Access Point AI

Making the world safer through visual intelligence
 Follow Product

Overview

Access points come in different flavors.

In the world of cybersecurity, an access point is a device that creates a wireless local area network, usually in an office or large building. An access point connects to a wired router, switch, or hub via an Ethernet cable, and projects a Wi-Fi signal to a designated area.

In the world of physical security, access points are the physical points of entry where people can enter or leave a building or secured area. These access points are often protected with turnstiles, gates or security doors.

In both cases, access points must be protected.

In the cyber world, businesses need to lock down these access points from attackers who try to install rogue wireless access points on your network without your knowledge. Similarly, access points in the physical world need to be locked down. That’s why facilities managers install those tall, sweeping revolving doors at high-end hotels, or the waist-high gates you need to pass through at an amusement park? More sophisticated access control systems track activity and keep unauthorized visitors out of business locations.

The lines between physical and cybersecurity are blurring and it goes beyond sharing some common vocabulary.

Organizations are realizing that cyber and physical assets can be targeted, separately or simultaneously, and compromised resulting in financial and data loss. Hacking into network systems is not the only way that sensitive information can be stolen or used against an organization. Physical security must be architected correctly to prevent attackers from gaining access. Afterall, firewalls, encryption and other network security measures can be rendered useless if a bad actor can physically access your network. In addition, today’s threats are often a result of hybrid attacks targeting both physical and cyber assets.

The commercial adoption and integration of Internet of Things (IoT) devices have only expanded the attack surface and further blurred the once delineated functions of cybersecurity and physical security.

This is where Access Point AI comes into play.

AnyVision’s Access Point AI platform leverages a number of state-of-the-art technologies including computer vision, machine learning, liveness detection and biometrics to help protect an organization’s physical access points. By identifying authorized personnel and persons of interest in real-time — whether VIPs or bad actors — modern enterprises can layer in additional operational insights to streamline the customer experience. Access Point AI is being used to optimize touchless access control, video surveillance, and watchlist alerting. This same platform will drive operational insights including occupancy analytics, people counting, and dwell times as well as flag potentially dangerous behavior.

Access Point AI also includes important privacy controls to protect the rights of data subjects. We have implanted several features such as anonymous processing (comparing mathematical vectors of faces and not the actual facial images to identify persons of interest), face-blur (the option to blur all the faces of individuals that were not enrolled to the watchlist), and privacy mode (the option to discard all detections of non-enrolled individuals). These features are designed to quickly apply advanced privacy settings, to collect only the data that is strictly necessary for the purposes of the processing (data minimization), and to automatically and selectively clear data from an active database at the end of a certain period, or to easily delete unused data.

Access Point AI is redefining the role of visual recognition within organizations. This state-of-the-art technology is being integrated with video chips and IP cameras to make security cameras and access control systems smarter by extracting valuable data from high-resolution video streams in real-time. Access Point AI enables low-power, high-resolution IP security cameras with features such as facial recognition, person detection, analytics and more.

Access Point AI is also fueling the move to the Edge. Our platform pushes more of this processing to the actual cameras and dramatically reduces the need for expensive, on-premise servers, fundamentally changing the historical paradigm for large-scale video security and biometric-based access control. The ability to perform real-time video analytics directly on cameras and within access control systems is a growing trend in the convergence of AI and IoT. The combination of AnyVision’s Access Point AI software and edge computing will enable smarter AIoT devices for the next generation of security and access control systems.

The promise of Access Point AI starts to gain real traction as more and more of compute processing moves to the edge. What this will allow us to do is better protect the anonymity of bystanders who come into the camera’s field of view. Because the video data is stored locally on the edge device, AnyVision will only transmit the images of individuals who are matched to the organization’s watchlist to their central servers or Cloud. This protects the privacy of all other non-watchlist people and minimizes the attack surface since only POI data is transmitted back to the network.

We’re just at the beginning of this journey, but the evolution of Access Point AI offers the promise to reimagine physical security. As we continue to train our models, we’re learning more and more about how AI can benefit – and redefine — security and create new opportunities for everything from intelligent threat detection, touchless access control, watchlist alerting to personalized customer experiences.

Details

End users are viewing your products!

Make sure they have all the information they need.

If you own this product, sign in to complete this section

Images

End users are viewing your products!

Make sure they have all the information they need.

If you own this product, sign in to complete this section

Videos

Sorry, you must be logged in to view the rest of this page

Please log in or create an account to view more details.

Customers and Partners

Documents

Sorry, you must be logged in to view the rest of this page

Please log in or create an account to view more details.

Expert Analysis

Sorry, you must be logged in to view the rest of this page

Please log in or create an account to view more details.

Compare items
  • Total (0)
Compare
0

Shopping cart

Coming Soon!

This resource is not yet available!

Ok

Coming Soon!

The Events Resource will launch in June.

Ok

Coming Soon!

The Events Resource will launch in May.

Ok

Coming Soon!

The Grants Resource will launch in 2022.

Ok

Coming Soon!

The Innovation Opportunities Resource will launch in 2022.

Ok

Coming Soon!

The Venture Capital (VC’s) Resource will launch in 2022.

Ok

Applications for Phase 1 closed on March 21st

If you have questions about the phase 1 application, please email [email protected] .

Ok

Coming Soon!

The Grant Portal Resource will launch in 2022.

Ok

Coming Soon!

The Innovation Hq Resource will launch in August.

Ok

Coming Soon!

The Pilot Applications Resource will launch in 2022.

Ok

Product Builder

Innovators can add important details about their products, using the product builder, that will help end-users on the R2 Network identify their solutions and understand fit.

Ok

R2 Learn

Resources to educate Entrepreneurs and First Responders on the unique challenges and opportunities in the public safety market. Search for courses, customize your library or add a course below.

Ok

Events

In-person and online opportunities to engage with the public safety community around what's new in response and resiliency technology.

Ok

Product Finder

First responders and public safety agencies can use the product finder to identify the technology solutions their agency needs to address response and resiliency challenges.

Ok

Grant Portal

Public safety agencies will be able to use the Grant Portal to identify the grants they qualify to procure needed technology and resources. Entrepreneurs can use the grant portal to find funding to support the development of their technology.

Ok

Venture Capital

Finding investors to support start-ups in the public safety market is a huge challenge. A growing list of institutions and individuals are helping to meet the critical need. This resource will help connect funding sources with venture-ready public safety technology companies.

Ok

RFP Finders

Navigating the complex RFP world is a difficult process for most startups. The RFP Finder will help innovators identify qualifying procurement opportunities.

Ok

Innovation Opportunities

Programs and challenges designed to help promote and support the growth of public safety innovation. Stakeholders can add opportunities and recruit participants, while innovators will be able to apply in just a few clicks.

Ok

Celebrating 1 Year of the R2 Network

We'll celebrate the formal launch of the R2 Network with an eye towards the future. We will highlight what's to come from the Network designed to enable innovators and support end-users of the public safety industry.

Ok

Stakeholder User Group

Stakeholders are the backbone of the public safety industry. Federal agencies, associations, distributors, corporations, and other service providers play a vital role in the innovation ecosystem. We're launching a dedicated Stakeholder user group in the R2 Portal to help streamline Stakeholder interaction on the Portal with admin like abilities to create programs, events, content, and even products. Stay tuned for continued feature releases to improve stakeholder functions through 2022.

Ok