Description of the privacy protection

Description of the object recognition process

The AI model performs real-time object detection without saving images.

The AI model utilises a series of real-time object detection systems based on convolutional neural networks. The algorithm requires only one forward propagation pass through the neural network to make predictions, unlike region proposal-based techniques that require thousands for a single image.

Real-Time Inference Without Storage: The AI model performs object detection by processing each video frame on the fly, identifying and counting objects (people) within milliseconds. After inference, the model stores only following metadata: number of objects, direction and time. In this way, the system collectsinformation about the number of people without storing any image data.

Edge computation: to ensure complete privacy protection, the AI model is run as an edge computation on a mobile phone, where no personal data is stored or transmitted. The solution therefore does not process any personal data and should not be subject to the General Data Protection Regulation (GDPR).

Data Output: The output of the AI model contains only anonymised data, such as number of objects, direction of movement and time.

 

Cybersecurity for high-security customers

For high-security customers, all devices are protected by the Samsung Knox Suite, including Samsung phones and the Samsung Knox Manage management system. Samsung Knox is certified, including U.S. and Canadian Governments  validation of the effectiveness of cryptographic hardware: FIPS 140-3, FIPS 140-2 and Finland National Security Audit Criteria  KATAKRI (Ministry of Defence). We are the only people counting solution provider that uses devices with KATAKRI certification, which is designed to to protect an authority’s classified information.

Samsung Knox prevents unauthorized access and maintains audit logs. Remote access to the equipment is blocked. Only the following remote commands are possible: rebooting the device, refreshing configurations, updating software. All other applications on the phone are restricted and do not have access to the Internet. The microphone and Wi-Fi are disabled.

All actions performed on the device are automatically recorded in the Samsung Knox audit log, including remote access to the device, viewing device information, sending commands, changing profiles and transferring files. Samsung software is used to limit physically unauthorised access to device settings or physical interaction with devices at their location. In case of theft, the phone cannot even be reset to factory settings.

Security policies set for each device will override any attempts to change settings and ensure that settings cannot be changed. This multi-layered approach ensures both physical and digital security and enforces strict access control on the devices. The Samsung Knox administrator can change security policies, but any action taken after the device is installed is automatically logged in the audit log. At any time, the customer, with the assistance of our technical personnel, can review the log data recorded by the third party, Samsung Knox. For more information: https://www.samsungknox.com/en/knox-platform/knox-certifications