South Wales Police have confirmed their intention to use facial recognition technology – rolling the application out to 50 police officers for an initial three-month trial. This will enable them to take a snapshot and analyze it immediately to answer the pressing question, “Are you really the person we’re looking for?” This introduction comes at a time when the effectiveness of facial recognition technology is still being challenged in court. Despite the positive decisio...
Iris ID, a global provider of iris recognition technology, announced its award-winning multimode iCAM M300 handheld biometric platform now offers gateless access control, time and attendance and employee mustering for both commercial and government markets. The new functions are possible with embedded XPressEntry software from Telaeris, a provider of real-time personnel tracking solutions. Also using Iris ID’s Iris Access EAC software, the iCAM M300 continues to provide an ideal portable...
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organization, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR wor...
Sepio Systems, which is disrupting the cyber-security industry by uncovering hidden hardware attacks, is gaining momentum in the U.S. after adding an important new customer and channel partner – the Integrated Security Solutions business unit of Johnson Controls, and strengthening its advisory board. Mitigating hardware-based attacks Sepio offers the world's first end-to-end solution that detects and mitigates hardware-based attacks, including rogue peripherals, invisible network devices...
Globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has announced that it has now shipped 1 billion fingerprint sensors worldwide. The Swedish-based biometrics specialist company has played a central role in bringing smartphone fingerprint sensors to the mass-market. Having led major advancements to the technology, Fingerprints was responsible for driving the first integration of fingerprint touch sensors into an Android handset back in 2014, with its high-tech fingerprint...
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple color and infrared cameras that can detect facial features and confirm an identity. Real-time 3-D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a r...
IDIS will celebrate five years at ISC West International Security Exhibition in Las Vegas, April 10-12th, with a comprehensive showcase of the South Korean manufacturer’s IDIS Total Surveillance Solution in booth #18059. Highlights of the company’s fifth anniversary with ISC West include areas of special emphasis on cybersecurity, deep learning analytics and facial recognition, and solutions for the retail and banking sectors; and a review of IDIS’s latest technology releases. Founded in 1997 by experts in computer science and artificial intelligence, IDIS has grown to become the largest manufacturer of video surveillance technology within South Korea and a leader in industry innovation, anchored by the company’s flagship DirectIP offering—a true plug-and-play solution that eliminates the complexity of installing and operating networked surveillance systems, and extending through to the modular, feature-rich IDIS Solution Suite software and IDIS latest Deep Learning Engine-powered analytics. Innovations And Solutions At ISC West Some of the specific innovations that IDIS will highlight in booth #18059 at ISC West this year are: The latest in IDIS cybersecurity innovation, including edge encryption and IDIS Chained Fingerprint, the company’s proprietary integrity check which chains adjacent images with stored digital fingerprints, allowing for the detection of possible tampering or alteration The newest IDIS Deep Learning Analytics offerings—powered by the IDIS Deep Learning Engine—including IDIS DV-2116 IDLA-ready hardware (with an embedded NVDIA GTZ1060 GPU chipset), and the introduction of IDIS Intelligent Search, allowing tracking by color, object, and number; and new IDIS face tracking technology Latest-generation iterations of IDIS’s core surveillance offerings, including the DirectIP 12MP Panomorph and new 5MP Compact Fisheye cameras—utilizing IDIS’s industry-leading dual-sided dewarping technology—delivering IDIS’s celebrated Fisheye technology in all the ways our users need them; and the official debut of the full IDIS Compact Solution and upgraded IDIS HD-TVI line ups Exhibiting For The Fifth Time We look forward to returning to the show for the fifth time to highlight the powerful innovation and market-responsive technology"IDIS America President Andrew Myung remarked, “The IDIS partnership with ISC West has been a fruitful one from the beginning. We chose ISC West to launch the IDIS brand in the Americas in 2015 and launched a year-long Americas-wide celebration of our Two Decades of Innovation on the ISC West floor in 2017 to celebrate our 20th Anniversary. “We look forward to returning to the show for the fifth time since IDIS America’s successful debut to highlight the kinds of powerful innovation and market-responsive technology that are IDIS’ signature and to engage in the kinds of insightful conversations about the state and future of our industry that are ISC West’s signature in booth #18059." Debut Of ‘Create A Better World’ Campaign IDIS will also debut the IDIS ‘Create a Better World’ campaign on the show floor this year. As described on the company’s official campaign page, “Creating a Better World is all about the kindness and generosity ‘caught on camera’ every day (so easy to overlook in these stressful times), and the many ways we all can do our part to create a kinder, warmer, better world.” The campaign will involve public participation and a contest, and the kick off will offer visitors to the booth the chance to win gift cards and a Smart Home Starter Pack. For more on these offerings, DirectIP, the IDIS Total Surveillance Solution, or the “Create a Better World” campaign, visit IDIS at ISC West in booth #18059.
The MFC-2160 fingerprint sensor is based on capacitive-touch technology with a hardened surface and enhanced ESD strength. The built-in analog and digital circuits could minimize the number of external components and provide easy-to-use standard SPI interface to microprocessors. MFC-2160 Capacitive Fingerprint Sensor The operation of the MFC-2160 capacitive fingerprint sensor is as following: a fingerprint image captured by the pixel array, delivering fingerprint ridge or valley signals to A/D converter and digital processor, then to the serial peripheral interface for data-reading. The image quality of MFC-2160 capacitive fingerprint sensor can be adjusted by setting gain, offset and reference voltage parameters internally. In addition, the internal operations and interface speed can also be configured to meet various finger conditions. MFC-2160 capacitive fingerprint sensor also has a finger detection function and windowing function for different applications.
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced they are emphasizing tailgating mitigation through integrated technologies in booth #8037 at the ISC West exhibition in Las Vegas, NV from April 10-12. ISC West is the largest security trade show in the United States, bringing together 30,000 security professionals for its 3-day event. Boon Edam is also the official turnstile sponsor of the show. Tailgating Mitigation Through Integrated Solutions While access control technologies grant or deny entry to secure areas within a facility, in order to eliminate tailgating you must ensure that only one person enters for each valid authorization,” said Tracie Thomas, Vice President of Marketing, Boon Edam. “We’re proud to be showcasing how our security entrances work hand-in-hand with leading technologies to provide unmatched access control for organizations, ensuring greater overall security.” The following solutions will be on display in Boon Edam’s booth: Tourlock 180+90: The industry’s best-selling security revolving door will feature an AMAG Symmetry card reader to demonstrate access control integration paired with the door’s uniquely high, bi-directional throughput and its ability to prevent tailgating and piggybacking without manned supervision. Circlelock Solo: Popular with Fortune 100 companies, and offering the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centers. The portal will be configured to demonstrate two-factor authentication: an AMAG Symmetry card reader on the outside of the portal conducts the initial authorization, then identity verification is conducted inside the portal by the iCAM7S Series reader from Iris ID. Lifeline Speedlane Swing: The industry’s slimmest optical turnstile features a custom, integrated pedestal that incorporates the MorphoWave touchless fingerprint technology from IDEMIA. This solution enables high throughput with the enhanced security of rapid biometric identification. Lifeline Boost: The Speedlane Swing optical turnstile will be outfitted with a stylish new pedestal design from Boon Edam, the Lifeline Boost. The pedestal houses a wide range of access control activation or biometric devices and its sleek construction perfectly complements the cabinets in the popular Lifeline optical turnstile series. The Lifeline Boost will include the latest version of Essex’s credential card reader now with optical Bluetooth and OSDP capability, the iRox-T with BLE expands for HID Global’s Mobile Access solutions. BoonConnect: Both the Tourlock and Circlelock doors in the booth will feature BoonConnect, an IP-addressable, and proprietary software system providing diagnostic and configuration tools for facility managers or maintenance technicians. Users can remotely access door operations and events using devices such as tablets, laptops or smartphones via a secured corporate network. ‘Tailgating-Themed’ Prize Giveaway To celebrate their continuing position as the market leader for security entrances, according to a recent report by IHS Markit, Boon Edam is again offering a tailgating-themed prize giveaway. All visitors to ISC West are invited to participate by visiting booth #8037 during show hours. Participants have the opportunity to win a variety of prizes that will help them make the most of the upcoming tailgating season: the Big Green Egg grill, a YETI cooler and more. Winners will be selected at random after the exhibition, and an announcement will be made to all participants via email by Friday, April 26.
Princeton Identity Inc., the identity management company, announced the launch of its new IOM Access600e iris and face biometric capture device, a premium level unit designed for high volume enrollment and fast, convenient identification in high security, high throughput applications. The Access600e replaces the company’s Access500e model, offering superior performance, significantly lower pricing, and a sleek, updated form factor that allows it to fit easily on tight table counters. The unit can comfortably process subjects with a wide range of heights, requiring them to simply glance at the device screen for a collection. Both face and iris can be processed in under 2 seconds. The 600e model features a fully contained lighting source, ensuring consistently high-quality capture of face and iris. Integration With Passport Scanners The Access600e integrates with passport scanners, fingerprint capture, badge readers and other sensorsThe Access600e integrates with passport scanners, fingerprint capture, badge readers and other sensors. This makes for a complete solution and streamlined enrollment that’s ideal for use at immigration checkpoints, secure military bases, and secure facilities with a large number of employees or contractors. Its ability to support large populations with high accuracy and throughput also makes it well-suited for arenas, cruise ships, theme parks and other commercial venues. The unit operates seamlessly with Princeton Identity’s Identity Management Platform and the IOM Access Control Product Suite, allowing for direct system enrollment. A web service interface enables integration into third party platforms with complex applications. Optional tri-modal enrollment is possible through integration with an external fingerprint capture device. Multi-Modal Biometric Identity Solutions The Access600e eliminates the traditional tug-of-war between convenience and security"Bob McKee, Princeton Identity’s VP, Sales and Marketing, says, “Princeton Identity’s multi-modal biometric identity solutions are the gold standard in accuracy while providing subjects with a fast and seamless experience.” Molly Levy, Product Manager says, “The Access600e completely eliminates the traditional tug-of-war between convenience and security, even in the most demanding, high-volume environments. Plus, with the Acces600e, we’ve been able to lower the price for such premium performance.” The IOM Access600e will be introduced at ISC West in Las Vegas, April 10-12.
Matrix COSEC ARGO is a performance, design and engineering wonder that brings a modern design to the access control and time-attendance applications. The device is equipped with an enhanced 3.5” IPS LCD touchscreen for optimizing users’ visual experience. The door controller is designed to meet the aesthetics, technology and harsh environment application requirements of the large & multi-location enterprises, SME & SMB organizations. Matrix COSEC ARGO Door Controller: Enhanced 3.5’’ IPS Touchscreen LCD with Gorilla Glass 2x times Faster and Accurate User Verification Fingerprint – Optical & Multispectral, RF Card and PIN Bluetooth, Wi-Fi, PoE, Ethernet & GSM/VoLTE (Through Dongle) 50,000 Users and 500,000 Events Innovative Design - Wall and Flush Mount IP65, IK08, CE, BIS, FCC, RoHS Compliant
Iris ID, global provider of iris recognition technology, and GenKey, a trusted provider of biometric identification solutions, has announced the integration of iris recognition cameras and matching engine into GenKey’s biometric ID platform, to provide an all-in-one solution for various biometric registration and verification initiatives. Advanced Security And Privacy Iris ID iCAM TD100 and iCAM T10 cameras and IrisAccelerator matching engine have been integrated into GenKey’s ID solutions. GenKey’s ID platform has helped many governments and organizations to improve inclusivity, reduce fraud and improve time and cost efficiencies. IrisID, the world’s most deployed iris recognition platform, provides advanced security and privacy, which further enhances GenKey’s ID platform. “GenKey’s ID platform is being used to identify and verify millions of people in several countries worldwide,” said Arnd Langguth, chief operating officer, GenKey. “We are experts in fingerprint biometrics, but our ID platform has been designed for multi-modality. Our customers expect proven, secure, high performance, that is why we choose IrisID. IrisID’s IrisAccelerator will plug-in seamlessly into our ID platform.” Iris ID Biometrics Authentication Systems The integration into Genkey’s ID platform now offers full deduplication on both modalities" The Iris ID technology provides a fast, accurate and non-contact method of capturing citizens’ biometrics, identifying people and detecting duplicates. Iris ID authentication systems are used worldwide for access control, time and attendance checks, national ID programs, border crossings, voter registration, and many other applications. The company’s solutions are currently being used by public and private organizations across Africa and on five other continents. Mohammed Murad, vice president of global sales and business development, Iris ID said the company’s technology is a natural fit with GenKey. Integration With GenKey Biometrics ID Platform “Our cameras are unaffected by dirt, grease, gloves, facial hair and other factors that can limit the quality of registration and identity verification of other biometric systems.” he said. “In addition to its speed and accuracy, our software has been proven to be highly effective for deduplication – the elimination of multiple registrations by the same person. The integration into Genkey’s ID platform now offers full deduplication on both modalities.” GenKey’s ID platform is designed for capturing biographic and biometric data of individuals in small to large-scale registrations and ensuring that each subject stored is unique. Besides its standard registration, verification and reporting modules, the software has customized modules for biometric voter verification, election management and biometric member verification for healthcare, and other use cases.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable Advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorized user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted Part Of Security Network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorized user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorized individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security By Location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal Items Using QR codes seem to be a simple but reliable identity and access control authentication optionMobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost Savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated Technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading Existing Security Systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid Systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organizations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing The Benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organization's security, while enhancing user convenience.Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics Challenges For Biometric Authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal among older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realize the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimizing performance through a combination of new technology and algorithms, while ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimizing Capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data.The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness Detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimizes performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimizes performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted Performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template Matching Modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical Access Control Integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy Considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Activity slowed on the last day of ISC West in Las Vegas, but there was plenty of momentum remaining and plenty more to see. In the end, Reed Exhibitions declared 2018 the biggest and most successful year to date for the show. There were an additional 4,000 square feet of exhibit space compared to last year and a 6 percent growth in overall attendance, according to Reed. The cloud, biometrics, deep learning and other technologies were among the big topics at the show, and even smaller exhibitors were pleased with the results. In particular, emerging technologies were successfully highlighted. Cloud-based Video Systems Cloud video company Eagle Eye Networks announced multiple new offerings at ISC West. One was the first cloud-based video system that accommodates HD-over-coax cameras using the HD-TVI protocol to operate over existing coaxial cabling. In effect, cameras connect with an HD-TVI recorder, which plugs into Eagle Eye Networks’ on-site hardware “bridge” connecting to the Internet. Eagle Eye Networks has also integrated Hikvision body-worn cameras into their cloud system; transmitting video using the Eagle Eye Bridge ensures end-to-end encryption and the evidentiary integrity of the video. Analytics in the cloud can be turned on and off at will for each camera, and could be deployed over a weekend and switched off the following week “A few years ago, fewer customers were ready to adopt the cloud,” says Ken Francis, President of Eagle Eye Networks. “Now market adoption is changing, and customers don’t want on-site hardware. End-users are driving the move to cloud systems.” He estimates the evolution is about halfway complete, and Eagle Eye Networks continues to sign up new dealers every month because their customers are asking for the cloud. Eagle Eye Networks’ third new offering at ISC West is “analytics in the cloud,” including familiar analytics such as intrusion, people counting and loitering. Francis says the economics of the cloud make implementation of analytics much more affordable – about $4 per camera. The economics of the cloud make implementation of analytics much more affordable Augmented Identity: Biometrics In Security Analytics in the cloud can be turned on and off at will for each camera. For example, analytics could be deployed over a weekend and then switched off the following week. “It’s a far more economically attractive and cost-effective service than on-site,” says Francis. Biometrics continue to make their way into the mainstream of the security market, and IDEMIA brought its message of “augmented identity” to ISC West. IDEMIA (formerly OT-Morpho) provides systems to the largest biometrics users in the world, including big customers such as the FBI and Interpol, and large-scale government projects around the globe. “If you can handle projects that big, enterprise applications are no problem,” says Gary Jones, Vice President, Global Channel & Marketing, Biometric Access & Time Solutions. He says that the company’s technologies apply to any vertical market, and they are especially common in major airports and big financial institutions, in addition to government. The company’s MorphoWave product allows users to wave their hand, and the system captures a three-dimensional shape of fingerprints. The touchless system is also “frictionless” -- it enables fast decision-making that promotes high throughput rates. Artificial Intelligence Applications AI and deep learning have been big topics of conversation at ISC West, and I saw a company on the last day of the show with a different take on the subject. BrainChip uses a type of AI called “spiking neural networking” that models the operation of neurons in the human brain - in contrast to “convolutional neural networks,” which use a series of math functions to train from pre-labelled data sets. The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects. Applications are in law enforcement, counter-terrorism and intelligence agencies.The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects “We search for specific things,” said Bob Beachler, Senior Vice President, Marketing and Business Development. The software can search hundreds of live or recorded camera feeds for a unique graphic pattern on an item of clothing or on a bag carried by a person, for example. The technology only requires modest processing power and consumes little energy, so it can be used with legacy systems without requiring hardware or infrastructure upgrades. Emerging Technology Zone A new Emerging Technology Zone at ISC West included participation by around 40 companies that are startups and/or new to the security industry. The section opened an hour before the main show floor and was located near the registration area, which increased traffic. “Generally speaking some people said it was hard to find, but I think it’s better for us as someone new to the market, rather than being on the main floor where you can get lost in the shuffle,” said Jeffrey Weiner, Vice President, Networks & Business Solutions, at Mersoft. “It was really smart that they opened this an hour earlier.” Mersoft, one of the Emerging Technology Zone exhibitors, has developed a software product to help the security industry do a better job of streaming live video. The software eliminates the startup delay and lag in live video. With dedicated software, video can be consumed by a browser or mobile app more easily Live Video Streaming “We accomplish that in two ways,” says Weiner. “One, we don’t trans-code the video into another format. Instead, we convert a security camera’s video from RTSP (real time streaming protocol) to WebRTC (Web Real-Time Communication), an open-source technology that has been used extensively in video conferencing, but not so much in security. The video can be consumed by a browser or mobile app more easily, and we don’t need a player on the client, which is another way we reduce lag.” Another advantage is that WebRTC is natively encrypted; every packet is encrypted. In contrast, applications that transmit RTSP have to be wrapped in a VPN (virtual private network) tunnel, which takes some effort to maintain and is a battery hog on a mobile device. Also, multi-casting of video is easier, even using streams of various resolutions. Mersoft works through partnerships, offering a cloud-hosted service on Amazon and a version that can be installed on a local server. They have worked with several DIY camera sellers (who use cloud services), and with some major commercial service providers. “A new partnership strategy we are exploring is with systems integrators, who can incorporate Mersoft and provide a differentiator by improving their video performance,” says Weiner. The 22-year-old company is new to security, and ISC West provides opportunities for in-depth conversations preparing for a future in the security sector. Customizable Turnstile Solutions Delta highlighted their new designer series turnstiles, whose colorful appearance led booth visitors to ask about customization Even the smaller companies, located toward the back of the hall, were enthusiastic about ISC West this year. “The show has been great,” says Vanessa Howell, project manager of Delta Turnstiles. “We did get a lot of traffic. I am a niche product, so it’s not so much about quantity as quality [of leads]. I had great quality at the show.” Being away from competitors, which are grouped next to each other in the front of the hall, was an upside of the turnstile company’s booth location toward the back. Delta highlighted their new designer series turnstiles, whose colorful appearance led booth visitors to ask about customization. “They ask: ‘Why are turnstiles only sold in basic models?’” says Howell. “’Why can’t they look like a piece of art since they are the first thing people see when they enter a building?’ People are very open to making them prettier.” Delta Turnstiles has been coming to ISC West since 2006. “I have manufacturer’s reps, and this is one of two times I get to see them in one place, and they bring a lot of customers to me at the booth,” says Howell. “This is my only face-to-face meetings with some customers. I speak mostly over the phone.” Valuable face-to-face engagement was a benefit of ISC West, and many of those meetings will likely set the stage for continuing successes in our vibrant market. Until next year.
Exhibitors at this year’s IFSEC are thinking outside the box in terms of how they communicate their value proposition and how they interface with customers. In the process, some are rethinking how big trade shows like IFSEC fit with their goals. Panasonic's approach to the 'race to the bottom' Thomas Lausten, MOBOTIX new CEO How Gallagher benefits from IFSEC without exhibiting Panasonic Systems Communications Europe Panasonic Systems Communications Europe is one of several companies emphasizing solutions at IFSEC rather than products. In Panasonic's case, the approach helps to explain why the company doesn't have a traditional trade show stand. Instead, Panasonic opted to sponsor sessions in the security management education theater on the show floor, and to host potential customers in a (quieter, cooler) meeting room upstairs. "We are inviting some of our key integrators for general business meetings in a relaxed environment, and offering two lunch-and-learn events about cybersecurity," says John Boyle, Panasonic's Country Manager for the UK and Ireland. There was standing-room only at the cybersecurity events, he adds. TBS specialises in 3D touchless biometrics and offers a full portfolio of fingerprint biometric technologies Compelling Value Proposition Trade shows seem historically to be about "here's our new box," Boyle observes. "We would rather talk to customers and channel partners about what issues they face, whether it's counting people or detecting scenes." Panasonic is creating solutions that combine their own technologies with third party partners filling in any gaps. "We are creating value propositions that we can take to integrators. They need a new story to tell their customers, not just a new box. Let's look at Panasonic's technology and how that adds value. If we have a compelling value proposition, we are giving our integrators an opportunity to get more business." Boyle acknowledges that the Panasonic approach is a way to bypass the price-focused "race to the bottom" that is lowering camera prices. "Pricing comes later if the value of a solution has already been established," he notes. Touchless Biometric Systems Philippe Niederhauser, Head of Sales and Marketing for Touchless Biometric Systems (TBS), Switzerland, is amazed at how many people come to IFSEC seemingly to browse around with little focus on what they need. "There are people who don't really know what they are looking for," he comments. "If I go to a trade show, I know exactly what I want." Niederhauser also sees some of his fellow exhibitors missing the boat in terms of marketing, tending to emphasize products rather than solutions. "Some people just put products out there, and they look similar; it is hard to differentiate," he says. "This is where you need to show a difference in products, and communicate the value proposition." TBS specializes in 3D touchless biometrics, and offers a full portfolio of fingerprint biometric technologies, also including 2D optical, 2D capacitative, and 2D multispectral systems. MOBOTIX Keeps Focus On Technology A challenge in Thomas Lausten's new position is to communicate the advantages of MOBOTIX more effectively to the market Trends at this year's show are a big emphasis on cybersecurity, more integrated systems and applications that extend beyond the traditional definition of security, says Thomas Lausten, who just joined MOBOTIX as the new CEO. Cybersecurity is a strong suit of MOBOTIX, given the German video company's unique platform, an approach Lausten describes as "a computer with a lens." He says a challenge in his new position is to communicate the advantages of MOBOTIX more effectively to the market and to achieve the company's unrealized potential. "I don't see Mobotix as a traditional camera manufacturer," he says. "There is a fundamental difference between launching a camera and having a core philosophy as a company. I have been tasked with [managing] a company with a potential to be re-defined. Our mission is to develop a more open source company, although still an end-to-end solution, and a company that looks at the industry in a different way." He says the industry can expect new camera and software releases as MOBOTIX keeps its focus on technology. Quality Communication Through Smaller Events Gallagher, a New Zealand-based access control and perimeter security manufacturer, is an example of a company that seeks to benefit from IFSEC without exhibiting at the show. Steve Bell, Gallagher's Chief Technology Officer, traveled thousands of miles to the show for the networking opportunities, and Gallagher hosted a channel partner event in the evening, leveraging the fact that others have traveled to the show. "Trade shows are expensive outlays," says Bell. "For our strategy, we like more focused events, getting smaller groups together. Sometimes the big trade shows aren't focused enough. The people we might want to communicate with only have a short time, and it's a noisy environment. We don't have the quality communication we'd like to have. Smaller events provide more quality time." With manufacturers looking for new ways to engage with customers and build their businesses, the role of trade shows like IFSEC will, of necessity, continue to evolve.
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large, well-known companies and the government. “When big disasters happen, people begin rethinking what they need to protect against,” says Dick Fordham, Director of Marketing and Strategy, Recovery Point. “We try to imagine the worst that can happen, and put in place adequate measures to provide the security in those areas.” Recovery Point is a national provider of integrated business continuity and disaster recovery systems. The company stores copies of its customers’ critical enterprise data on its servers in multiple locations. Recovery Point enables customers to bring their systems and networks back up and let employees continue working despite any damage from the disaster. “We’re not a big company – about 150 employees – but we can service the biggest clients because we provide a high degree of personalized service,” says Fordham. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape Client Data Storage And Backup Recovery Point’s flagship facility is located on a 17-acre private campus in Germantown, Maryland; about 30 miles northwest of Washington, D.C. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape in high-end, secure vaults. There are also two 100-seat work areas where displaced workers from customer companies can continue to perform their duties – one in Gaithersburg and another one in Kenosha, Wisconsin. Recovery Point is also a tenant in a data center in Mt. Prospect, Illinois, providing an additional, redundant location to store data in case of a disaster. Recovery Point offers cloud backup strategies to handle data from major computer systems used by large companies; whether it’s mainframe computers, AIX operating systems or iSeries. In addition to providing recovery services in case of a disaster, the company works with companies daily to test and maintain their systems and to provide proof-of-concept demonstrations. Concentric Circles Of Security Security is a large part of the services Recovery Point provides. The company leverages the most secure approaches and technologies to ensure that customers’ data is protected, including the familiar “concentric circles of security” approach familiar to most security practitioners. At the center of the circle is the data of customer companies, what Fordham calls ‘the crown jewels.’ Recovery Point uses a combination of cyber, network and physical security to protect a customer’s data assets. “If their data is gone or corrupted, their business is gone or corrupted,” says Fordham. Location of the data center(s) is the first stage of protecting the backup data. Recovery Point is located outside urban areas, away from likely terrorist threats, in an area that is not prone to hurricane or tornado activity. The ‘geographically stable’ area is above the 100-year floodplain. At the perimeter, there is no signage identifying the company or its mission. An anti-ram barrier topped with a 10-foot personnel security fence encircles the campus. At the gate, visitors must be validated remotely or by authorized badge and security code. Inside the perimeter, there are hydraulic anti-vehicle barriers that can resist a 30-ton truck going 50 miles per hour. Bollards at four-foot intervals keep vehicles away from the building. Visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass Inside, visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass. Badges allow access only to the specific areas a visitor needs, whether it is the location where their data is stored, temporary work areas, meeting rooms or overnight sleeping quarters. Two-factor authentication includes iris-scan, fingerprint and voice recognition biometrics. Data Security Process Independent certification, including auditing of processes and physical boundaries around the data, meets standards such as the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorization Management Program (FedRAMP). The network and power must also be stable and Recovery Point has Uptime Institute Tier 3 certification, which includes redundant, switchable systems. There is an A side and B side to each system; if one side is ‘down’ for maintenance or a malfunction, the other side is fully functional to ensure uninterrupted service. “Customers have already had one disaster,” says Fordham. “We make it as painless as possible for them not to worry about their data, to make them feel secure. In a disaster there are other things to worry about, such as their home and families. We want security you can see and security you can feel.”
NEC Corporation has announced that NEC Technologies India (NECTI), a pioneer in the integration of IT and network technologies, has partnered with the Centre for Development of Advanced Computing (C-DAC) to deploy its industry-leading automated fingerprint identification system (AFIS) for the Kerala State Police in India. The new AFIS will be used by the Kerala State Police to match unknown fingerprints against a central database of known fingerprints for criminal investigation. More than 600 police/enforcement facilities across the state, including police stations and the district police headquarters, will have access to the system for verification and new registration of fingerprints. Faster and accurate fingerprint verification The new system is able to enhance the quality of fragmented fingerprints captured at crime scenesThis new system will help state police accelerate investigations more efficiently by providing a faster and more accurate fingerprint verification. The new system is able to enhance the quality of fragmented fingerprints captured at crime scenes and makes it possible to match the prints against the central database. NEC's AFIS boasts the world's no. 1 authentication accuracy and is a core technology of the company's portfolio of leading biometric solutions, ‘Bio-Idiom’. Mr. Takayuki Inaba, Managing Director, NECTI, said, "NEC has always been at the forefront of public safety. As a world leader in biometrics technologies, we are delighted to be working with C-DAC and the Kerala State Police to implement a new fingerprint recognition infrastructure, and are committed to building safer and smarter cities in India."
Ahli United Bank (AUB) is a leading financial institution providing banking, investment, and wealth management services from 147 branches in eight countries. Utilizing Gallagher’s business and security solutions in Bahrain since 2008, Ahli United Bank decided in 2017 to undertake a full upgrade of the systems at its headquarters. Installing controlled doors As part of upgrading the full product suite at its Bahrain Headquarters – which included all controlled doors and software – Ahli United Bank (AUB) also took the opportunity for a complete re-design of the set-up and locations of its security system. The bank was committed to finding a product that was cost effective and had a long life expectancy. While researching their options, AUB management saw a demonstration of Gallagher’s Mobile Connect technology and were immediately convinced that this was the ideal product for the bank’s upgrade. Gallagher Mobile Connect uses Bluetooth wireless technology to enable users to badge at a reader using a smartphone Gallagher Mobile Connect In late 2018, AUB began testing the new mobile solution on site then to be rolled out to most of its staff at headquarters. Gallagher Mobile Connect uses Bluetooth wireless technology to enable users to badge at a reader using a smartphone instead of an access card. A huge benefit for AUB is the solution’s capability to add additional layers of security where needed. Gallagher’s Mobile Connect solution provides the option to apply two-factor authentication via the smartphone – either fingerprint, PIN, or facial recognition – delivering heightened security over access to restricted areas. According to AUB’s management, the two-factor capability was very appealing to them. “Using mobile with facial recognition is far more secure than card and PIN, and it’s immensely more cost-effective than buying biometric readers,” they said. Temporary remote access control From an administrative and site management perspective, Gallagher Mobile Connect provides AUB with significant flexibility. Easy provisioning means that authorized staff can remotely allocate temporary access in advance and can also schedule when a user’s access can begin and end – ideal for visitors and contractors who come to the bank’s headquarters. Beyond Mobile Connect, readers and controllers, AUB uses Gallagher’s security software platform, Command Center, to manage alarms and access for its headquarters and all branches, all from a centralized location. “The power of Command Center is enormous,” said AUB’s Management. “It integrates with our CCTV equipment and gives excellent oversight of our operations.”
Police forces recognize biometrics as a potentially critical tool to improving the quality and efficiency of policing across the globe. As part of a diverse Digital Authentication strategy, automated facial recognition surveillance is becoming an integral part of our digital policing, with the UK Home Office planning to invest a huge £97 million into a broader biometric technology approach to safeguard our streets. Automated facial recognition surveillance Digital fingerprint-based authentication is still widely regarded as having a higher level of maturity However, the latest court case against the South Wales Police as well as the Amazon backlash over the sale of its technology to the US police has highlighted that acceptance of the use of biometric technology as much as the maturing of the technology is important to achieve the expected benefits for the police. Digital fingerprint-based authentication is still widely regarded as having a higher level of maturity, has an implicit acceptance linked to the identity of the individual and delivers a lower false positive result. Facial recognition, when used as a stand-alone biometric, suffers from the risk of challenge or refusal to accept as in the case of the challenge to the South Wales Police pilot program. In addition, gender and racial bias as well as scenarios such as poor lighting and individuals wearing accessories impacts on reliability. Advancements in biometrics There is clearly a need to focus on how biometrics, as technology matures, can support identity verification at scale and to gain widespread public acceptance as part of a wider digital policing initiative according to Jason Tooley, Chief Revenue Officer at Veridium. Jason comments: “Police forces around the world are looking to integrate the latest advancements in technology to enhance public security and cut costs, and biometric solutions are integral to this movement. With the maturing of biometrics techniques and many different scenarios to address, it’s imperative to use the right biometrics for the right requirements and to create a strategy that facilitates the use of multiple biometrics. We would advocate an approach that abstracts the identity verification and digital authentication processes from the services and creates a biometric platform to match the specific requirements of the police and the public.” Fingerprint recognition Fingerprint, being the most mature and widely used has biometrics, has high levels of acceptance today" He adds, “There are current barriers to the acceptance of biometrics which will be overcome as trust in the technology becomes the norm. Fingerprint, being the most mature and widely used has high levels of acceptance today and is easily adopted by police and public. It requires public acceptance and doesn’t work for wider surveillance techniques but for individual verification, police moving to a digital fingerprint capture mechanism rather than physical has great benefits and the public are more likely to be accepting of enrollment. Facial recognition would be a surveillance at scale solution but the challenges of maturity and external factors as well as public acceptance are challenges to be overcome in the future.” Jason continues, “It is imperative for police forces to take a strategic approach as they trial biometric technologies, and not solely focus on a single biometric approach. With the rapid rate of innovation in the field, an open biometric strategy that delivers the ability for the police to use the right biometric techniques for the right requirements will accelerate the benefits associated with digital policing and achieve public acceptance by linking the strategy to ease of adoption.”
IndiaNivesh is one of the leading financial services conglomerate in India. IndiaNivesh is into various aspects of investment banking and consulting business. It plans to emerge as a dynamic, customer-centric, and progressive financial group in the country with PAN India presence. Having its head office in Mumbai, IndiaNivesh is growing with eight regional offices and 29 branch offices across India. Project Specifics Application: Time-Attendance and Access Control Locations: 32 (PAN India) Users: 500 Units Installed: 60 Readers: Fingerprint and RFID Card IndiaNivesh being widely involved in financial services business with 29 branch offices and 8 regional offices across India, required eradication of forged attendance data and manual attendance process, as security is a crucial aspect for them. To streamline and manage attendance data of all employees accurately and perform calculation of error-free salary has been a tedious task. It has been challenging to integrate their existing payroll software with the time-attendance software. COSEC Time-Attendance Solution Matrix offered COSEC time-attendance solution helped in connecting all its regional and branch offices to their head office in Mumbai Matrix offered COSEC time-attendance solution which has web-based architecture and helped in connecting all its regional and branch offices to their head office in Mumbai. Implemented automatic salary calculation as Matrix COSEC time-attendance software got easily integrated with existing payroll software. Result Real-time attendance of all employees at a centralized location Integration with its existing payroll software Ease of Implementation using the existing infrastructure Fraudulent timekeeping is completely eliminated Accurate In/Out time of each employee recorded Live monitoring of In/Out timing Generation of time-attendance and access control reports and charts for all branches Improved overall productivity of the organization Continuous operations with excellent service support Biometric Access Control Solutions COSEC DOOR FOP - Optical fingerprint-based door controller for access control and time-attendance COSEC DOOR CAS – Card-based door controller for access control and time-attendance COSEC PANEL - Site controller to manage multiple door controllers and advanced access control Features COSEC LE PLATFORM - Application server platform for 1000 users and expandable up to one million users COSEC LE TAM - Comprehensive time-attendance and leave management module for COSEC LE platform COSEC LE ACM - Comprehensive access control module for COSEC LE platform
Iris ID, a global provider of iris recognition technology, has partnered with Africa’s leading manufacturing conglomerate, Dangote Group, to provide a time and attendance solution for more than 30,000 employees working at Dangote Cement manufacturing plants in five countries. The Dangote Group is a Nigerian multinational industrial conglomerate, founded by Aliko Dangote. It is the largest conglomerate in West Africa and one of the largest on the African continent. The group employs about 35,000 people, generating revenue in excess of US$4.1 billion in 2017. Contactless Facial Recognition System Prasanna Burri, group chief Information officer, Dangote, Group, said the company wanted a biometric solution that provided greater accuracy than a facial recognition system previously used at the company’s cement manufacturing plants in Nigeria, Ethiopia, Senegal, Sierra Leone and Congo. The new system also had to be contactless to reduce the chances of spreading colds, flu and other diseases. The Iris ID readers provide us with a secure time and attendance solution" “Iris-based technology is not only contactless and more accurate but also faster than our previous system,” he said. “The Iris ID readers provide us with a secure time and attendance solution, deployed in Dangote Group’s public cloud that integrates seamlessly with the enterprise resource planning system at our Nigerian headquarters.” Early Success Burri said the system’s early success has Dangote considering expanding it to more of its African operations. Mohammed Murad, vice president global sales and business development, Iris ID, said the iris-based solution was ideal for use in the Dangote cement manufacturing operations. “Our contactless readers work well in a dusty environment and are unaffected by employees wearing safety glasses and other protective gear,” he said. “Dangote is the largest indigenous industrial conglomerate in sub-Saharan Africa, helping to drive the continent’s growth. We’re happy to play a part.” Time And Attendance System Initial installation of the time and attendance system was completed by Maxut Consulting Ltd. Of Lagos, Nigeria. Iris ID technology is used in several African nations providing identity authentication for national ID, voter registration and other public and private programs.
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organizations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric High-Throughput System The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility Entry Control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless Iris Authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?