphones, wearable watches, etc.) to the office, and a percentage of those will attempt to connect to your wireless network (some automatically). While they may only be connected briefly, they are nonetheless connected. If you can’t see them on the wireless network, you can’t control them – and that’s an unnecessary and avoidable risk to take.

Scenario 2: Guests
Occasionally, an employee might bring their kids to work. Kids being kids these days, they will likely want internet access to play a game or watch YouTube videos on their smartphones or tablets. If you’re lucky, they’ll simply rely on their cellular network to load this content, but if not…guess what? They will try to connect to the corporate wireless network. In this scenario, let’s hope you’ve set up some sort of accessible, internet-only, wireless network, designed to remain separate from the professional corporate network.

Scenario 3: Contractors
Many businesses hire contractors or consultancies to tackle specific projects. These individuals and groups will need network access for extended periods of time and will need to be granted access to company resources and sensitive, proprietary data. In this instance, you should be employing NAC across your wireless network in order to dictate and enforce the level of access these types of individuals receive based on internal policies.

How to Protect Your Wireless Network
Of course, these scenarios will mostly be harmless. Mostly. They could, however, serve as an additional attack surface against your network or a base-station from which to launch a wider DDOS attack. In the past few years, there have been several DDOS attacks on corporate networks via hacked IoT devices that were used as a springboard to dive into networks, such as the 2016 Dyn cyber-attack.

Considering all of these potential risks to your enterprise network, here are a few security focus points to keep your operations safe:

100% coverage and awareness of all access scenarios to your wireless network (via simplified 802.1x based authentication and authorization services). This way you will have full awareness of all connecting devices on your networks at all times.
Auto-segmentation – automatically push unmanaged/unwanted devices from your wireless network to a different network (e.g. internet-only). You should be able to automatically classify and place every device connecting to your network in its correct segment based on your own classification. The right technology affords micro-segmentation by diving deeper and fine-tuning the segmentation options in your internal network and offers automated actions to enforce it.
Immediate disconnect options – you should be able to remove devices from your wireless network, both automatically and manually, no matter where the devices are connecting from.
WiFi provides fast and reliable connectivity for employees and visitors and enhances productivity but if you do not know (or have technology that keeps track) of devices as they attempt to connect to your network, there is not much that you can do to stop it, or to make sure that they are connecting to a harmless section of it. Awareness combined with automated protective actions will allow you to effectively navigate all scenarios while at the same time handling a large number of wireless devices in the enterprise.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

訊連科技與利凌策略合作 打造採用FaceMe®的非接觸性智慧安防解決方案

20200728日,台北訊】 全球頂尖AI臉部辨識領導廠商訊連科技 (5203.TW) 與智慧安防解決方案領導廠商利凌企業合作,於利凌之NAV人臉辨識主機中導入FaceMe® AI臉部辨識引擎,打造集智慧安防、數據分析及即時示警之非接觸性智慧安控解決方案。

利凌(LILIN)為全球頂尖的IP 安全監控錄影產品製造商,提供IP網路攝影機、錄影主機及相關安防應用服務。透過與訊連的合作,利凌於旗下NAV人臉辨識主機中導入訊連開發的FaceMe® AI臉部辨識引擎,提供用戶各式非接觸的智慧安防解決方案。於辦公室、工廠、住宅等場景中,即時確認進出人員身分及管控進出人員權限。而於零售、服務業,則可透過分析來客於特定活動、場域之即時情緒反應,進行資料分析及優化消費體驗。

全球新冠肺炎疫情尚未趨緩,訊連科技與利凌共同打造之解決方案,具備臉部辨識非接觸辨識之優勢,可取代傳統磁卡及輸入密碼,降低病毒透過接觸物體表面傳播的風險。

「智慧安防是近年AIoT應用的重要領域,而臉部辨識已成為智慧安防產業不可或缺的創新技術。」訊連科技黃肇雄執行長表示:「利凌為全球AIoT智慧安防的領導廠商,而訊連是國際頂尖臉部辨識開發商。透過本次合作,我們可將安全、可靠、高效的臉部辨識應用導入至各式智慧安防應用場景。」

「利凌企業深耕智慧安防產業多年,根據市場需求提供不同解決方案。此次非常榮幸與訊連科技合作,將FaceMe®整合至利凌之臉部辨識系統,精準應用於智慧零售、醫院工廠及其他工業場域。」利凌企業董事長許正忠表示:「未來利凌企業也將持續精益求精,為全球客戶帶來最優質的智慧安防解決方案。」

訊連與利凌將於2020年8月13日14:00 – 15:00共同舉辦「Facial Recognition x Smart Security – Empowering Smart AIoT Applications 線上研討會,介紹雙方合作優勢,及如何於各式安防應用中使用臉部辨識。更多詳細資訊及活動報名請上活動官網 (本研討會以英文進行) : https://is.gd/SfXQ7l

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×