A video showing a pair of glasses unlocking 19 mobile phones has gone viral. Is facial recognition still safe?
With the widespread application of face recognition technology, more and more things in life can be solved by face recognition. While face recognition technology makes life more convenient, it also brings many security risks.
"At present, the abuse of facial recognition technology is quite common. The abuse of facial recognition technology exists to varying degrees in shopping malls, scenic spots, office buildings and other places, and the public often has their facial information collected without knowing it." On March 4, Cai Xiaohong, member of the National Committee of the Chinese People's Political Consultative Conference and researcher at the Institute of Modern Physics of the Chinese Academy of Sciences, said in an interview with reporters.
In order to standardize the application of facial recognition technology and prevent the risk of personal information leakage, Cai Xiaohong, together with six other members of the National Committee of the Chinese People's Political Consultative Conference, including Ye Youda, a researcher at the National Computational Fluid Dynamics Laboratory and Zhou Yumei, deputy director of the Institute of Microelectronics of the Chinese Academy of Sciences, jointly proposed a proposal and put forward a number of suggestions on strengthening facial recognition supervision.
It’s time to pay attention to facial recognition security issues
At present, my country's facial recognition technology is developing rapidly. It is estimated that the scale of my country's facial recognition market has grown at an average annual rate of 50% in recent years and is expected to exceed 50 billion yuan by 2021.
However, human faces are unique, directly identifiable, convenient, unchangeable, changeable, easy to collect, non-anonymous, and multidimensional, which determines the particularity and complexity of face recognition technology. "Once facial information is illegally stolen and cannot be changed or replaced, it is very likely to cause risks in many aspects such as science and technology ethics, public safety and law, and endanger the personal and property safety of the public," said Cai Xiaohong.
In June 2020, the Fuyang District of Hangzhou, Zhejiang Province opened a trial for the "first Chinese facial recognition case", which quickly triggered continuous discussions among all sectors of society about facial recognition technology and personal privacy protection; in November 2020, a short video of a man wearing a helmet to view a house became popular on the Internet, and the orange-yellow font above the video read "To protect personal information, wear a helmet to view the house", which sparked heated discussions; in Nanning, Guangxi, many owners encountered incidents of their houses being transferred after scanning their faces, which further triggered security concerns behind facial recognition.
"There are growing calls in China to pay attention to the security issues of facial recognition. Massive amounts of facial recognition biometric data are collected in various scenarios. In the absence of perfect relevant regulatory systems and regulations, many institutions that collect facial information do not have the corresponding risk prevention and control capabilities and security assurance mechanisms. There is an urgent need to strengthen supervision of facial recognition," said Cai Xiaohong.
Add approval procedures for the application of facial recognition products
Therefore, the six members suggested that the relevant systems and regulations for facial recognition supervision should be improved, the formulation of laws and regulations on personal information protection should be accelerated, basic rights such as the right to control, delete, and be forgotten personal image data should be established, and personal reputation and privacy should be protected; the relevant legislation on big data should be accelerated, the rights and obligations of enterprises in the collection, transmission, storage and use of personal image data should be clarified, and the main security responsibilities of all links in the data life cycle should be implemented; relevant standards and management methods for biometric information should be formulated to ensure the safe and standardized use of personal image data, and clarify the application areas of facial recognition.
At the same time, a network and information security supervision system for facial recognition will be established, the formulation of a facial recognition application technology standard system will be accelerated, and the security technical requirements for facial recognition software and hardware applications will be clarified; a security assessment and review system for facial recognition applications will be established, and security assessments will be conducted for different application fields such as security, finance, e-commerce, and payment. Approval procedures will be added to the application and promotion of facial recognition products to ensure that the products meet safety and technical requirements.
More importantly, we will increase penalties on companies that illegally collect, leak and abuse personal privacy and engage in unfair competition, and urge them to fulfill their primary responsibility for security.
In terms of promoting the innovation and healthy development of facial recognition technology, they suggested that, focusing on the construction of key projects such as the promotion of smart security, basic identity authentication platforms for multiple biometrics, smart finance, and smart transportation, we should promote the research and development of core facial recognition technologies, promote the deep integration of facial recognition with information technologies such as big data, cloud computing, and artificial intelligence, and develop a variety of facial recognition products; promote cooperation between facial recognition companies and network security companies, and carry out research and development of network security technologies for facial recognition; encourage joint innovation between companies and scientific research institutions, promote the application and promotion of facial recognition technology results; and cultivate new forms of facial recognition development.
Previous article:Will Vietnamese manufacturing become the biggest rival of Chinese manufacturing?
Next article:The current status of the development of six major industries as reported by the State Council Information Office press conference
- Popular Resources
- Popular amplifiers
- Huawei's Strategic Department Director Gai Gang: The cumulative installed base of open source Euler operating system exceeds 10 million sets
- Analysis of the application of several common contact parts in high-voltage connectors of new energy vehicles
- Wiring harness durability test and contact voltage drop test method
- Sn-doped CuO nanostructure-based ethanol gas sensor for real-time drunk driving detection in vehicles
- Design considerations for automotive battery wiring harness
- Do you know all the various motors commonly used in automotive electronics?
- What are the functions of the Internet of Vehicles? What are the uses and benefits of the Internet of Vehicles?
- Power Inverter - A critical safety system for electric vehicles
- Analysis of the information security mechanism of AUTOSAR, the automotive embedded software framework
Professor at Beihang University, dedicated to promoting microcontrollers and embedded systems for over 20 years.
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- Why use 4-20mA current to transmit analog quantity?
- Download Gift|ADI Reference Circuit Collection (Volume 4)
- Practical sharing: PCB Layout design points
- Smartphone Antenna Tuner ESD Protection: What You Must Know
- Experience with MSP430 FRAM for energy harvesting
- Voice coil motor drive circuit
- [STM32F769Discovery development board trial] A simple attempt at a usable but not easy-to-use TCP server communication code
- AD16 Sch button with line drawn is missing
- [Domestic RISC-V Linux board Fang·Starlight VisionFive trial report] Successfully exchanged data with DWIN serial port screen
- Please help me see if this 12864 is bad.