The process of Authentication, is considered to be a 1:1 process, meaning that an individuals face and positive identity are already stored in a database and the system is only comparing the image of the individual present against a known image in a database. This type of system would be used in a controlled environment such as a high-security military location, a nuclear plant or a secure business facility. In the case of Facial Recognition, the computer is comparing key points on an individuals face standing in front of a sensor (camera) and comparing it against an existing image on file
The process of Authentication, is considered to be a 1:1 process, meaning that an individuals face and positive identity are already stored in a database and the system is only comparing the image of the individual present against a known image in a database. This type of system would be used in a controlled environment such as a high-security military location, a nuclear plant or a secure business facility. In the case of Facial Recognition, the computer is comparing key points on an individuals face standing in front of a sensor (camera) and comparing it against an existing image on file