<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1411020275672015&amp;ev=PageView&amp;noscript=1">

The Importance of Security

SpotCrowd relies on low latency video streaming and unconventional face detection, among other things.

The retail environment requires specific parameters that are not easily meOur clients, the law, and our business have a complex set of requirements, and SpotCrowd relies on an effective combination of technologies to stop shoplifting.

SpotCrowd relies on open-source technologies, licenced AI engine, and our own “Stream Priority Engine” which empowers spotters to be extremely effective. SpotCrowd has optimally balanced video delay, an engaging Spotter experience, security & privacy compliance, and store expenses.

How It Works

Placeholder_how_it_works kopie.png

Retail stores install our “Store Agent” servers through a plug & play experience. Our “Store Agent” automatically starts searching, registering, and configuring itself. Our system will then start to grab the streams and present them in our web interface. The store owner selects which cameras they want to connect to our platform. After naming the cameras to their own convenience the installation is done.

From that moment on our “Store Agents” detects every person visible and protect their privacy. It uses state of the art Neural Networks and our proprietary algorithms to detect and anonymize the camera streams. Through an encrypted connection we stream the anonymous videos to our cloud servers.

Our Spotters can access our platform through their browsers on pc, mobile, and tablet. This is possible because we only use technology supported by the World Wide Web Consortium (W3C). Their activity is registered in our cloud servers so our Stream Priority Engine can do its magic. When a thief is registered our systems send an encrypted message to the respective store so they can decide how to act.

All of this happens with only a few seconds of delay, and we are still shaving off more time!

GIVE ME MORE INFORMATION
GETTING STARTED AS A SPOTTER
GETTING STARTED AS A RETAILER

Privacy By Design

setting.jpg

Real-time anonymization

Using state-of-the-art computer vision we are able to identify and remove any details that could identify a person by blurring. Also unique markers that could identify stores are removed. No spotter will ever know it was you.

ENCRYPTION EVERYWHERE

The internet is a complex place and we are processing sensitive information so no risks are taken. Video, data, messages, everything is encrypted. From the Store to us, and from us to the Spotter community: everything is locked down airtight!

ENCRYPTION EVERYWHERE

setting.jpg

ABSTRACTION OF YOUR DATA

Internally we store all data in an abstracted way. This means that we can process your information without actually knowing it is you. This layer ensures that the data is useless without the key, that only you possess!

 

GDPR 2018 COMPLIANT!

EDGE COMPUTING

Our network distributes processing and storage over the entire world. No single one of our servers has enough information to decipher your personal information.

EDGE COMPUTING