Global Net Solutions (GNS), an innovator in facilities-based smart security and business intelligence solutions, today unveiled its S-Badge, a revolutionary IoT-based security solution designed to improve safety and tackle insider threats and breaches in high security environments, such as airports, hospitals, school districts and college campuses, government agencies and more.

The S-Badge solution is the world’s first security system leveraging a multi-sensor Bluetooth low energy beacon, multiple data sensors and High Frequency RFID technology to track people, property and assets with location monitoring in indoor and outdoor settings. Each badge is individually customized with a printed photo ID on a scratch-proof and water-resistant beveled surface. 

Artificial Intelligence And Machine Learning

Unlike other systems, the S-Badge leverages the latest IoT technology, artificial intelligence (AI) and machine learning to enhance security and unlock an entirely new range of functionality and data that go far beyond today’s standards. The proprietary, turn-key solution utilizes an innovative system of on-site LoRa gateways and a battery-smart, all-in-one authentication badge that verifies a user's identity based on location, a biometric signature and a preprogrammed NFC chip. The S-Badge also features a panic button to discreetly signal an emergency, along with the badges’ location.

We’re living in a time when security and privacy have never been more important, yet no company is tracking people once they’re in the door,” said Michael Elias, director of business development, Global Net Solutions. “Existing systems let the fox in the hen house, so we developed the S-Badge. Now you can be 100% sure of who is accessing what, where and when, without risk of security breaches from negligence, oversights or abuse. Most importantly, we only track individuals when they are within the campus or facility, not at home or off duty.”

The S-Badge’s unique three-factor authentication process provides the highest level of security while solving the most common problems that plague existing systems, such as badge abuse and lost or stolen badges.

The S-Badge also features a panic button to discretely signal an emergency, along with the badges’ location
This is an ideal method for protecting an individual’s privacy – as the badge cannot be tracked off site

S-Badge Processes

  • Biometric Authentication – the S-Badge must be activated using advanced fingerprint verification, which also measures moisture, temperature and electricity in the live skin to ensure that only the authorized individual can activate the badge
  • Location Authentication – the S-Badge communicates with surrounding gateways to verify its authenticity and exact location at any time
  • Secure Element Authentication – an individually-programmed NFC chip verifies whether the user is authorized to access a specific area or assetsTo further enhance security, the S-Badge utilises advanced AI and machine learning to create a prediction model

To further enhance security, the S-Badge utilizes advanced AI and machine learning to create a prediction model, which can help identify threats in real time based on past behavior and location data. When the prediction model recognizes unusual behavior – like spending too much time in a restricted area – the system can send an alert to security to notify a potential problem.

Individual Privacy Protection

Advanced features, like location monitoring, the emergency distress signal and machine-learning prediction modeling capabilities, are powered by the stationary gateways throughout a structure or site that communicate with the S-Badge. This is an ideal method for protecting an individual’s privacy – as the badge cannot be tracked off site – but still enables data and business insights that can increase employee productivity, improve the customer experience and further enhance safety and security.

Existing systems and standards are riddled with flaws – they’re simply outdated. Also, there is a goldmine of data that, up until now, has been completely ignored,” Elias added. “What we came up with is the first complete system designed to work in any environment – it’s scalable, easy to use and can be deployed immediately.”

S-Badge Features:

  • LoRa Transceiver Module – low-power, long range radio for communication with gateways up to five miles away
  • Panic Button – any user can discreetly signal an emergency along the badge’s exact current location
  • Flexible Infrastructure – cloud-based or on premise server infrastructure giving customers complete control, liability and security of their own data
  • Wireless charging – capability via an NFC-wireless charging pad
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Are Privacy Concerns Stifling Innovation in Security?
Are Privacy Concerns Stifling Innovation in Security?

Facial recognition is the latest technology to be targeted because of concerns about privacy. If such concerns cloud the public perception, they can be harmful to technology markets. Whether the concerns are genuine or based on misinformation is often beside the point; the practical damage has already been done. But beyond market demand, what is the impact of privacy concerns on technology innovation? We asked this week’s Expert Panel Roundtable: Are privacy concerns stifling innovation in security and related markets? 

Building Security: How Audio Tells the Whole Story
Building Security: How Audio Tells the Whole Story

Every building starts with the entrance. A solid enterprise risk mitigation and security strategy include protecting that entrance. Often, risk mitigation strategies protecting the entrance have included high-resolution video surveillance cameras, video management systems, and access control solutions. But that strategy and set of security solutions only tells part of the story. Imagine a security guard who is protecting a facility after hours, when an individual approaches the entrance and seeks to gain access. The security guard can pull up the video surveillance feed and see the individual and his movements, which appear to be suspicious. But he also needs to hear him in order to decide the next decisions and actions. Does he escalate the situation, calling for backup and for first responders’ response, or does he allow the individual access to the building because he works there and is authorized to enter?   Meet high-definition voice What the security guard needs is to be able to hear and to communicate with that individual. All enterprise security systems need three primary components in order to successfully protect the entrance and to mitigate risk – access control, video surveillance, and the ability to hear and communicate. Each component plays an integral role in supporting a unified security system, and without all three, the security system is not complete. Access control can be thought of as the brains of a security system by holding data and permissions. It serves as the arms and hands of the system; it can either keep someone out or invite them in. IP video allows a security team to remotely position a set of eyes anywhere an IP camera can be placed on a network. With a video management system, security teams can see what is happening and decide how to respond. However, with remote viewing, the event may be over by the time security physically responds.  Audio adds interactivity That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides value. It also means that security is interactive. Security teams talk and listen to the person that’s seen on a video surveillance system, no matter where the location or how remote. If the person is lost or simply needs assistance, security personnel can talk to them and provide direction and reassurance. Even more, in an emergency, an interactive solution becomes a critical life-saving tool, as it provides data that can be shared between security, police, emergency services, and more. Audio can also detect voices, noises, breaking glass, or other sounds that are not within direct view of a video camera. An interactive security system creates an informed response, by providing real-time situation awareness management. Post-event, it supports forensics and investigations to mitigate future security incidents.  Audio and COVID-19 We are living in extraordinary times. As businesses begin to reopen and stay open, they are looking for any tools that can help them overcome the enormous challenges they face. In buildings and facilities, the COVID-19 pandemic has created a new security perimeter, one that demands contactless access with entry and exit, and that has also created a new duty of care for security professionals. Now more than ever is the need to interact and communicate with individuals moving in and out of doors and spaces without physical intervention. Intelligent communications, integrated with contactless access control, can help a business to comply with pandemic safety guidelines and ultimately, reopen for business and stay open.  COVID-19 has also increased the need for clean-room isolation and quarantine spaces, sometimes in areas not originally intended for that use, where risk of infection is high, and equipment must be easily disinfected between patients. Here, purpose-built cleanroom intercoms, providing clear touchless communications despite the noisy environment, have emerged as critical tools for enabling patient care while reducing the need to enter the contaminated space. For example, voice communication can enable hospital staff to verify identity and to communicate with patients without entering the isolated and infectious environment, which can save on personal protective equipment (PPE) and reduce the amount of exposure to the virus. In non-emergency healthcare facilities, such as medical centers, voice can effectively relay information to building occupants and visitors for screening purposes. Visitors can be seen and heard. For example, a patient who seeks access to a medical center for an appointment can hear important instructions from a nurse via the intercom solution. Seeing the person that you talk to is one thing but hearing them conveys a much better sense of closeness, making it possible to maintain a high level of security and customer service.  The whole story Today’s security systems should no longer simply involve video surveillance cameras generating feedback and images to a security guard. Instead, a new ecosystem for enterprise security and risk mitigation has emerged, and it’s one that involves video surveillance, access control, and high-definition voice. That ecosystem can ensure well-rounded and responsive information management and security platform, all communicating with each other and offering actionable insight into risks and potential physical breaches. Audio is the new value hub of the connected and intelligent school, campus, building, correctional facility, and more. Simply put, a silent security system cannot be an effective security system. In every situation, it is crucial for all security professionals to mitigate risk, no matter what they are protecting. This emphasizes the need to hear, be heard, and be understood in virtually any environment.  

Inclusion and Diversity in the Security Industry: ‘One Step at a Time’
Inclusion and Diversity in the Security Industry: ‘One Step at a Time’

Historically, concerns about inclusion and diversity have not been widely discussed in the security market. In the last couple of years, however, the Security Industry Association (SIA) and other groups have worked to raise awareness around issues of diversity and inclusion. Specifically, SIA’s Women in Security Forum has focused on the growing role of women in all aspects of security, and SIA’s RISE community has focused on “rising stars” in an industry previously dominated by Baby Boomers. The next generation of security leaders There is a business case to be made for diversity and inclusion, says a report by McKinsey & Company. According to the management consulting company, gender-diverse companies are 24% more likely to outperform less diverse companies, and ethnically diverse companies are 33% more likely to outperform their less diverse counterparts. Furthermore, the “next generation of security leaders” – employees under 30 – are particularly focused on diversity and inclusion. Diversity refers to the traits and characteristics that make people unique A panel discussion at ISC West’s Virtual Event highlighted aspects of inclusion and diversity, starting with a definition of each. Diversity refers to the traits and characteristics that make people unique. On the other hand, inclusion refers to the behavior and social norms that ensure people feel welcome. “We are all on a journey, and our journey takes different paths,” said Willem Ryan of AlertEnterprise, one of the SIA panelists. “There are opportunities to improve over time. We can all change and increase our ability to have a positive impact.” Industry responsibility The industry has a responsibility to the next generation of industry leaders to address issues of inclusion and diversity. Forbes magazine says that millennials are more engaged at work when they believe their company fosters an inclusive culture. So the question becomes: How do we unify and create opportunities to work with and champion tomorrow’s leaders? SIA is driving change in our industry to achieve that goal. More women are active in SIA than ever before. The SIA Women in Security Forum now has 520 members, said Maureen Carlo of BCD International, the SIA Women in Security Forum Chair and another panelist. Also, more women than ever are chairing SIA committees and serving on the SIA Board of Directors. More women than ever are chairing SIA committees Overcoming unconscious bias Former SIA Chairman Scott Shafer of SMS Advisors, another of the panelists, noted that SIA awarded the Chairman’s Award to the Women in Security Forum in 2019, and to the RISE community steering committee in 2020. “There are lots of ways we are seeing the elevation of women and ethnic groups in the security industry,” said Shafer. One topic of interest is the problem of “unconscious bias,” which can be overcome by looking at something through some else’s lens. Ryan suggested use of the acronym SELF –  Slow Down, Empathize, Learn, and Find commonalities. Ryan recalled the value of being mentored and having someone shepherd him around the industry. “Now I want to give back,” he said. “We need to look at the things we can change in ourselves, in our company, in our communities, and in our industry. Change comes from the bottom and the top.” Increasing representation “It takes all of us to increase representation everywhere,” said Kasia Hanson of Intel Corp., another panelist. “We have in common that we are all human beings. Let’s make sure the next generation all have opportunities.” Diverse companies can attract better talent Moving forward, the panelists urged the industry to get involved and create opportunities because inclusion drives diversity. Diverse companies can attract better talent and attain a competitive advantage. Awareness of unconscious bias, and working to eliminate it, is an important element of change. Despite the progress the security industry is making, change continues to be incremental. As Ruth Bader Ginsburg has said, “Real change, enduring change, happens one step at a time.”