First Steps after Deployment¶
Once you have successfully deployed FindFace Security, it is time to open the web interface and get started. In this chapter, you can find a recommended sequence of steps that will help you harness your system’s complete functionality.
In this chapter:
Organize Cameras¶
- Create a new camera group or use the default one. A camera group is an entity that allows you to group cameras subject to their physical location. For example, cameras at the same entrance to a building can be combined into one camera group.
- Add cameras to the camera group and check their statuses.
You may also need:
- Configure your system to process video from the group of cameras at their physical location. It may come in handy in a distributed architecture. Learn more.
- Consider enabling event deduplication if observation scenes of cameras within the group overlap. This feature allows you to exclude coinciding facial recognition events among cameras belonging to the same group. Learn more.
Organize Watch Lists and Dossiers¶
- Create a new watch list or use the default one. A watch list is an entity that allows you to classify people by arbitrary criteria: blacklist, wanted, VIP, staff, etc.
- Upload dossiers and add them in the watch list either manually, in bulk via the web interface, or use the console bulk upload function.
You may also need:
- Distribute dossier database among several hosts. The dossier database will be available for editing on the
master
server and reading and monitoring on theslaves
. - Customize dossier content. Create additional fields, tabs, and search filters.
Create Users and Grant them Privileges¶
- Check out the list of predefined user roles and create new roles if necessary.
- Add users to the system and grant them privileges.
Start Monitoring Faces¶
By default, FindFace Security is monitoring only unmatched faces. To enable a custom watch list monitoring, simply make this list active. You can also turn on sound notifications and request manual acknowledgment for the events associated with the list.
You may also need:
- Make events more informative by enabling recognition of gender, age, emotions, beard, face mask, and glasses. Learn more.
- Protect your system from spoofing by enabling the Face Liveness Detection functionality. Learn more.
Organize Video Surveillance¶
Create a camera layout for essential video surveillance.
Start Counting Faces and Silhouettes¶
Set up counters to count faces and silhouettes on connected cameras. This functionality can apply to a wide range of situations, such as people counting in queues and waiting areas, monitoring public gatherings, crowding prevention, and more.
FindFace Security in Action¶
- Automatically identify faces in live video and check them against watch lists. Work with the event history by using various filters.
- Harness the episodes. An episode is a set of identification events that feature faces of the same person, detected within a certain period. As events on the Events tab show up in an arbitrary order, a large number of miscellaneous events can make the work challenging and unproductive. With the Episodes, the system uses AI to organize incoming events based on the faces similarity and detection time. This allows for the effortless processing of diverse events, even in large numbers.
- Search for faces in the following databases:
- Database of detected faces. Learn more.
- Dossier database. Learn more.
- Search archived videos for faces under monitoring.
- Manually compare two faces and verify that they belong to the same person.
- Use the mobile app.
You may also need:
- Harness the person recognition. The system databases will hold a new entity
person event
linked to all episodes that feature a person’s face. You can work with the person gallery similarly as with events and episodes. - View analytics on the number of visitors, their gender, average age, most frequently visited zones, and the character of visits (first-timers or returners). Learn more.
Go Further¶
- Set up webhooks to automatically send notifications about specific events, episodes, and counter records to a given URL. In this case, when such an event occurs, FindFace Security will send an HTTP request to the URL configured for the webhook. You can use webhooks for various purposes, for example, to notify a user about a particular event, invoke required behavior on a target website, and solve security tasks such as automated access control. Learn more.
- Harness the FindFace Security functions through HTTP API.
- Check out the list of our partner integrations.
- Harness plugins to set your directives that determine how FindFace Security processes detected faces.