HID Global’s ICLASS Seos Credential Wins SESAMES Award At CARTES Asia 2013
HID Global’s ICLASS Seos Credential Wins SESAMES Award At CARTES Asia 2013

HID Global, a worldwide leader in secure identity solutions, recently announced that its iCLASS Seos™ credential has won the Asian SESAMES Award in the software and applications category.  The award recognizes the industry’s most innovative technological applications developed for the Asia Pacific market in the field of smart cards, digital security, identification, secure transactions, and contactless technology. Judges include industry experts who evaluated entries during the competition and the Asian SESAME award marks HID Global’s thirteenth accolade for its iCLASS SE platform solution by the industry’s most influential security organizations and publications worldwide. “As HID Global’s latest addition to our award-winning iCLASS SE platform, iCLASS Seos reinforces our Genuine HID commitment to deliver new capabilities for meeting current and future secure identity requirements,” said Selva Selvaratnam, senior vice president and chief technology officer with HID Global. “HID Global is honored to be recognized by the Asian SESAMES Award committee. The award further validates our dedication to continually support customers with innovative solutions for a broad range of applications using a combination of smart cards, microprocessor cards and NFC-enabled mobile devices.” iCLASS Seos features a standards-based universal card edge, which supports multiple technologies and future technologies for maximum interoperability. The credential is portable for use on NFC smartphones while providing data confidentiality and strong authentication with state-of-the-art cryptography for mutual authentication and data encryption that protects the privacy of contactless communications. 

Add to Compare
HID Global Extends Options For Migrating To High-frequency Access-control Readers And Credentials
HID Global Extends Options For Migrating To High-frequency Access-control Readers And Credentials

HID Global is offering new access-control readers and credentials that provide the industry's most extensive options for migrating from legacy solutions to higher-security 13.56 MHz contactless technologies. HID readers can be used with an extensive array of single- and combination-technology cards including its industry-first dual-high frequency (HF) credential. They extend the Genuine HID™ value proposition by giving customers the industry's largest selection of reader and credential migration solutions.HID's expanded migration offering includes: An iCLASS® reader for migration from MIFARE® Classic to secure 13.56 MHz MIFARE DESFire® EV1 and HID iCLASS contactless technology; New multiCLASS® readers for migration from legacy magnetic stripe (magstripe) and 125 kHz proximity card technology to higher-security MHz HID iCLASS contactless technology; and The industry's first dual-HF credential, which bridges the gap between legacy solutions and secure iCLASS and MIFARE DESFire EV1 contactless technologies, expanding customer options for deploying the highest levels of security, while maximizing the value of their credential investment by enabling multiple applications on a single card. Product details  iCLASS high-frequency migration reader: HID's proven and widely deployed iCLASS reader line has now been extended to enable migration from MIFARE Classic technology to secure 13.56 MHz technologies for improved security, performance and data integrity, or to support multiple applications with a single credential that can also be used as a photo-ready identity badge. iCLASS readers are also available in configurations that provide compatibility with a wide scope of card technologies including: Dutch Government Rijkspas; 125 kHz proximity technologies such as HID Prox and IndalaProx; legacy technologies such as Wiegand and magnetic stripe; and other technologies including EM4102 Prox, AWID Prox, US Government FIPS 201, Sony FeliCa Transit, Singapore CEPAS Transit, Magstripe and ISO 14443/15693 card serial numbers. multiCLASS migration readers: The RM40 and RMP40 are new, non-keypad versions of the company's RMK40 and RMPK40 readers for Magstripe-to-iCLASS and Magstripe- and Prox-to-iCLASS migration, respectively, which were introduced earlier this year. They provide customers with the most cost-effective solution for seamlessly upgrading from legacy reader technology to contactless smart card capabilities. The readers support ANSI/ISO 7811 magstripe data conversion or pass-through configuration in combination with HID Prox and popular 13.56 MHz contactless access control technologies including iCLASS credentials. Dual-HF credentials: HID's iCLASS/MIFARE Classic, iCLASS/MIFARE DESFire EV1, and MIFARE Classic/MIFARE DESFire EV1 credentials make it easy to move from legacy solutions to secure contactless technologies over time, across multiple facilities, or within subsets of a larger cardholder base. The dual-HF credentials use advanced radio frequency (RF) engineering to combine iCLASS with MIFARE or MIFARE DESFire EV1 technologies, or to combine MIFARE Classic with MIFARE DESFire EV1 technology. The technologies are embeddable with a contact chip, and can also optionally be combined with HID Prox technology. They enable users to combine access control on a single credential with other applications including secure network, print authentication, time and attendance, digital cash and vending, transit passes, and equipment and material check-out.  

Add to Compare

Access control readers - Expert commentary

Open Supervised Data Protocol (OSDP): The Gold Standard For Access Control Installations
Open Supervised Data Protocol (OSDP): The Gold Standard For Access Control Installations

Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-Readers Simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 Encryption Ensures Cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labor from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting Requirements Of FICAM Guidelines SIA is pushing to make the latest OSDP version a standard recognized by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organizations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognized by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organizations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.

Debunking The Myths Of The Security Of Access Control Systems
Debunking The Myths Of The Security Of Access Control Systems

It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.

Can We Prevent Active Shooters Through AI Technology?
Can We Prevent Active Shooters Through AI Technology?

According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot Detection Solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognize firearms in different shapes, sizes, colors, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyze the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-Shot Detection Advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimize the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organized manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun