Solutions

Acusensus’ solutions have been designed to give our partners an effective tool to address their unique public policy challenges using AI and machine learning technology.

This technology is then backed by an experienced team, ready to use their expertise to bring you results. We are confident of our solutions and will guarantee their performance.

Key Strengths

Advanced automated recognition system that improves accuracy, efficiency and privacy.

Infinitely scalable cloud based solution that can be accessed anywhere with a secure internet connection.

Extensive controls for data privacy and security. The solution is built on a live production system approved for criminal enforcement.

Enforcement pedigree, reliable evidence chain including encrypted and signed traceable packages from the ingestion to delivery.

Advanced automated recognition system that improves accuracy, efficiency and privacy.

Infinitely scalable cloud based solution that can be accessed anywhere with an internet connection.

Extensive controls for data privacy and security. The solution is built on a live production system approved for criminal enforcement.

Enforcement pedigree, reliable evidence chain including encrypted and signed traceable packages from the ingestion to delivery.

Customer-centric Approach

Acusensus is committed to providing tailored solutions that allow

clients to achieve their public policy and business objectives.

We have a highly experienced team, with a broad range of expertise ready to be utilised to provide the right solutions to tackle your unique challenge.  

We have intelligently designed our solutions and processes to enhance the ability for them to be deployed, configured and supported remotely, allowing us the flexibility to effectively and efficiently support systems with local and/or remote presence in line with our customer’s needs.

Our purpose fuels our approach.

Data Security

We understand and support our clients’ desire to ensure their networks are secure from threats and that data is secure. That is why we have designed our solutions from the ground up using the latest security practices, providing full traceability, with extensive controls for data privacy and security.

Our commitment to privacy is robustly addressed by our secure solutions and internal process.

The camera system detects vehicles and assesses occupant behaviour by the road side in near real time. When the camera system assesses that an occupant displays offending behaviour, the camera system i) generates an encrypted and digitally signed potential incident file that remains on the camera system itself and ii) exports an encrypted and digitally signed image of the offending behaviour to the pre-adjudication system.

Potential incident files are encrypted using a public key whose private key is held by the road safety and enforcement authority. Acusensus (and anyone else) never sight or hold a copy of the private key are therefore unable to ever view or extract the evidence from an incident file.

A verified digital signature guarantees that the incident file is both i) created by an authorised camera system, and ii) unaltered during transmission and storage.

Once the incident file arrives at the client’s back office, the data will be extracted into unprotected and alterable formats. Incident files include a digital signature for each field in the incident file (including media fields).

EVIDENCE CHAIN

  • Acusensus guarantees the integrity of evidence collected by our solution.

SUPPORTING PROCESSES

Supporting processes for ensuring integrity of data include but not limited to:

  • A digital signature to verify that an authorised Acusensus camera system created the incident file.
  • A digital signature to verify that the incident file has not been tampered with.
  • Asymmetric encryption that ensures incident files can only be extracted by the road safety and enforcement authority.
  • Security indicators for every field of data provided in the incident file including media, which can be used to verify that extracted data has not been altered during transmission and/or storage. The security indicators themselves are verified by the incident file’s digital signature.

DATA PROCESSED

All data processed through the cloud solution is logged during each stage of processing. This allows for independent auditing covering items including:

  • Audit and assurance of deletion of sensitive data
  • Complete logging and control of user access to sensitive data
  • Complete end-to-end independent audit capability of both AI and human review systems

The following points seek to further explain some of the protections in place that make this solution different and more secure than other solutions:

The fundamental access pattern to camera systems is different.

  • Camera system communications are heavily restricted to prevent unauthorised access
  • Camera systems are always accessed indirectly via a secure cloud broker.
  • Operators never directly access our camera systems

All images exported from camera systems are encrypted both at file level and during transit.

  • All images are exported to cloud storage, not directly to devices.
  • Cloud storage has policies strictly ensuring only authorised users on authorised devices can access the data.

When using the cloud platform to interface with a camera system:

  • All access is logged. Any non-standard access pattern raises an alarm.
  • There is no file system mounting, no file system sharing. Communications to/from camera systems pass through secure services, and file systems are never shared.
  • Access to a camera systems must occur via a hardened service device.
  • Authorised devices can be revoked and authorised users can be revoked.

We strive towards continuous improvement of our data protection policies, so we can ensure our clients that we are providing them a solution that can be protected from past, present and emerging threats. 

for further information please get in contact with us