Facial Authentication vs. Facial Recognition: Understanding the Differences and Applications

By Gina Stuelke, CEO of Kenton Brothers

Facial Authentication vs. Facial RecognitionBiometric technologies have gained immense popularity for their convenience and enhanced security. Among these technologies, facial authentication and facial recognition stand out as two of the most discussed and applied innovations. While the terms are often used interchangeably, they refer to distinct processes and serve different purposes.

In this blog post, we’ll break down the differences between facial authentication and facial recognition, their underlying technology, and their real-world applications.

What is Facial Authentication?

Facial authentication is a biometric verification process where a system compares the face of a user to a pre-stored image (or template) to confirm their identity. This technology is primarily used in situations where a user must prove they are who they claim to be, such as when unlocking a smartphone, accessing a secure area, or logging into a banking app.

How it Works:

  1. Enrollment: The user enrolls their face into the system by scanning it, typically with a camera. This creates a template, which is a mathematical model of the facial features.
  2. Comparison: When the user attempts to access the system again, their face is scanned in real-time and compared to the stored template.
  3. Matching: If the live scan and stored template match within a certain threshold, the user is authenticated.

Key Features:

  • One-to-One Comparison: It compares a user’s face against their own stored template, confirming their identity.
  • Security: It is typically used in secure environments where users need to prove their identity (e.g., smartphones, banking apps).
  • User Control: Users usually initiate the process and consent to the comparison.
  • Common Applications:
    • Smartphone unlocking (e.g., Apple’s Face ID)
    • Secure access to apps and services (e.g., banking apps)
    • Physical security systems (e.g., building access)

What is Facial Recognition?

Facial recognition is a broader technology used to identify or verify a person from an image or video in a database or a public setting. Unlike facial authentication, facial recognition often works without the active involvement or consent of the individual and can be used in surveillance or identification tasks.

How it Works:

  1. Image Capture: A camera or video feed captures the face of a person in real-time or from a photograph.
  2. Feature Extraction: The system extracts facial features from the image and creates a biometric template.
  3. Database Search: The system compares the facial features to those in a large database to find a match.
  4. Identification or Verification: If a match is found, the person is identified or their identity is verified. If no match is found, they remain unidentified.

Key Features:

  • One-to-Many Comparison: Facial recognition systems compare a person’s face against many stored templates in a database.
  • Surveillance and Public Use: It’s often used in public spaces for surveillance, identifying individuals without their active participation.
  • Privacy Concerns: Since individuals may not know when their face is being scanned, the technology has raised privacy and ethical concerns.
  • Common Applications:
    • Law enforcement and criminal identification
    • Airport security and border control
    • Retail and commercial surveillance
    • Marketing and customer analytics (e.g., identifying returning customers)

Key Differences Between Facial Authentication and Facial Recognition

Facial Authentication

Purpose: To verify an individual’s identity
Comparison Type: One-to-one comparison (individual vs. stored template)
User involvement: Requires user participation
Security vs. Convenience: Primarily for security (e.g. unlocking devices)
Privacy concerns: Lower (user initiates the scam)
Common User Cases: Smartphone authentication, banking apps Law enforcement, public surveillance, marketing

Facial Recognition

Purpose: To identify or recognize individuals in a crowd
Comparison Type: One to many comparison (individual vs. database)
User involvement: Can be passive and without user consent
Security vs. Convenience: Primarily for identification tracking
Privacy concerns: Higher (can be used without user consent)
Common User Cases: Law enforcement, public surveillance, marketing

Privacy and Ethical Considerations

While both technologies offer undeniable benefits, they raise important privacy concerns, particularly facial recognition. Since facial recognition can be used without the knowledge or consent of the individual, it poses potential risks related to surveillance and the tracking of individuals in public spaces. Many governments and organizations are still working to strike a balance between the benefits of these technologies and the protection of individual privacy. On the other hand, facial authentication, which requires user consent and involvement, is generally considered less invasive, as it is used for secure access to personal devices or services.

Facial authentication and facial recognition are two powerful biometric technologies with distinct purposes and applications. Facial authentication is typically used to verify a user’s identity for security purposes, while facial recognition is used to identify individuals from a crowd or a database. Understanding these differences is crucial, especially as both technologies continue to evolve and become more integrated into our daily lives.

Whether you’re concerned about privacy, security, or convenience, it’s essential to stay informed about how these technologies are being used and regulated. We are here to guide you, give us a call.

From Legacy to Leading Edge: A visual journey through the evolution of security technology

From Legacy to Leading EdgeBy Gina Stuelke, CEO of Kenton Brothers

Back in 2008, our industry experienced a significant convergence event joining physical security and IP based networks onto a common platform. This was a major shift away from the disparate systems we had become accustomed to. That seems like such a long time ago! Today, we are involved in another convergence event involving physical security and cyber security.

The two pyramids in the images below represent the technology stacks used by Kenton Brothers, with each layer reflecting the progression of security technologies and how our offerings have elevated over time.

Kenton Brothers 2008 Technology Pyramid

Kenton Brothers Systems for Security: Pyramid1. Base Layer (Mechanical Locking Hardware): Traditional, physical locking systems.
2. High Security Cylinders and Masterkey System Implementation: The introduction of advanced physical keys and locks.
3. Legacy and Stand-Alone Access Control and Analog Video Surveillance Systems: Initial electronic security measures, such as standalone access systems, video surveillance and analog technologies.
4. Network-Based (IP) Access Control and Video Surveillance Systems: The shift to internet-based systems, improving remote access and integration.
5. Integration Services: Combining different systems (video, access control, etc.) for better coordination and ease of use.
6. Hosted and Managed Services: Outsourcing and cloud-based security management to external providers.
7. Video Analytics: Using software to analyze video data and identify suspicious activities automatically.

Kenton Brothers 2024 Technology Pyramid

Kenton Brothers Technology Pyramid1. Base Layer (Security Policies and Procedures): Security begins with robust organizational policies and procedures, a foundational aspect in modern security systems.
2. High Security Physical Hardware: Continues from previous physical security technologies but is more sophisticated.
3. Detection: Active detection systems for unauthorized access or incidents (includes sensors, alarms, etc.).
4. Access Control: Advances in access control technology (includes biometric and smart credentials).
5. Video Surveillance: Video monitoring remains central, but with higher resolution, better storage, and cloud integration.
6. Analytics and AI Support: Modern video surveillance includes AI, improving event detection and proactive analysis.
7. Cyber Hardening: Reflects the growing importance of cybersecurity, securing systems from hacking and digital threats.

What are the comparisons in technological advances?

  • Shift from Analog to IP: Over the last decade, analog systems (present in the first pyramid) have largely been replaced by IP-based systems, which allow for higher quality video and easier integration into larger networks.
  • Integration of AI and Analytics: Modern systems (second pyramid) emphasize the use of AI for proactive security management. This shift moves beyond video analytics to AI-supported threat detection, reducing human workload and improving accuracy.
  • Focus on Cybersecurity: The first pyramid lacks any mention of cybersecurity, which has become essential in modern security infrastructures due to the increasing threat of hacking. Cyber hardening in the second pyramid highlights this critical evolution.
  • Increased Use of Cloud Services: The second pyramid also reflects advances in cloud technologies for video storage, processing, and real-time analytics—leading to more flexible, scalable, and manageable systems.
  • Detection Technologies: Detection is more advanced in the second pyramid, likely including smarter sensors and automated systems integrated with AI.

Security systems have evolved from primarily physical and standalone solutions (first pyramid) to highly integrated, AI-driven, and cyber-secure ecosystems (second pyramid). These technological shifts have led to more automated, efficient, and intelligent systems capable of responding to modern-day security threats.

Has your commercial security stack been in place for a long time? It may be time to take a good look to make sure you are keeping up with the aggressive changes in technology. And if you need help, please give us a call!

Commercial Security: Redundancy Servers and Why They Matter

By Ryan Kaullen, Field Services Manager at Kenton Brothers

Commercial Security: Redundancy Servers and Why They MatterRedundancy servers are put in place to keep things up and running in the event of a hardware failure. The engineering definition of redundancy is, “the inclusion of extra components which are not strictly necessary to functioning, in case of failure in other components.”

Redundancy servers can be put in place for access control systems and commercial video surveillance systems. There are also a couple of types of redundancy server options called “hot” and “cold”. In this blog, we will talk about these types and options and how they work to make your commercial security system more resilient.

Access Control Redundancy Server

Access control systems already have some redundancy built into them. The door controllers have on board memory, so they will continue to operate even if the main server fails. However, any changes that would need to be made to the card holders or door schedules in the event the main server fails can’t happen until the server is repaired. This is where a redundancy server for the access control system comes into play.  Depending on if you have a hot or cold redundancy server (we will discuss the differences later in this article) you will see either a shortened down time or almost no down time.

Commercial Video Surveillance System Redundancy Server

Commercial Security: Redundancy Servers and Why They MatterCommercial video surveillance systems rarely have server redundancy. If a server fails, the cameras will no longer be recording. Some management systems have capabilities for server failover built into the software. Unlike with an access control redundancy server where you have the hot or cold option, a video redundancy is likely going to be a hot redundancy server. If the initial server goes down, the redundancy server starts recording the video streams. Obviously, the big win in this scenario is that you mitigate the risk of lost video when you have a hardware failure at the worst possible time (when a security event is happening).

Hot and Cold Redundancy Server Options

A “Hot” redundancy server is one that runs in parallel with the main server. If the main server goes down, the redundancy server immediately picks up when the other one failed. This is usually a more expensive option as there can be more licenses, hardware, and integration needed so that it is running in parallel. The major pro here is that failover times are measured in milliseconds and after the initial set up requires no intervention from an IT team.

Commercial Security: Redundancy Servers and Why They MatterA “Cold” redundancy server is one that is set up and has the systems already installed, but is not running in parallel. While it is ready to be put into production if the main server fails, there is some setup that has to occur. At minimum, restoring services requires booting up the redundancy server. However, other requirements might include installing the latest backup of card holders, schedules, routing all devices to the new server, getting the IT team and daily operations team involved. While all of those things are happening, the primary server is down. No changes to the configuration can be applied across an access control system and no video streams are being recorded until the cold redundancy server is brought online.

Having back-ups in place for any commercial security system is critical. Redundancy servers play a huge role in making that a reality. Our security consultants will work with your organization to help you identify the right redundancy server option for your facility. If you would like to know more, please reach out to us today to start a discussion on how to provide redundancy for your systems.

Installing a camera without wires or power? Solar to the rescue.

By Neal Bellamy, IT Director at Kenton Brothers

Installing a camera without wires or power? Solar to the rescue.In a lot of ways, the requirements to install a commercial security camera are usually pretty easy to accomodate. 90% of the time we need just one wire that is smaller than your pinky finger. We can install that wire inside, outside, in conduit, or even stretch it between poles. We used to have limits on how far away a camera could be installed, but with new wire technologies and PoE extenders (Power over Ethernet), distance is rarely an issue. However, there are still times when you just can’t get a wire to where you want to install a camera.

The next best option is to at least have a power source. With a constant power source, we can at least power the camera and hopefully connect it to a wireless or fiber network to get the signal back to a base station. Kenton Brothers has installed numerous cameras where the only resource we had was power. Entire city blocks are blanketed with a wireless network for this type of security situation.

But what is the solution when you have to have a camera, but don’t have power and can’t get a wire there?

Solar Power

Installing a camera without wires or power? Solar to the rescue.Solar power is not a new thing. It’s been around for decades. The hard part about solar is not the technology or the calculations, the hard part about solar is deploying it. Solar panels work by charging a bank of batteries when the sun is out and then using the batteries to power equipment when it’s dark.

First, of course, is knowing the load that will be running on the circuit. Second, is knowing which solar zone you’re in. (This is a measurement of how much sun you can expect in the area you will be deploying solar.) Last is knowing how long you need to be able to tolerate not having any sunlight. Based on all of that information, you or your solar system provider can determine how big the solar panels will need to be and how many will be needed to support periods of time without sunlight.

Solar Kits

A solar kit comes with solar panels, a solar controller, and batteries. What isn’t commonly thought of is the size of the panels and the weight of the batteries. For a recent project at a lake, our single 300-watt panel was about 3′ by 5′. This large surface area acts like a sail in the wind . If installed on a pole (the most likely type of installation) you have to account for the wind when specifying the size and strength of the pole. Likewise, the batteries that were needed for this installation weighed almost 120 pounds!

Using solar panels on poles provides a way to install cameras where there is no wire and no power. The solar panels can support the power requirements of the camera(s) as well as communication equipment like point to point or wireless. (It would also be possible to record locally to the camera or a weather hardened server, but a bit more challenging to get to that data.)

As you can see in these project pictures, the end result is a sturdy, self contained, solar powered security camera with a wireless data connection. And it’s high enough off the ground to avoid tampering.

If you have a unique situation where you aren’t sure how to get power and connectivity to a camera, give us a call. We will have the products and techniques to solve your problem!

Installing a camera without wires or power? Solar to the rescue. Installing a camera without wires or power? Solar to the rescue.

ISC WEST Update: Axis Communications shows off new advancements!

By David Strickland, Vice President of Kenton Brothers

Axis Communications set the bar high at ISC West this year with a robust offerings of product advancements. Axis walked away with a lot of hardware from this year’s conference. We will delve into the new features and uses of three remarkable Axis Communication devices and their advancements: the AXIS Q9307-LV Dome Camera, AXIS W110 Body Worn Camera and the intelligent AXIS D2210-VE Radar. From advanced video surveillance to innovative radar technology, these devices are advancing the way we approach security.

AXIS Q9307-LV Dome Camera:

The AXIS Q9307-LV Dome Camera is a powerhouse of surveillance technology. Combining sharp video and two-way audio with actionable analytics, this all-in-one device helps improve safety, security, and operational efficiency. It offers a great solution for remote monitoring and communication while safeguarding privacy. Designed from the ground up for use in healthcare the Q9307 is much more than a camera, it’s an all in one platform designed with efficiency in mind.

Check it out in action here:

All-in-one audio-visual monitoring device

  • https://kentonbrothers.com/conferences/isc-west-update-axis-communications-shows-off-new-advancements/5 MP video with two-way audio.
  • Preinstalled audio and video analytics.
  • Remote monitoring while safeguarding privacy.
  • Withstands chemical wipe-downs.
  • Cost-efficient all-in-one device.
  • 4K Sensor: Delivers high-resolution video footage with exceptional detail.
  • Advanced Image Processing: Ensures clear and crisp images, even in low-light conditions.
  • IR Illuminators: Provides visibility in complete darkness for round-the-clock monitoring.
  • Remote Zoom and Focus: Offers flexibility in installation options for various mounting positions.
  • Support for Analytics: Enables advanced features such as motion detection and audio detection for proactive security measures.
  • Versatile Installation: Suitable for indoor and outdoor applications, adaptable to different environments.
  • 5 year warranty.

AXIS W110 Body Worn Camera: Protecting a variety of staff members in real time

Wearable cameras deter bad behavior and positively influence the public and camera wearers alike. Axis W110 Body Worn Camera brings these benefits to the workplace for sectors like retail, healthcare, transportation, and more.

AXIS W110 Body Worn Camera makes employees feel like they’re not alone. It deters violence and false accusations and contributes to a sense of well-being in the workplace. An indicator light and voice message on activation let people know it’s recording. It’s compatible with Body Worn Live for live streaming. It captures reliable forensic evidence and documents compliance thanks to sharp images and voice-enhanced audio-in. Plus, nearby wearables can be activated automatically when one person turns on their wearable camera. That – together with pre-buffering of up to 90 seconds – helps you capture all of what really happened from multiple angles.

https://kentonbrothers.com/conferences/isc-west-update-axis-communications-shows-off-new-advancements/The AXIS W110 Body Worn Camera provides security personnel with a powerful tool for documenting incidents and enhancing situational awareness. Compact and lightweight, this body-worn camera can be easily attached to uniforms or vests, enabling hands-free operation without impeding mobility.

Equipped with high-definition video recording capabilities and a wide-angle lens, the AXIS W110 captures clear and comprehensive footage of on-the-ground situations. Its rugged design ensures durability in challenging environments, while features such as GPS tracking and Wi-Fi connectivity enhance accountability and streamline evidence management processes.

Ideal for law enforcement, security patrols, and frontline responders, the AXIS W110 Body Worn Camera empowers personnel to capture critical evidence, de-escalate volatile situations, and uphold safety and security standards with confidence.

  • Lightweight and compact (75 × 55 × 19 mm).
  • Flexible mounting options.
  • Open standards for easy integration.
  • True end-to-end encryption.
  • Signed video/firmware, secure key storage.

Check it out here:

AXIS D2210-VE Radar: Revolutionizing Perimeter Protection

https://kentonbrothers.com/conferences/isc-west-update-axis-communications-shows-off-new-advancements/The AXIS D2210-VE Radar represents a paradigm shift in perimeter protection, leveraging advanced radar technology to detect and track intrusions with unparalleled accuracy. Unlike traditional motion sensors, which are prone to false alarms triggered by environmental factors, this radar device offers reliable detection capabilities in all weather conditions and lighting environments.

With a detection range of up to 100 meters and customizable detection zones, the AXIS D2210-VE provides comprehensive coverage of large outdoor areas, such as parking lots, industrial sites, and critical infrastructure facilities. Its integration with video management systems enables seamless collaboration between radar data and visual verification, enhancing response times and reducing false alarms.

By combining radar-based detection with intelligent analytics, the AXIS D2210-VE delivers proactive perimeter protection, allowing security teams to identify potential threats early and take decisive action to mitigate risks effectively.

https://kentonbrothers.com/conferences/isc-west-update-axis-communications-shows-off-new-advancements/AXIS D2210-VE offers a 95° field of detection and can detect, classify, and track humans up to 60 m (200 feet) and vehicles up to 90 m (295 feet). And, with road monitoring profile enabled, the detection range for vehicles increases up to 150 m (492 feet). The radar also provides the exact position of the detected objects. AXIS D2210-VE can be used stand-alone for non-visual monitoring while safeguarding privacy. Or it can be used to steer a PTZ camera for visual verification. Furthermore, with smart coexistence functionality, it’s possible to combine up to eight AXIS D2210-VE radars in close proximity. And, you can even expand the installation with up to six AXIS D2110-VE radars and customize your detection area depending on your needs.

  • 60 GHz radar for area and traffic monitoring 24/7.
  • 95° coverage to detect, classify, and track objects.
  • Area and road monitoring profiles.
  • Monitor vehicle speeds up to 200 km/h (125 mph).
  • Easily connect using PoE out and edge-to-edge.
  • Compact design with integrated LED strip.

Check it out here:

Axis continues to support the changing needs of their customers worldwide.

As the security threat landscape continues to evolve, Axis Communications remains at the forefront of innovation, delivering advanced devices that empower organizations to safeguard their assets, protect their people, and mitigate risks effectively. From high-performance dome cameras to revolutionary radar technology, Axis devices are reshaping the landscape of security, providing users with the tools they need to stay one step ahead of emerging threats.

Kenton Brothers Systems for Security is a proud partner with Axis Communications. Every member of our Security Consultant team is certified by Axis to represent their line. Let us know how we can support you!