Job Recruitment Website - Property management - The leakage of face information data is likely to occur in two links. Do you know which two places?

The leakage of face information data is likely to occur in two links. Do you know which two places?

I don't know when we have been surrounded by all kinds of face recognition, especially after the epidemic, the demand for non-contact has accelerated the frequency of face recognition in ordinary people's lives. Now, please brush your face before entering any public place. ? When entering the hospital, first recognize the temperature at the door; When you go shopping in the mall, the security guard at the door stops you from brushing your face; Face recognition authentication is required for entering and leaving the station; In the name of safety, many residential properties first introduce face recognition system, and then introduce it; Some concerts require face recognition to enter the venue in real name, and some face recognition systems even identify fugitives with criminal records through cameras.

The apps we use with payment function have also introduced live face recognition technology, and all of them need real-name authentication, which is inseparable from face recognition. ? In these security and financial risk control fields, face recognition has become a compulsory means of identity authentication, and it is difficult for ordinary people to refuse. ? Besides, many scenes are also in the name of convenience and quickness? Brush your face? . When you go shopping in a convenience store, you can choose to pay by brushing your face; You can choose to brush your face when you go to the gym for exercise; Face-brushing authentication has become an alternative to unlocking passwords for mobile apps and electronic products. More extreme, according to media reports, a garbage can in a residential area in Beijing uses face recognition, and the lid of the garbage can automatically opens after identifying the identity of the residents. ?

Face recognition technology has also entered some universities and primary and secondary schools. Some schools began to use face recognition records to analyze students' expressions in class. What is the purpose? It is convenient for teachers to teach. ? What's even more frightening is that more and more scenes quietly obtain face information without the parties' perception and become businesses? Regular customer identification? Data sources of marketing positioning. For example, for the sake of precise marketing, many areas have launched face recognition advertising screens, which are generally set next to elevators, and people passing by elevators will be captured by cameras. For example,? Wear a helmet when looking at the house? Behind the incident, almost all real estate sales departments have installed face recognition systems to prevent customers from comparing faces. Flight orders? . ? Generally speaking,? Security is the earliest and most extensive application scenario of face recognition, followed by risk control and marketing in the financial industry. ?

Because face information involves identity ID authentication, a face corresponds to a piece of identity information. If a person's face information and ID card information are obtained by criminals at the same time, it is equivalent to matching personal information, and it is very likely to be used as an identity to handle online loans, register software or websites, and even unlock payment software, precision fraud, etc. ? Different from the general account number and mobile phone number, a person has a face. If the face information is stolen, you can only change your face. Otherwise, after the matching face information is stolen, it is equivalent to walking with a credit card on your forehead every day, which is very dangerous. ?