Whether the face recognition data invades personal privacy have been widely debated by the international community. The industry tycoon, Microsoft always claimed that it wants data to be used in the correct manner. However, a recent report by the British "Financial Times", Microsoft has deleted its largest public face recognition database - MS Celeb. According to reports, the database deleted by Microsoft was in use by several commercial organizations, including IBM, Matsushita Electric, Alibaba, Huida, Hitachi and so on.

替代文字

Before that, the US news website CNET issued a document saying that Shenzhen based AI company SenseNets (Shenzhen Vision), which provides facial recognition technology, “has failed to use password protection database”, resulting in a leakage of more than 2.5 million facial recognition information, as well as related identity cards, addresses and other privacy The information was leaked.

替代文字

Some perceive this event as proof of how a traditional approach to centralized storage service data is facing severe challenges. On May 2018, the EU's General Data Protection Regulations protected the data privacy of the people from a legal perspective, and mandated all races, health conditions, political orientations, sexual orientations, etc. that could be directly or indirectly identified. Sensitive information may not be used by the company without the authorization of the parties.

Today, when legal supervision and compliance is becoming stricter and privacy leakage occurs frequently, how to effectively protect users' data privacy has become a problem that many companies must face in their future development.

As the world's leading public chain of the 3.0 generation, Ultrain's comprehensive public chain architecture and its industry-level zero-knowledge proof components can provide powerful solutions for commercial companies and institutions around the world.

The application developer or data provider only needs to store the certain key value of the user's face onto the decentralized blockchain network. Each time the user logs in, the device uses the user's facial features to prove to the developer or provider that they are indeed one of the users, but at the same time does not tell the other party which specific user it is. In order to prevent the user account from being stolen. However, with zero knowledge proof, the device verifies and guarantee that the user is authentic.

Take Alipay as an example. When the user executes online payment with facial recognition, the key features of the scanned face data will be placed on the blockchain and processed with zero-knowledge proof, while desensitized the data. The error correction component is however placed on the Mobile phone through local storage. After that, each time the user implements the face recognition payment, the verification, and payment of the zero-knowledge proof will be automatically completed on the chain.

With this approach, enterprises can use Ultrain zero-knowledge proof component and public chain architecture to eliminate the risk of data leakage and moral disputes faced by traditional challenges, and better meet the privacy protection needs.

替代文字