LG IrisAccess® 3000 Iris Recognition System
LG IrisAccess® 3000 Iris Recognition System

Adding iris recognition to a security environment doesn't have to mean getting rid of everything you've invested in to date - LG IrisAccess® 3000 complements token or PIN-based system to provide a high integrity security overlay that boosts ROI and security efficacy of the security systems already in place.Even partial measures can add a whole new dimension to your security - most companies want improved security to safeguard both human and physical assets.  But this should not entail a costly overhaul -  LG IrisAccess 3000 integrates easily with standard security infrastructure with Wiegand or serial output, and runs on MS SQL and Oracle databases.  Up to 128 portals can be controlled off one host.  It works in one-to-many search mode, or in 1 to 1 verification mode with many PIN and token-based systems, including a variety of smart-card formats.  Ideal application for data centres, laboratories, and other sensitive areas - information gathering is key to any enterprise and ensuring proprietary data on your company, your customers and your competition remains confidential is critical.  Laboratories - clean environments need a security system which can provide super security despite protective gear, gloves and goggles - and LG IrisAccess 3000 delivers just thatMore accurate, faster, more stable than any other biometric - LG IrisAccess 3000 draws from a feature-rich iris to capture an image (it's just a picture) that digitises 240 degrees of freedom to produce a small 512-byte template to deliver real-time authentication accuracy that is unmatched.  System enrolment is simple and fast - authentication even faster... - a proximity-activated, voice-prompted, mirror-assisted interface makes for easy enrolment and use.  Enrolment takes less than 2 minutes.  Authentication less than two seconds.  Eyeglasses/contact lenses present no problem for use. TCP/IP compatible, networkable, and expandable with built-in countermeasures and other security features - LG IrisAccess 3000 has integration flexibility and addresses special operational security concerns in ways no other security system - biometric or otherwise - can match.    

Add to Compare
LG IrisAccess 4000 - The Iris Recognition System That's A Generation Ahead Of The Rest
LG IrisAccess 4000 - The Iris Recognition System That's A Generation Ahead Of The Rest

LG IrisAccess 4000 is the third generation of the world's number one deployed iris recognition platform.  Offering increased application versatility and integration flexibility, enrolment and recognition is easier than ever.  Intuitive visual user interface enables users to quickly position themselves for enrolment or recognition as images of both eyes are captured virtually simultaneously.  Audio prompts improve speed of enrolment and recognition performance while motor-driven auto-tilt mechanism makes adjusting the camera for proper height a simple ‘one touch of a finger' proposition.  What's more, every model of the IrisAccess 4000 contains a camera supported by dedicated illumination that makes badging for credentialing a snap.When it comes to multi-factor authentication, IrisAccess 4000 is extraordinarily flexible.  iCAM4000 and iCAM4100 with optional device-embedded SmartCard readers from the world's leading card reader producers give IrisAccess the ability to function with HID iCLASS, DESFire, and MiFARE and CAC-compliant cards.  When a reader is present, a card icon placed on the casing indicates where the card should be placed for fast verification.  Card reader-equipped models of iCAM4000 and iCAM4100 are designated with a 10 suffix, so become 4010 and 4110 respectively.Multifactor authentication can also be delivered by the 16-element keypad that comes standard on the iCAM4100 unit.  The authentication options afforded by being able to configure iris authentication by left, right, either or both eyes plus a smartcard token, and in the case of the iCAM4100, a keypad, are simply unmatched by any other iris recognition offering on the market.iCAM4000/4010iCAM4000/4010 is compact, low profile and designed with architectural aesthetics in mind. It's kiosk-configurable, and can be flush or recessed mounted.  An iCAM4010-- with an embedded SmartCard reader provides more than multi-factor authentication.  Information residing on the card enhances human factors performance to prompt correct setting of the imager to an individual user's height.  An option that will prompt the card to trigger language for audio prompts, will make the system ideal for use in a multi-ethnic milieu, or in countries with more than one official language. iCAM4100/4110 The iCAM4100/4110(SmartCard-equipped, as described above) includes a keypad accepting up to 10 digit PINs affording an additional level of two-factor authentication.  Every iCAM4100 incorporates a 40-character LCD, making possible communication regarding authentication status.  It also fits well in human resource management applications, as upon identity authentication, keypad and display afford a means to exchange information about payroll, vacation days, shift-work, or other HR data etc.System Security FeaturesIrisAccess delivers security features and performance that set it apart from other iris recognition and most other biometric systems.  Safe storage, for example, means no biometric templates are stored on any external system components.  Experts concede that countermeasures built into LG IrisAccess set the standard for the industry and note in this area, many other biometric systems leave much to be desired. Security is also a key driver when it comes to software.  The LG iData software line for access control and a tool kit for building identity-dependent applications provides FIPS compliant encryption, and offers other alternatives, as well as PKI. Other System ComponentsIrisAccess 4000 System incorporates other system-designed elements.  A low profile IdentityController(ICU) offers easy greater integration convenience while ensuring that biometric templates are kept safe, protected and secure, off the imager.  The DoorController(DCU) is also available for use in stand-alone access control applications.The Advantage of Iris RecognitionThe physical or behavioural characteristics on which biometrics are based afford a more reliable basis for authentication than other easily compromised identity options relying on something one knows or carries.  There are more measurable characteristics in the iris, the visible coloured ring around the pupil, than in other biometrics.  Every human iris is unique.  Compared to other biometrics, iris recognition is the most accurate, fastest, and scalable option.  Iris patterns are also very stable. Barring trauma, an iris pattern will not change over time as characteristic measurements of finger, hand, voice or faces do.

Add to Compare

Browse Access control systems & kits

Access control systems & kits - Expert commentary

Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)
Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)

Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.

How AI Is Revolutionizing Fraud Detection
How AI Is Revolutionizing Fraud Detection

The Annual Fraud Indicator estimates that fraud costs the United Kingdom approximately £190 billion every year. The private sector is hit the hardest and loses around £140 billion a year, while the public sector loses more than £40 billion, and individuals lose roughly £7 billion. The effects of fraud can be devastating on both individuals and organizations. Companies can suffer irreversible damage to reputation and be forced to close, and individuals can experience significant personal losses. Everyone should be aware of the risks and take steps to protect themselves against fraudulent activity. Fraud detection technology Fraud detection technology has advanced rapidly, over the years and made it easier for security professionals to detect and prevent fraud. Here are some of the key ways that Artificial Intelligence (AI) is revolutionising fraud detection - with insight from Tessema Tesfachew, the Head of Product at Avora. An anomaly can be described as a behavior that deviates from the expected An anomaly can be described as a behavior that deviates from the expected. According to Tessema Tesfachew, “Autonomous monitoring and anomaly detection specifically, have made detecting fraudulent activity faster and more accurate. Machines can monitor data 24/7 as it comes in, build patterns of behavior that take into account seasonality and shifting trends, and identify events that don’t fit the norm.” For example, banks can use AI software to gain an overview of a customer’s spending habits online. Having this level of insight allows an anomaly detection system to determine whether a transaction is normal or not. Suspicious transactions can be flagged for further investigation and verified by the customer. If the transaction is not fraudulent, then the information can be put into the anomaly detection system to learn more about the customer’s spending behavior online. Accurate root cause analysis Root cause analysis goes one step further than anomaly detection, by allowing security professionals to pinpoint what caused the anomaly. Tessema explains how an example of this would be if a system detects that the rate of fraudulent transactions has increased. Root cause analysis would pinpoint the specific ATM or point of sale, where this increase is occurring. Swift action can then be taken to prevent fraudulent activity at that location in the future. Fewer false positives As mentioned, false positives can occur if a fraud detection system identifies behavior that goes against the norm, for instance, if a customer makes a transaction in a new location. In many cases, customers are required to complete identity verification to prove that a transaction is not fraudulent. Digital customer identity verification can help brands build a strong and reputable image. That said, forcing users to complete identify certifications regularly can cause frustration and harm the customer experience. AI anomaly detection AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data AI anomaly detection is far more accurate and results in fewer false positives. Increasing the accuracy of anomaly detection helps companies improve customer relationships and build a strong reputation. This will have a positive impact on brand image and sales revenue. AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data. Machines are more efficient than even the most skilled fraud analysts and make fewer errors. This is why AI fraud detection software is the preferred option in larger organizations. Importance of fraud analysts However, fraud analysts still play an important role in fraud prevention. Using a combination of human intervention and AI is usually the most effective approach when it comes to fraud detection. According to pymnts.com, innovative organizations now use a variety of AI and supervised and unsupervised machine learning to identify and protect against fraud. AI systems can complete time-consuming and repetitive tasks, such as data collection and analysis. This means that fraud analysts can focus their time and attention on critical tasks that require human intervention, e.g. monitoring risk scores. AI can automate processes and enhance the quality of the fraud analysts’ work. Conclusion In to Tessema Tesfachew’s opinion, “Fraud detection has become vastly more efficient and effective with the introduction of Artificial Intelligence (AI). Previously, methods for detecting fraudulent activities were still data-rich, but relied more on human intervention and expert bias, and were thus, more time consuming and prone to error.” AI technology, particular anomaly detection, has streamlined fraud detection and created a more efficient, and accurate system for detecting and preventing fraud. Covid-19 has increased the number of online transactions, which creates more opportunities for fraudulent activity. However, it also allows businesses to gain more information on their customers and enhance the capabilities of AI security software. It is more important than ever for organizations to utilize AI technology in fraud detection strategies.

Q&A: Bosch Video Systems & Solutions' Michael Seiter And Magnus Ekerot On Smart Technology, "AIot", And Plans For 2021
Q&A: Bosch Video Systems & Solutions' Michael Seiter And Magnus Ekerot On Smart Technology, "AIot", And Plans For 2021

Q: Mr. Seiter, Mr. Ekerot, you both joined Bosch Building Technologies’ business unit Video Systems & Solutions as Senior Vice Presidents in March 2020, when the Coronavirus pandemic was just beginning. How did your business unit get through 2020? Magnus Ekerot: The crisis was also felt at Bosch. At the same time, demand has risen for solutions that keep businesses open and protect people's health. We offer corresponding video solutions that can make a significant contribution to containing the pandemic.  Michael Seiter: Overall, we managed the past year well despite the challenges and have been growing again since the third quarter compared to 2019. We see good opportunities for further growth in 2021. Q: Has the Corona crisis again accelerated the development of smart technologies in the security technology market, and does the security market in contrast to most industries benefit from the crisis more than it suffers? Michael Seiter: The Corona crisis has definitely demonstrated that the future lies in data-driven solutions. Thanks to our product development strategy already being based on this, we at Bosch were very quickly able to develop new products for the ‘New Normal’ and to expand existing products accordingly. To give one or two examples: in cooperation with Philips, we very quickly developed a people counting solution for retail operations – smart Philips displays in conjunction with smart cameras from Bosch that provide protection for staff and customers. The In-Store Analytics software solution was also implemented with additional features. Shop owners can now make decisions based on customer movement data such as “Where do we position products to avoid queues or crowds?” HTD involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature  The latest highlight is the Bosch Human Skin Temperature Detection solution, in short HTD. This involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature at control points in offices, factory floors, or airports. The benefits of previously existing solutions on the market are sometimes called into question. Competitors are often unable to deliver what they promise because, for example, the measured temperature of the skin does not correspond to the core temperature of the person, or fluctuates, due to environmental influences. Therefore, we developed a software-based solution that, in compliance with GDPR, first allows people with potentially elevated body temperatures to be filtered out, and in a second step, allows medical personnel to perform a more targeted fever measurement. Q: You see a lot of potential for the video security industry in new technologies such as Artificial Intelligence and the Internet of Things. What specific opportunities do you mean, and how are you leveraging these technologies at Bosch Building Technologies? Michael Seiter: Bosch has committed itself fully to an “AIoT” – AI meets IoT – strategy. The development of AI algorithms and software, in general, is at Bosch significantly driven in the security space.  By AIoT, we specifically mean the networking of physical products and the deployment of artificial intelligence. With AI we aim to enable clients to understand events at an ever-deeper level and predict them in the future – the keyword being predictive – so that they can act proactively. This is particularly important for health and safety. An example is the Intelligent Insights solution where the user can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area. Q: From your point of view do you have an advantage over other suppliers when it comes to AI-based products in the video arena? Michael Seiter: The analysis and utilization of video data have long been front and center with us. Since 2016 we’ve been following the strategy of offering AI applications in the form of integrated intelligent video analytics as a standard in our network cameras. Data such as color, object size, object speed, and direction are all measured. Simply put, you can say this is seeing and understanding – which is the principle behind smart security cameras. Today it’s much more a question of intelligent, data-based solutions than collecting high-quality pictures and storing them for the record. Bosch has been investing heavily in AI for years, from which we can benefit greatly in our area. In the first quarter, for example, we will launch a vehicle detector based on deep learning that is already running on our cameras. This will create significant added value for our customers in the area of intelligent traffic control. Q: Mr. Ekerot, what advantages do customers have in AI-based video security from Bosch? Magnus Ekerot: A key advantage is strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms A key advantage is our strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms. Take the example of Camera Trainer, a machine learning software that can be directly uploaded to Bosch network cameras. The camera is thus trained up on recognizing objects and situations – tailored to the specific needs of our customers. If the camera detects the defined scenario, it performs a predefined action in real-time – for example, a count or an alarm. The latest example is our new camera platform Inteox. As a completely open camera platform, Inteox combines Bosch's intelligent video analytics with an open operating system. This allows programmers to develop specific software applications - or apps - for various application purposes. These can then be loaded onto cameras – the same principle as an app store for smartphones. To sum up, Bosch AI applications support customer-specific needs related to data analysis while enabling totally new applications within and beyond the video security market. Q: Can you name a specific current project where Bosch has deployed an AI-based solution? Magnus Ekerot: A current ground-breaking project using our smart cameras is being implemented as a pilot in the USA. Smart Ohio enables users to configure more intelligent traffic flows and thus ensure mobility, safety, and the efficient use of roads today and tomorrow. The new vehicle detector mentioned by Mr. Seiter also plays a central role here. Our overall goal is to provide connected smart sensor solutions for public and private transportation agencies to enable them to operate their roads safely and efficiently. The Intelligent Insights can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area Q: Mr. Seiter, you have been involved with the topic of mobility for some time. What experience from your previous job in the automotive business of Bosch might help you when it comes to further develop the video portfolio of Bosch Building Technologies? Michael Seiter: There's a lot to tell. First of all, the development of core algorithms for video-based solutions, whether for autonomous driving, for vehicle interior monitoring, or for our Bosch Building Technologies video systems, all come together at Bosch's Hildesheim location. This gives us considerable synergies and allows us to bring R&D results to market faster and more flexibly. Essentially, assisted driving systems use AI algorithms that process ever-increasing volumes of video data. Attempts are being made to imitate the human being and enable the vehicle to understand better the surrounding environment with its ‘eyes’. This predictive capability is especially critical with autonomous driving. For example, key questions include: “How should the car respond and what could potentially happen next?” “What kind of environment does it find itself in?” etc. There are many activities in this area at Bosch that in my new role in security we can also strongly benefit from. I am now bringing a lot of this experience and existing R&D achievements to Bosch Video Systems & Solutions, which also results in further synergies with our mobility division: At Stuttgart Airport, autonomous driving is already being implemented together with Mercedes-Benz and the parking garage operator Apcoa as part of the "Automated Valet Parking" project, or AVP for short, in which intelligent video systems from Bosch Building Technologies are making a significant contribution. Mr. Ekerot, you have a lot of experience in the video security area. Where do you position Bosch Building Technologies now in this market and what specific goals are you pursuing? Magnus Ekerot: Our clients are looking for reliable partners and products. We are a strong brand; you can rely on Bosch products. Bosch is a thought leader in video and a pioneer in AI applications in this field since 2016. Data security is everything to us: Our products conform to the EU’s GDPR regulations. Beyond that, we have an extensive camera portfolio that complies with the US National Defense Authorization Act (NDAA) for video security devices. This enables our portfolio to be deployed for example within US government buildings. We are planning to conclude more software maintenance agreements with our clients in 2021. These deliver investment and future security for our customers and include for example a ‘patch guarantee’ along with regular updates with new functionalities. This is the first step in a comprehensive plan to access new revenue channels for us and our partners delivering the best technology and excellent service to the end-user! Overall, many new products will be launched this year and this trend will intensify. Our goal is to establish new product families that follow a simple principle: “The development and delivery of disruptive, predictive video solutions that every user can trust because of the underlying sustainable forward-thinking mindset.” It’s been much discussed of late that Bosch is one of the very first companies globally that operates on a CO2-neutral basis. How does sustainability impact your business? Magnus Ekerot: IoT solutions are actually sustainable and contribute to environmental protection Our IoT solutions are actually sustainable and contribute to environmental protection. For example, our cameras are sustainable in that they remain up-to-date through software updates and needn’t be constantly exchanged for new ones. Our systems demonstrate sustainability also operationally as they can be managed remotely. System integrators don’t need to be physically present, thus avoiding unnecessary travel with its accompanying emissions. All in all, Bosch Building Technologies develops ways to accompany and support our clients in reaching their climate goals via new technologies. This can be done, for example, through improved energy efficiency, the total cost of ownership models, organizing and simplifying the supply chain, and helping our customers meet their social responsibilities. The Power of Bosch helps us here to leverage company-wide research to be two steps ahead, a shade faster, when it comes to new technologies and initiatives that our and future generations will benefit from. I should also say that I am personally very proud to work for a company that set an ambitious climate goal for itself and achieved it! Can you already share a preview of your technology innovations in 2021? Michael Seiter: We see great market potential for our cameras that use artificial intelligence and can be updated flexibly throughout their lifecycles. I have already mentioned the deep learning-based vehicle detector in our cameras. More such solutions – also for other applications where object and person recognition are important – will follow in the course of the year. And the best part is: with AI, the more data we collect and the more intelligently we use it, the better the solutions become and the more added value they bring to the customer. This will revolutionize our industry! Another example is our cloud-based solutions, for example for alarm monitoring. Here, we can now also integrate third-party cameras and, building on this, offer and jointly develop our intelligent software-based solutions. This gives our customers more opportunities to take advantage of the opportunities created by AI. The trend towards integration of the various security technologies seems to be driven mostly by the rapid progress in software development. Does this affect full-range suppliers such as Bosch and what specific plans for fully integrated security solutions do you have for the future? Michael Seiter: Naturally, this suits us as a full-scope supplier. Bosch solutions are deployed in many cross-domain client projects. We have experts for the different domains under one roof and a strong brand with the same quality promise for all areas. Nevertheless, it is always also about specific domain excellence. Only when you master all different areas and have profound and proven expertise in each of them you can succeed in integrated cross-domain projects. The respective business units craft their future strategies and innovation roadmaps with this in mind – as we do in the field of Video Systems & Solutions. Our business unit offers fully integrated Bosch video solutions that can be extended and operated on open systems. This is why we drive open platforms such as Inteox, to offer customers from a wide range of industries the right solutions. Our Bosch Integration Partner Program that we launched in 2012 is also heading in this direction – every product can be integrated into multiple other systems and VMS solutions. In summary: At Bosch, we are both a one-stop-shop, but also an open-system, meaning we offer customers maximum flexibility in their choice of products and services.

Latest Iris ID, Inc. news

Iris ID ICAM M300 Biometric Reader Compatible With MozaicID Smartcard Software Credential Application
Iris ID ICAM M300 Biometric Reader Compatible With MozaicID Smartcard Software Credential Application

Iris ID, a pioneering provider of iris recognition technology, announced the compatibility of its iCAM M300 handheld, multi-modal biometric reader and the MozaicID iCAM M300 smartcard software credential application. This application enables the mobile device to accommodate a range of Personal Identity Verification (PIV) compatible credentials including PIV Interoperable (PIV-I) and the Transportation Worker Identification Credentials (TWIC), a smartcard used by workers requiring access to secure areas of U.S. maritime facilities and vessels. Secured identity authentication The MozaicID app uses the iCAM M300’s detachable FBI-certified Sherlock fingerprint sensor from Integrated Biometrics to authenticate workers’ identities by comparing a live fingerprint to a stored template embedded in the credential. The application will also check the trust status of the presented credential. The iCAM M300 also enables mobile enrollment of workers with its embedded camera simultaneously capturing both iris and facial modes for contactless identity authentication. Authorities statement Mohammed Murad, vice president of global sales and business development, Iris ID, said compatibility with the MozaicID app adds to the versatility of the iCAM M300. “Iris ID and MozaicID have combined best of breed technologies to create an accurate and more secure means of identifying maritime employees wherever their jobs take them,”  he said. “The iCAM M300 provides an unparalleled intuitive user interface, which makes the process easier for the user and operator.” Jim Parroco, chief executive officer of MozaicID said “MozaicID is dedicated to providing effective, relevant, and user-friendly security solutions. We institute intuitive and innovative technology in our software with proven results. The product offering, we have with Iris ID provides an excellent security solution in response to a specific need.” Features and benefits Supports other contact or contactless Personnel Identity Verification (PIV) smartcards such as Common Access Cards (CAC) used by military, civilian, and vendor employees in controlled government spaces Commercial Identity Verification (CIV), used by commercial organizations to meet federal government access control standards Comes equipped with software development kits (SDK’s) ready to deploy a wide variety of Android-based identity application Organizations requiring remote identity verification, such as the U.S. Customs and Border Patrol and law enforcement departments, use the water- and dust-resistant iCAM M300 Provides magstripe and contactless card support, as well as an MRZ reader to verify ePassports Communications protocols include NFC, Wi-Fi, Bluetooth, GPS, 4G LTE

Boon Edam Announces Enhanced Presence At ASIS International 2016, Florida
Boon Edam Announces Enhanced Presence At ASIS International 2016, Florida

Boon Edam will expand its booth presence and installs turnstiles at ASIS 2016's main entrance Boon Edam, a provider of security entrances and architectural revolving doors, has announced a greatly enhanced presence at the 62nd ASIS International Seminar and Exhibits in Orlando, Florida from September 12th-14th. In addition to expanding the booth to the largest footprint ever at the ASIS event, the company will also be the first official Turnstile Sponsor of the Exhibition.   Official Turnstile Sponsor   As the first official Turnstile Sponsor at ASIS International since the event’s inception, Boon Edam will install 18 lanes of barrier-free Speedlane 2048 optical turnstiles at the main entrance to the exhibits. The Speedlanes will be the first product that attendees encounter as they enter the exhibit hall.   Larger Booth For Increased Customers  Due to unprecedented sales growth over the last several years, Boon Edam has expanded its booth size at ASIS to the largest footprint ever—now 40’x40’, with several designated meeting areas to accommodate larger groups from global and enterprise customers.   Product Demonstrations  The booth will include the following products for live demonstrations:   A full complement of Speedlane Lifeline optical turnstiles, which were launched last year and offer on-trend styling and an intuitive user experience. The booth will include a Speedlane Swing, Slide and Open.   BoonTouch, a proprietary desktop touchpad with integrated software that enables efficient traffic management for many types of Boon Edam security entrances.   BoonConnect, an IP-addressable, proprietary software system that provides diagnostic and configuration tools for the Tourlock security revolving door and Circlelock mantrap portal. Users can access door operations and events using devices such as a tablet, laptop or smartphone via secured corporate network.   Tourlock 180+90, the best-selling security revolving door in the industry due to its high throughput and ability to prevent tailgating and piggybacking without manned supervision.   Circlelock mantrap portal is an anti-piggybacking solution for sensitive areas. ASIS, will be demonstrating the procedure for secondary biometric authorization inside the portal using the latest iris scanning technology by Iris ID Systems, Inc., called the iCAM7S Series reader.   Circlelock Wall Mount portal is a special half portal that can be used to retrofit an existing swing door into an unmanned and reliable anti-piggybacking solution. This special portal will demonstrate authorization using facial recognition technology from Stone Lock Global, Inc., called Stone Lock Pro.   Speedlane 300 optical turnstile, a practical optical turnstile with contemporary styling for detecting and deterring unauthorized entry.   Turnlock 100 full height turnstile, ideal for rugged outdoor environments and controlling access at the perimeter/fence line.   Trilock 75 waist high turnstile, a durable and versatile crowd control solution that works in a variety of applications, from outdoors to Class A office building lobbies.

Biometrics Prove Best For Preventing Time & Attendance Fraud
Biometrics Prove Best For Preventing Time & Attendance Fraud

Time and attendance has proven to be a successful use of biometric technology traditionally used for controlling access to highly sensitive areas Security technology is increasingly being used to help organizations tackle challenges going far beyond controlling access to office buildings and monitoring parking lot activity. Video, in particular, has become the darling of many markets. Retailers use live and recorded video to assess promotional sales efforts. Manufacturers confirm employees are following mandated safety regulations. Transit officials debunk false liability claims with a review of recorded mobile video. But here’s a relatively new one – biometrics. Long thought perfect for controlling access to highly sensitive public and private research and military facilities, they are showing up in offices, hotels — even in remote fruit fields and sugar processing plants — for employee time and attendance. It’s proven to be a successful use of the broad technology. Risks Of Mechanical And Electronic Clocks The process of keeping track of employees’ hours has long been open to fraud and other issues. Mechanical time clocks — in use since the 1800s — and even more modern electronic clocks using magnetic stripe or proximity cards are open to a process known as ‘buddy punching.’ That’s a scheme in which an employee clocks in and/or out for a friend who may be late or not even at work. Mechanical systems are also slow, potentially leading to long queues during shift changes resulting in wasted time and lost productivity. Mechanical cards also need to be keystroked into the payroll system, requiring significant back office time for data entry. Electronic cards can be shared. They may also be lost or stolen, costing additional time and money in back office expense. Even small errors in collecting and processing employee time and attendance can add substantially to the cost of payroll, already a major expense for any organization. Studies by a leading international human resources consulting firm have shown even small payroll errors and fraud can boost operating costs by up to 10 percent. Biometric Time And Attendance Solution But fraud, delays and lost credentials can be largely eliminated by a biometric solution. Common biometric systems involve hand or fingerprint readers, facial identification or iris recognition. Each technology records and then compares physical characteristics unique to every individual. However, changes in weight, hairstyle, finger or hand size, cuts or even the effects of manual labor can trigger the need for re-enrollment – in all except iris-based solutions. Fraud, delays and lost credentials can be largely eliminated by a biometric solution Iris Recognition Advantages The structural formation of the human iris (the visible coloured ring around the pupil), is fixed from the first year of life and remains constant. And few people can’t use the technology, as most individuals have at least one eye. Even blind people have successfully used iris recognition. At employee enrollment, iris systems utilize an industry-standard camera to capture an image of the iris. Software converts that to a small template stored in a terminal database. Authentication requires employees to stand roughly 18 inches from an iris reader and the process takes about two seconds. With multiple readers installed, long lines are eliminated. Also eliminated is fraud. Since every user’s iris is unique and required to be present at the reader, time fraud schemes are virtually impossible. The system can also prevent another type of back-office time fraud known as “ghost employees” – non-existent people added to the payroll. Security is also enhanced. The digital templates can’t be used to produce any sort of visual image, affording a high-level of defense against employee identity theft. An iris recognition system can also grant facility access as employee’s clock in for work. Iris Recognition Case Study Here’s an example of how an iris recognition system has benefitted a major Turkish fruit and vegetable grower and one of Europe’s largest providers of juice. The nature of the local work force created a major time-and-attendance challenge. "Fingerprint and facial recognition systems were tried briefly. Facial recognition suffered from workers’ changes in hairstyle, facial hair, glasses and protective gear" New labourers arrive daily seeking work. Once hired, they might work a few days and then leave before returning a week later. Unreliable schedules made standard time cards virtually impossible to manage. The company’s security integrator suggested smart cards as an option. But that wasn’t much of an improvement as authorizing, printing, distributing and tracking cards for thousands of on-and-off workers continued the human resources nightmare. Also, improper use of the cards threatened to cut into the company’s profits. Both fingerprint and facial recognition systems were tried briefly. The constant cuts and scars workers get from the manual labor impaired the accuracy of readers. Facial recognition suffered from workers’ changes in hairstyle, facial hair, glasses and protective gear. Daily payroll reports are transmitted to the company’s Istanbul headquarters using wide area networks in the fields and satellite communication. Software links the received data to a payroll module which automatically calculates employee hours and produces paychecks. The system currently has more than 10,000 enrolled workers. More are being added on an almost daily basis. Once a worker is in the system, it doesn’t matter how often he may leave. When he returns, the iris system immediately recognizes him. Also, the contactless iris-based technology inhibits the transfer of virus or bacteria as there is no direct employee contact with the biometric readers. If these systems can work in remote areas of Turkey, they can certainly work in downtown Boston. And they do. There, a boutique hotel uses iris-based identity authentication to keep the hours of its employees. The same system also allows VIP guests to enter their suites without a key card. Reductions In Cost Recent reductions in both product and deployment costs have made using biometrics, including iris recognition, a practical time and attendance investment for organizations of almost any size and in any location. Of course, biometrics still remains the go-to choice for protecting sensitive locations and international borders, as well as national identity and voter registration programmes.

Related white papers

Four Areas to Consider in Frictionless Access Control

Physical Access Control In Higher Education

11 Considerations For Embedded System RFID Readers