Who is spying on our identities, don't abuse facial recognition
by:GESTER Instruments
2022-10-02
“face unlock”and“face payment”With the continuous development of face recognition technology, we can now make our face a special identity proof with the help of a small camera, which brings us convenience. But have you ever thought about whether our life will be affected if our facial information is spied on and collected by others. In the past three·At the 15th party, the first thing that was exposed was the chaos of face recognition. The party directly exposed a series of companies that illegally collect and illegally use user face data, including many well-known companies, including Kohler Sanitary Ware and BMW. And these offending companies generally use a device——have“face recognition”functional camera. It is understood that this kind of camera can shoot people within the detection range in real time, and use the system to infer the gender, age, and mood of the shooting person, and also generate a string of digital IDs. When the camera captures this person again It will match with the face records stored in the cloud in a short time, and quickly locate this string of IDs. Through these facial information and the characteristics of the characters analyzed, companies can quickly judge the consumption level and purchase intention of customers, and then better promote product sales, so as to obtain greater profits, and even sell these facial information to other companies to achieve Win-win with other companies. The power of technology is really great! However, these actions are non-standard. First of all, according to GB/T 35273-2020 'Information Security Technology - Personal Information Security Specification', facial recognition features belong to personal biometric information, and belong to personal sensitive information. When personal information needs to be collected, the personal information subject should be informed of the rules for the purpose, method and scope of the collection and use of personal information, and the authorization and consent of the personal information subject should be obtained before use. In addition, Article 1035 of the Civil Code of the People's Republic of China also mentions this, and clarifies that the processing of personal information shall comply with the principles of legality, legitimacy, and necessity, and excessive processing shall not be allowed. Obviously, these companies exposed have neither obtained the permission of users nor followed the principles of justification, necessity, and non-overuse. In addition to these companies, companies that provide related products have also been exposed, and according to the content of the report, we can learn that the face data of the company's face recognition platform has reached hundreds of millions. I believe that for consumers, when they see this report at the March 15th party, they will start to doubt the necessity of face recognition technology. In fact, the face recognition camera itself is actually designed with very complex Internet calculation formulas and mature image sensor technology, but for us, this technical achievement is actually very popular, and even to some extent we The camera of the smartphone in hand can also be used as a face recognition camera. As for the technology itself, the emergence of this technology actually refines our personal information. For example, when we go to apply for ID cards and accept banking services, we all need the assistance of face recognition to make us safer.
Custom message