Globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has announced that it has now shipped 1 billion fingerprint sensors worldwide. The Swedish-based biometrics specialist company has played a central role in bringing smartphone fingerprint sensors to the mass-market. Having led major advancements to the technology, Fingerprints was responsible for driving the first integration of fingerprint touch sensors into an Android handset back in 2014, with its high-tech fingerprint...
The MFC-2160 fingerprint sensor is based on capacitive-touch technology with a hardened surface and enhanced ESD strength. The built-in analog and digital circuits could minimize the number of external components and provide easy-to-use standard SPI interface to microprocessors. MFC-2160 Capacitive Fingerprint Sensor The operation of the MFC-2160 capacitive fingerprint sensor is as following: a fingerprint image captured by the pixel array, delivering fingerprint ridge or valley signals to A/D...
Matrix COSEC ARGO is a performance, design and engineering wonder that brings a modern design to the access control and time-attendance applications. The device is equipped with an enhanced 3.5” IPS LCD touchscreen for optimizing users’ visual experience. The door controller is designed to meet the aesthetics, technology and harsh environment application requirements of the large & multi-location enterprises, SME & SMB organizations. Matrix COSEC ARGO Door Controller: Enh...
Iris ID, global provider of iris recognition technology, and GenKey, a trusted provider of biometric identification solutions, has announced the integration of iris recognition cameras and matching engine into GenKey’s biometric ID platform, to provide an all-in-one solution for various biometric registration and verification initiatives. Advanced Security And Privacy Iris ID iCAM TD100 and iCAM T10 cameras and IrisAccelerator matching engine have been integrated into GenKey’s ID s...
Global biometrics company, Fingerprint Cards AB (Fingerprints) has announced its Biometric Software Platform for payments, named FPC-BEP, targeting payment cards, wearables and USB dongles. The platform has been tailored to optimize the performance of its small and power-efficient biometric sensors for payments, which include the FPC1300-series and T-Shape module. Fingerprints can now offer card and device makers a complete hardware and software solution to secure biometric authentication and ma...
ievo Ltd, global provider of biometric fingerprint recognition products, announced that it received Lenel factory certification and joined the Lenel OpenAccess Alliance program. ievo biometric fingerprint recognition products can now interface with the OnGuard access control system, providing a streamlined approach to fingerprint enrollment. “ievo has completed required factory testing at Lenel to validate the functionality of its interface to the OnGuard system. Having this interfa...
“With C•CURE 9000 at the heart of so many high security solutions, it is not surprising that end-users want to be kept informed on any emerging cyber threats and how we are dealing with them,” said Gordon Morrison, GB Sales Director for the Tyco access control and video brands. “In this respect the well-established Tyco Cyber Protection Program, which we see as part of our long-term' holistic approach to supplying customers with quality solutions, is helping us maintain a leadership position on cyber security.” Tyco Cyber Protection Program “We were able to reassure delegates that our solutions are specifically designed to be cyber resilient and that before they are introduced, they are extensively tested so that we can discover and address any critical vulnerabilities. We also arrange for independent testing to be conducted on our products and software to ensure that any new firmware or software updates do not open a ‘back door’.” The end-users from across the UK who attended the daylong event were able to see demonstrations of how they can take advantage of the latest technical advances from C•CURE 9000, the access control and event management platform from Tyco, the security products division of Johnson Controls. These included a Business Intelligent Reporting System (BIRS) module which provides real-time ‘easy on the eye’ graphical reports on access control activity. C•CURE Go Mobile Access Control App The C•CURE Go mobile access control app is supported by iPhone, iPad, iPad Air, iPad Mini, Android phones and tablets The C•CURE Go mobile access control app, which is supported by iPhone, iPad, iPad Air, iPad Mini, and Android phones and tablets, attracted a lot of interest. Delegates were impressed with the app’s extensive range of features including offering the ability to remotely lock/unlock doors with a touch of a button, as well as quickly search, create or update personnel records and add/remove clearances and deactivate cards on the go. Some new hardware was also showcased such as the recently introduced Innometriks readers which provide strong identity authentication for mission critical environments using smart card, PIN and biometrics, and delegates were informed that a second generation PoE edge based iSTAR 4 door controller was under development. Web-Based Access Management Portal A recent updated version of C•CURE 9000, v2.7, has seen the introduction of a wide new range of features and functions designed to enhance the user experience. Included is a web-based Access Management portal which further adds to C•CURE 9000’s ability to claim that it is the most flexible and easy to use access control platform available, as well as adding to its reporting capabilities. A cardholder’s request to be given access to a restricted area can now be directed to the person best placed to make the decision, replacing potential long email chains and slow response times common for access approvals. A new Access Management module offers an efficient method of managing cardholder access requests without requiring direct involvement from the security team. C•CURE 9000 Access Management C•CURE 9000 Access Management allows cardholders to make access requests through an intuitive, web-based portal C•CURE 9000 Access Management allows cardholders to make access requests through an intuitive, web-based portal. The self-service capabilities increase the agility of clearance owners' responses to cardholder access requests for temporary and contract staff, as well as employees who have with drop-in work schedules or are part of project-based self-organizing teams. There was also a presentation on the latest features and functionalities of the victor unified video management system and how it integrates seamlessly with C•CURE 9000 to streamline real-time security command and management over widespread and demanding environments. Victor VMS The victor Video Management System (VMS) seamlessly synchronizes video with data from access control, fire, intrusion and other systems. Future-proof and scalable, it has been designed to provide a high-performance solution which provides operators with superior situational awareness, as well as an easy way to investigate incidents and generate activity reports. Intelligently delivers the right video and other critical information such as event notifications, maps and health monitoring, to the right person at the right time and with the flexibility to display the video and other information on single or multiple screens, as well as video walls. System integrators are able to meet the customers’ operational requirements by selecting the right Tyco NVR for their needs together with a camera compatibility list spanning over 60 manufacturers and 3,300 cameras. Provides a centralized view of fire, security and life safety operations. Offers powerful tools to help simplify and enhance your command and control operations. Victor VMS - C•CURE 9000 Integration Victor’s integration with C•CURE 9000 enables operators to monitor and prioritise events from both systems Victor’s integration with C•CURE 9000 enables operators to monitor and prioritize events from both systems and to color code them for rapid identification in order to facilitate quick response times. Combine these with other innovative C•CURE 9000 features and you have a formidable integrated security solution which can provide security or operational personnel with all the information they need to make quick decisions and take appropriate command actions if an incident or emergency occurs. The event, which was supported by a number of C•CURE 9000 Enterprise Partners as well as a number of third-party manufacturers who have integrated their solutions with the platform, was by all accounts a great success, with many of the delegates contributing to the session dedicated to discussing the new features and innovations which could be introduced in future updates of the C•CURE 9000 platform. Intelligent Communications Solutions Russell Baker, Southern Area Business Development Manager for Zenitel, the UK’s leading specialist provider of intelligent communications solutions, said “We were very pleased to be able to participate in the end user event. We were able to take the opportunity to demonstrate how the deep level of integration which can be achieved between the C•CURE platform and Zenitel’s intercom and public address systems, enables our mutual end-user clients to take their security to the next level.” “For high security and mission critical applications, the interaction that takes place between the two solutions will ensure security personnel are able to strictly control who has access to restricted areas and react quickly to any incidents.” Traka - C•CURE 9000 Integration Traka showcased how its intelligent key and equipment management systems have been integrated with C•CURE 9000Traka, a division of Assa Abloy, showcased how its intelligent key and equipment management systems have been integrated with C•CURE 9000. “Our ability to support C•CURE 9000 means there is so much more we can do together to provide end-users with greater value from their electronic security system,” said Steve Bumphrey, UK Sales Director for Traka ASSA ABLOY. “The level of integration achieved means end-users can use the C•CURE interface to enrolI authorized personnel into the Traka database and then control access to our key cabinets and intelligent lockers, as well as manage the removal of physical assets. Traka generated real-time alarms can be seamlessly managed via the C•CURE 9000 platform and improved efficiency comes from only needing a single credential for both systems.” Other successful integrations with C•CURE 9000 which were highlighted at the event included: FireClass, a revolutionary new class of commercial fire detection products which are packaged as an easy to install, out-of-the-box, digital open-protocol solution. Designed and engineered in Europe, FireClass technology is part of Tyco’s family of solutions. 3D Fingerprint MorphoWave from Idemia, the market leader in augmented identity. Immune to environmental factors such as dust and lighting, MorphoWave acquisition of finger prints is dynamic, high speed and because it is touchless it offers the additional benefit of being hygienic.
HID Global, a worldwide provider of trusted identity solutions, announced that it has acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services, making HID Global one of the world’s major providers of fingerprint biometric technologies. Identity Management Solutions “Our acquisition of Crossmatch strengthens HID Global’s ability to offer innovative biometric identity solutions to hundreds of millions of users worldwide,” said Stefan Widing, President and CEO of HID Global. “Adding Crossmatch to our company will extend HID’s market leadership in the trusted identity space and allow us to fulfill the promise of biometrics in critical identity applications.” Founded in 1996 and based in Palm Beach Gardens, Florida, Crossmatch employs over 270 professionals across a global network of development hubs and strategic sales offices. With the acquisition, HID Global gains advanced biometric identity management solutions for civil government, defense and commercial applications, as well as a secure multifactor authentication software solution. Crossmatch’s public-sector biometrics business enhances HID’s reach into immigration and border control Crossmatch’s Public-Sector Biometrics Crossmatch’s public-sector biometrics business enhances HID’s reach into immigration and border control, law enforcement, and military and defense markets with products and solutions that include criminal booking, rapid mobile identification, background checks, security clearance processing, military base access, counter-terrorism and mobile intelligence gathering, visa processing and citizen services. The Crossmatch commercial biometrics business extends HID’s portfolio to include a broad array of single finger readers, modules, sensors and software developer kits (SDKs) for multiple vertical markets including – retail, financial, healthcare and OEM markets. This is a global business supporting a large volume of integrated partners. Crossmatch is also a provider of single fingerprint sensors to point-of-sale (POS) terminal manufacturers and is integrated with the major POS software applications. Behavioral Biometrics For Frictionless Access HID also gains a unique secure authentication solution, DigitalPersona, that goes beyond the traditional multifactor approach to cybersecurity. DigitalPersona adds an array of risk-based factors, including behavioral biometrics, for secure, frictionless access to Windows and cloud, web, mobile and traditional applications. “I am very pleased that Crossmatch is joining the HID family. Countering today’s advanced security threats requires innovative, comprehensive identity management solutions incorporating both biometric and non-biometric components. Our market-leading biometric identity management solutions and unique composite authentication solution perfectly complement HID’s already robust offerings. This will enable us to provide our global customers with an even broader range of trusted identity solutions, and our employees with increased opportunity for professional growth,” said Richard Agostinelli, CEO of Crossmatch.
Last year, natural disasters in the U.S. cost homeowners and businesses a record $306 billion, according to the National Oceanic Atmospheric Administration (NOAA) 1. While natural disasters can occur at any time throughout the year, the U.S. government recognises September as ‘National Preparedness Month’, an effort to encourage Americans to prepare for emergencies. To help safeguard your valuables, The Master Lock Company provides peace of mind with trusted security products that help to protect valuable assets no matter the circumstance. The Master Lock Company develops products that offer enhanced durability, reliability and security" "We understand the value of reliable security, which is why we test our products against the toughest situations, including extreme weather conditions, harsh temperatures and physical attacks," said Justin Matuszek, director of product marketing at The Master Lock Company. "Our rigorous testing facilities coupled with our industry-leading consumer insights allow The Master Lock Company to develop products that offer enhanced durability, reliability and security." To help families prepare for natural disasters this September and throughout the year, The Master Lock Company offers a full suite of innovative security solutions, including: Protecting storage areas, documents and assets Master Lock's Family of Stainless-Steel Padlocks: Master Lock offers a wide selection of stainless-steel padlocks that provide enhanced security, durability and reliability based on consumer needs and application. The Master Lock 5SSKAD Stainless Steel Padlock features a stainless-steel body and shackle, and brass 4-pin tumbler cylinder providing maximum weather resistance and enhanced security to protect storage areas, such as garages and sheds, as well as recreation vehicles like boats and four wheelers. SentrySafe Digital Fire Safe: With its UL Classified fire protection2 and ETL Verified water protection3, the SentrySafe Digital Fire Safe is the ideal storage solution to protect documents and valuable assets from wildfire and flood damages. Its solid steel construction provides durable and reliable protection in extreme weather while a pry-resistant hinge bar protects against theft. In the case of a power outage, it features an interior light, so you can easily access your items without additional lighting. Keeping valuables secure Master Lock SafeSpace Portable Personal Safe: For homeowners that need temporary security while on-the-go, the Master Lock SafeSpace Portable Safe allows for convenient and secure transportation of small personal items. Its durable construction is made to withstand abuse while its shock-absorbing foam on the interior protects valuables on the inside. Keep valuables secure by tightly wrapping the cable around a fixed object or double the cable to use as a carrying handle for easy transporting. New Master Lock Universal Lock Box: In the event of a natural disaster, lock boxes provide a secure way for friends, family and first responders to check on their loved ones. The new Master Lock Universal Lock Box is the only one on the market that features an adjustable shackle, so it can be affixed to almost any style of door hardware. Its wide metal body allows for enhanced durability, weather protection and security for spare keys to homes and other properties. Door Security Bar and Biometric Pistol Safe In addition to extreme weather conditions, the fall season brings a timely opportunity to ensure the security of your home and assets. Make sure your home is secure this season with the following security solutions: Master Lock 265D Adjustable Door Security Bar: Constructed with 20-gauge steel, The Master Lock No. 265D Security Door Bar securely keeps doors closed in case of attempted forced entries. The bar adjusts from 27-1/2 in. to fit most home and patio doors and can be adjusted to fit sliding doors. SentrySafe QAP2BEL XL Biometric Pistol Safe: With the SentrySafe XL Biometric Pistol Safe, gun owners can rest assured that their firearms are secure. Equipped with a biometric fingerprint scanner for fast, one-handed access, the biometric pistol safe features two-pistol capacity for additional firearm and ammunition storage, while interior lighting provides increased visibility in low-light situations, so you can easily access the safe. For homeowners looking to find the best safe for their needs, SentrySafe has recently launched its online SentrySafe Safe Selector tool that allows consumers to navigate the brand's selection of safes – whether it's an all-purpose safe, pistol safe, cash box, or portable safe for consumers on-the-go.
Customers want services. Services that add convenience, simple control and easy management of all their security devices. With Connect ONE by Connected Technologies LLC, it’s easy to add the new services that one may not have thought about or assumed were too difficult to add. Connect ONE is a cloud-hosted integrated security management platform that bundles intrusion, access control, video surveillance, energy management and critical environmental monitoring in one single user interface that controls them all simply and conveniently. CheckPoint Tours Tracks Tasks And Facility Activity CheckPoint Tours, the latest service from Connect ONE, provides real-time recordkeeping that security guards have completed their rounds or employees have performed required or mandated tasks at the premises. As the user scans/swipes each checkpoint their access is logged and can be reviewed. Paired with ScanPass Mobile Credential, it makes tracking activities uncomplicated. ScanPass does not require any wiring and users affix a barcode sticker at the places they want to make sure are visited, using a smartphone to scan the barcode to determine if the tour is being performed properly. Notifications can be sent if tours are not completed on designated time schedules. It can also be integrated with surveillance to take a snapshot of the person to identify authorized personnel conducting the tours. Multiple checkpoints can be added economically by using only ScanPass barcode stickers in place of card readers and additional hardware. Connect ONE services add tangible value for the end-user customer and the business in the way of new RMR streams.
Iris ID, a premier provider of iris recognition technology, announced its iCAM R100 face and iris cameras will be integrated into Mentalix, Inc.’s Fed Submit suite of live scan solutions. Fed Submit, currently employed by civilian and law enforcement agencies across the county, provides users with intuitive, multi-modal booking and background check systems. Mentalix, headquartered in Dallas, is an industry leader in FBI-certified identification software. Iris ID’s IrisAccess iCAM R100 cameras will now be made available with Mentalix Fed Submit live scan stations, operating alongside standard fingerprint scanners so iris information may be shared with the FBI as part of its NGI (Next Generation Identification) program. With Fed Submit it’s possible for agencies to access the FBI’s iris database, as well as create and grow their own local iris archive. Accurately Capture Iris Data Dale Remmers, the chief technology officer of Mentalix, said the Iris ID technology was selected for its speed and accuracy in capturing iris data. He reported that jail officials can often acquire, submit and receive an FBI response to an iris query before a suspect’s booking procedure is completed. “They can know within a few minutes if the suspect arrested for public intoxication has any felony warrants in other states,” Remmers said. “We’re excited to be able to offer our law enforcement customers the Iris ID technology as an additional modality within our Fed Submit product.” The iris solution is contactless, unlike fingerprint pads which need to be wiped clean after each use R100 Iris Recognition Technology The R100 iris recognition technology can obtain a valid identity scan from virtually any suspect. While fingerprints can be altered intentionally or worn down by jobs in industries such as agriculture, construction and manufacturing, iris patterns remain unchanged through a person’s life. The iris solution is also contactless, unlike fingerprint pads which need to be wiped clean after each use. Remmers said law enforcement clients may also use the iris scan feature of the Mentalix Fed Submit system to authenticate the identity of suspects being released from jail. Iris ID Authentication Mohammed Murad, vice president global sales and business development, Iris ID, said the Mentalix partnership is another example of how Iris ID’s technology is being used to assist law enforcement officials. “Our iCAM R100 cameras add a valuable dimension to the Fed Submit kiosks” he said. “The Mentalix solution will make it easier – and faster – for local officials to know who is being booked and released from their facilities.” Iris ID technology is also being used by governments around the world for authentication at border crossings, national ID and voter registration efforts and by corporations large and small for access control and time and attendance applications.
Invixium, an innovator of biometrics solutions, made its North American debut at ISC West 2018 in Las Vegas and unveiled an impressive lineup of modern biometric products including its newest - IXM TITAN, featuring an impressive suite of features and technical specifications. TITAN offers customers a multitude of options for access control applications in need of multimodal biometrics (facial recognition as a primary and fingerprint or finger vein authentication as a secondary), with additional functionality for time and attendance, video intercom and video surveillance. Visitors from the security industry including experts, consultants, installers and media were impressed by the company’s design and attention-to-detail as exhibited by the inviting nature of the booth, product displays, brochures and attractive packaging. “We had a fantastic ISC West!” said Shiraz Kapadia, CEO and President of Invixium. “From security consultants, end users to integrators, we received numerous compliments and positive reactions to our products and solutions. It only reinforces our vision of creating biometric solutions that are beautiful, but also rugged enough to be installed in any environment.” Surveillance and physical security systems will continue to play a critical role in keeping organizations, staff and visitors safe Understanding Cybersecurity Threats At ISC West 2018, Kapadia was one of the esteemed security leaders to participate in a panel discussion of industry experts to address cybersecurity. Kapadia joined expert panelists from leading manufacturers Galaxy Control Systems, Pelco by Schneider Electric, Boon Edam, SureView Systems, Manything, and Viakoo to discuss how cybersecurity is not restricted to the IT department – it threatens and affects every connected device in every department. The panelists shared their views regarding connectivity in the security industry, and how as it expands, risks will increase. In this environment, surveillance and physical security systems will continue to play a critical role in keeping organizations, staff and visitors safe. They communicated to the audience how it is vital to understand what the cybersecurity threats are to physical security systems, how protections from cyber-attacks can be implemented and how security professionals must be proactive in planning for incident recovery and ongoing protection. Advanced Biometric Applications “Invixium will continue to develop advanced biometric applications and help educate the market on the many benefits of multimodal authentication technologies,” continued Kapadia. “We are on a mission to become the market leader in the biometric physical access control market, one project at a time and will continue our impressive growth trajectory.”
Recent research shows most access control technology currently in use is not as secure or convenient as many security managers believe, according to day-to-day users of the system. In this HID Global white paper, you will discover what different companies look for in an access control system, why certain legacy access control systems may be vulnerable to attack, and why upgrading to a new access control system can result in huge benefit for enterprises and end users. Find Out More About: Access control new opportunities Main objections to access control systems Is your system as secure as you think? Ineffective access control policies Why upgrading can benefit enterprises Conclusion
Time and attendance has proven to be a successful use of biometric technology traditionally used for controlling access to highly sensitive areas Security technology is increasingly being used to help organizations tackle challenges going far beyond controlling access to office buildings and monitoring parking lot activity. Video, in particular, has become the darling of many markets. Retailers use live and recorded video to assess promotional sales efforts. Manufacturers confirm employees are following mandated safety regulations. Transit officials debunk false liability claims with a review of recorded mobile video. But here’s a relatively new one – biometrics. Long thought perfect for controlling access to highly sensitive public and private research and military facilities, they are showing up in offices, hotels — even in remote fruit fields and sugar processing plants — for employee time and attendance. It’s proven to be a successful use of the broad technology. Risks Of Mechanical And Electronic Clocks The process of keeping track of employees’ hours has long been open to fraud and other issues. Mechanical time clocks — in use since the 1800s — and even more modern electronic clocks using magnetic stripe or proximity cards are open to a process known as ‘buddy punching.’ That’s a scheme in which an employee clocks in and/or out for a friend who may be late or not even at work. Mechanical systems are also slow, potentially leading to long queues during shift changes resulting in wasted time and lost productivity. Mechanical cards also need to be keystroked into the payroll system, requiring significant back office time for data entry. Electronic cards can be shared. They may also be lost or stolen, costing additional time and money in back office expense. Even small errors in collecting and processing employee time and attendance can add substantially to the cost of payroll, already a major expense for any organization. Studies by a leading international human resources consulting firm have shown even small payroll errors and fraud can boost operating costs by up to 10 percent. Biometric Time And Attendance Solution But fraud, delays and lost credentials can be largely eliminated by a biometric solution. Common biometric systems involve hand or fingerprint readers, facial identification or iris recognition. Each technology records and then compares physical characteristics unique to every individual. However, changes in weight, hairstyle, finger or hand size, cuts or even the effects of manual labor can trigger the need for re-enrollment – in all except iris-based solutions. Fraud, delays and lost credentials can be largely eliminated by a biometric solution Iris Recognition Advantages The structural formation of the human iris (the visible coloured ring around the pupil), is fixed from the first year of life and remains constant. And few people can’t use the technology, as most individuals have at least one eye. Even blind people have successfully used iris recognition. At employee enrollment, iris systems utilize an industry-standard camera to capture an image of the iris. Software converts that to a small template stored in a terminal database. Authentication requires employees to stand roughly 18 inches from an iris reader and the process takes about two seconds. With multiple readers installed, long lines are eliminated. Also eliminated is fraud. Since every user’s iris is unique and required to be present at the reader, time fraud schemes are virtually impossible. The system can also prevent another type of back-office time fraud known as “ghost employees” – non-existent people added to the payroll. Security is also enhanced. The digital templates can’t be used to produce any sort of visual image, affording a high-level of defense against employee identity theft. An iris recognition system can also grant facility access as employee’s clock in for work. Iris Recognition Case Study Here’s an example of how an iris recognition system has benefitted a major Turkish fruit and vegetable grower and one of Europe’s largest providers of juice. The nature of the local work force created a major time-and-attendance challenge. "Fingerprint and facial recognition systems were tried briefly. Facial recognition suffered from workers’ changes in hairstyle, facial hair, glasses and protective gear" New labourers arrive daily seeking work. Once hired, they might work a few days and then leave before returning a week later. Unreliable schedules made standard time cards virtually impossible to manage. The company’s security integrator suggested smart cards as an option. But that wasn’t much of an improvement as authorizing, printing, distributing and tracking cards for thousands of on-and-off workers continued the human resources nightmare. Also, improper use of the cards threatened to cut into the company’s profits. Both fingerprint and facial recognition systems were tried briefly. The constant cuts and scars workers get from the manual labor impaired the accuracy of readers. Facial recognition suffered from workers’ changes in hairstyle, facial hair, glasses and protective gear. Daily payroll reports are transmitted to the company’s Istanbul headquarters using wide area networks in the fields and satellite communication. Software links the received data to a payroll module which automatically calculates employee hours and produces paychecks. The system currently has more than 10,000 enrolled workers. More are being added on an almost daily basis. Once a worker is in the system, it doesn’t matter how often he may leave. When he returns, the iris system immediately recognizes him. Also, the contactless iris-based technology inhibits the transfer of virus or bacteria as there is no direct employee contact with the biometric readers. If these systems can work in remote areas of Turkey, they can certainly work in downtown Boston. And they do. There, a boutique hotel uses iris-based identity authentication to keep the hours of its employees. The same system also allows VIP guests to enter their suites without a key card. Reductions In Cost Recent reductions in both product and deployment costs have made using biometrics, including iris recognition, a practical time and attendance investment for organizations of almost any size and in any location. Of course, biometrics still remains the go-to choice for protecting sensitive locations and international borders, as well as national identity and voter registration programmes.
Part 4 of our Security in Healthcare series Secure visitor management integrated with physical access control systems (PACS) is increasingly popular Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. For instance, one children’s hospital recently chose HID Global’s EasyLobby Secure Visitor Management solution to streamline screening/badging using driver’s licenses or other government-issued IDs. Integration with hospital databases enables benefits like accessing real-time patient feeds using Health Level-7 (HL7) standards. All visitor information Is seamlessly passed to the hospital’s access control system to optimize efficiency at nine stations badging more than 160,000 visitors annually. The example shows what technology can do in the area of visitor management. Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or “after hours” An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during “after hours” periods, according to HID Global. Systems should support real-time patient feeds using HL7 integration, which ensures that no visitor is sent to the wrong location or to see a patient who is no longer checked in. Systems should also pre-register approved vendors and temporary employees through Status Blue integration, and support integration with access control systems for the most efficient badging. Barriers To Visitor Management "Due to financial limitations, many hospitals are trying to make do with older desktop technology, and have not been able to benefit from some of the newer efficient options, such as mobile tablet-based visitor management, "says Paul Terschuren, CEO, STOPware Inc. "And, some hospitals have the mistaken belief that the multiple entrances and complexity of a modern hospital facility pose a barrier to implement visitor management, or that managing visitors more closely will create an unwelcoming culture or environment," says Terschuren. "As a result, some hospitals only implement visitor management after hours, when the number of entrances and visitors is reduced." "However, neither of these ideas should be barriers", says Terschuren –" visitor management can be implemented at multiple entrances, including unstaffed entrances, and managed easily by the software. And, many hospitals have found that visible security improvements, when they are not overly burdensome, actually improve the feeling of safety and security with patients, visitors and families alike. Some hospitals with limited implementations are already realising this and changing their plans to implement systems hospital-wide." Visitor management can be implemented at multiple entrances, including unstaffed entrances, and managed easily by the software STOPware PassagePoint Visitor Registration STOPware specializes in visitor management, a critical element in physical security for hospitals and healthcare facilities. STOPware’s flagship software product, PassagePoint, provides visitor registration and pre-registration, visit approvals, identity confirmation, visit logging, and integration with access systems. STOPware also provides related hardware including self-registration kiosk, mobile registration tablets, credential scanners, and badge printers. As announced in March, PassagePoint software now integrates with HL7 to allow real-time patient location tracking for hospitals and healthcare facilities, as well as integration with more than 20 access control systems to help make the healthcare environment more secure. STOPware takes Health Insurance Portability and Accountability Act (HIPAA) and all privacy regulations very seriously. The PassagePoint HL7 module only uses patient location data, and functions as a “listener;” that is, the data used by the module is not “stored” in PassagePoint. The HL7 integration only makes use of patient location data and does not collect or use any diagnosis information. PassagePoint is also designed to protect visitors’ Personal Identifiable Information – either by not capturing certain data or by encrypting information that is stored. By treating sensitive information of both patients and visitors in this way, STOPware Visitor Management system is designed to help healthcare facilities protect privacy in alignment with the letter and the spirit of their required regulations. Pre-booking And Advance Approval Tighter control of visitor and contractor management in non-public areas through pre-booking and advance approval are developing areas, says Dave Ella, Vice President of Product Marketing, AMAG Technology. AMAG has developed a new visitor management solution called Symmetry GUEST that allows visitors to be vetted to provide a safer and more secure environment for patients and staff, as well as the use of smartphones as identification and access credentials. "Guards, and general staff for that matter, need training on how to properly deal with unruly or inappropriate patients and visitors in such a way as to secure the situation" Staff training and turnaround processes are an often-overlooked element of a security plan in general, and a Visitor Management plan in particular, says Terschuren of STOPware. “It is well and good to put guards and checkpoints in place, but what should those guards do when they find someone that should be denied entry? Guards, and general staff for that matter, need training on how to properly deal with unruly or inappropriate patients and visitors in such a way as to secure the situation while minimizing the chances of negative impact on the facility. “ STOPware expects that remote reception desk management, which makes use of an operator from another location and/or country who can greet and process visitors efficiently, will continue to grow and improve. Integration of Visitor Management systems with access control and other security-related systems provides for safety and an audit trail in such implementations. “We are also seeing a groundswell of interest in Mobile Visitor Registration and Kiosk Self-Registration and Sign-ins,” says Terschuren. “These systems increase efficiency, empower visitors, and provide for a better visit experience that many facilities find compelling.” Combining Identity Verification And Visitor Management “We are also seeing the growing importance of identity verification; and, in particular, the use of biometric methods to verify identity, ranging from fingerprints and facial recognition all the way to higher security iris readers,” Terschuren adds. “Identity verification can tie in with Visitor Management, both in terms of identifying visitors, but also in terms of verifying the authority of hosts and approvers, to improve the security of sensitive areas and facilities in general.” One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Catch up on Part 3 of our Security in Healthcare series here
“These are children. There is no reason to scan a kid. Just because the government can do this is no reason the government should be doing this.” The impassioned argument, quoted by The Florida Current, comes from a Florida state legislator who introduced a bill aimed at stopping public school systems from collecting biometric data on children. The ominous-sounding practice actually has a practical side – use of a fingerprint or palm scan can enable a school system to get thousands of students through a lunch line in a short period of time. The schools have found a quick fingerprint scan is faster, and more secure, than use of an identity card or PIN number. The system has been used in 83 schools for several years in one district and reflects an investment of $300,000, according to the newspaper. The system could also be used to identify parents, employees and volunteers, which could help to prevent strangers from sneaking into a school function. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns The proposed bill, which is “pending reference review,” would provide for parental notification of data collected on students by schools. (It also would require the school to phase out Social Security numbers, replaced by a unique ID number developed by the state Department of Education.) I'm not sure exactly what the problem is with “scanning a kid,” as long as there are no adverse health effects, a concern I am sure has been addressed (and in any case was not an argument presented in Florida against the technology). I don't have a problem with parental notification; it's the underlying attitude toward technology implied in the bill that I find troubling. As I understand it, the intent of biometric systems is to confirm an identity. A student enrolls in the system with a fingerprint or palm print scan, and the system stores only data points from that scan, which are compared with data points when the individual uses the system again. The system doesn't actually store a complete fingerprint, and there is no massive centralized database of children's fingerprints that could be stolen or otherwise compromised. If I'm wrong, someone correct me – please. Too often, negative responses to technology are based on misunderstanding. Emotions can get in the way of information. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns. UPDATE: Florida’s Senate Bill 188, which imposes a blanket prohibition on the use of biometric identification technology within the Florida public school system, was signed into law by Gov. Rick Scott on May 12, 2014. This despite a letter from the Security Industry Association opposing the bill. SIA’s letter read in part: “While SIA understands the legislature’s concern for protecting the privacy of Florida students, we are troubled that widespread misperceptions about the nature and use of biometrics technology has enabled passage of the bill without a thorough debate examining the student safety and local economic implications — and despite any reported cases of identity theft or misuse of information collected by such systems.”
Ahli United Bank (AUB) is a leading financial institution providing banking, investment, and wealth management services from 147 branches in eight countries. Utilizing Gallagher’s business and security solutions in Bahrain since 2008, Ahli United Bank decided in 2017 to undertake a full upgrade of the systems at its headquarters. Installing controlled doors As part of upgrading the full product suite at its Bahrain Headquarters – which included all controlled doors and software – Ahli United Bank (AUB) also took the opportunity for a complete re-design of the set-up and locations of its security system. The bank was committed to finding a product that was cost effective and had a long life expectancy. While researching their options, AUB management saw a demonstration of Gallagher’s Mobile Connect technology and were immediately convinced that this was the ideal product for the bank’s upgrade. Gallagher Mobile Connect uses Bluetooth wireless technology to enable users to badge at a reader using a smartphone Gallagher Mobile Connect In late 2018, AUB began testing the new mobile solution on site then to be rolled out to most of its staff at headquarters. Gallagher Mobile Connect uses Bluetooth wireless technology to enable users to badge at a reader using a smartphone instead of an access card. A huge benefit for AUB is the solution’s capability to add additional layers of security where needed. Gallagher’s Mobile Connect solution provides the option to apply two-factor authentication via the smartphone – either fingerprint, PIN, or facial recognition – delivering heightened security over access to restricted areas. According to AUB’s management, the two-factor capability was very appealing to them. “Using mobile with facial recognition is far more secure than card and PIN, and it’s immensely more cost-effective than buying biometric readers,” they said. Temporary remote access control From an administrative and site management perspective, Gallagher Mobile Connect provides AUB with significant flexibility. Easy provisioning means that authorized staff can remotely allocate temporary access in advance and can also schedule when a user’s access can begin and end – ideal for visitors and contractors who come to the bank’s headquarters. Beyond Mobile Connect, readers and controllers, AUB uses Gallagher’s security software platform, Command Center, to manage alarms and access for its headquarters and all branches, all from a centralized location. “The power of Command Center is enormous,” said AUB’s Management. “It integrates with our CCTV equipment and gives excellent oversight of our operations.”
Police forces recognize biometrics as a potentially critical tool to improving the quality and efficiency of policing across the globe. As part of a diverse Digital Authentication strategy, automated facial recognition surveillance is becoming an integral part of our digital policing, with the UK Home Office planning to invest a huge £97 million into a broader biometric technology approach to safeguard our streets. Automated facial recognition surveillance Digital fingerprint-based authentication is still widely regarded as having a higher level of maturity However, the latest court case against the South Wales Police as well as the Amazon backlash over the sale of its technology to the US police has highlighted that acceptance of the use of biometric technology as much as the maturing of the technology is important to achieve the expected benefits for the police. Digital fingerprint-based authentication is still widely regarded as having a higher level of maturity, has an implicit acceptance linked to the identity of the individual and delivers a lower false positive result. Facial recognition, when used as a stand-alone biometric, suffers from the risk of challenge or refusal to accept as in the case of the challenge to the South Wales Police pilot program. In addition, gender and racial bias as well as scenarios such as poor lighting and individuals wearing accessories impacts on reliability. Advancements in biometrics There is clearly a need to focus on how biometrics, as technology matures, can support identity verification at scale and to gain widespread public acceptance as part of a wider digital policing initiative according to Jason Tooley, Chief Revenue Officer at Veridium. Jason comments: “Police forces around the world are looking to integrate the latest advancements in technology to enhance public security and cut costs, and biometric solutions are integral to this movement. With the maturing of biometrics techniques and many different scenarios to address, it’s imperative to use the right biometrics for the right requirements and to create a strategy that facilitates the use of multiple biometrics. We would advocate an approach that abstracts the identity verification and digital authentication processes from the services and creates a biometric platform to match the specific requirements of the police and the public.” Fingerprint recognition Fingerprint, being the most mature and widely used has biometrics, has high levels of acceptance today" He adds, “There are current barriers to the acceptance of biometrics which will be overcome as trust in the technology becomes the norm. Fingerprint, being the most mature and widely used has high levels of acceptance today and is easily adopted by police and public. It requires public acceptance and doesn’t work for wider surveillance techniques but for individual verification, police moving to a digital fingerprint capture mechanism rather than physical has great benefits and the public are more likely to be accepting of enrollment. Facial recognition would be a surveillance at scale solution but the challenges of maturity and external factors as well as public acceptance are challenges to be overcome in the future.” Jason continues, “It is imperative for police forces to take a strategic approach as they trial biometric technologies, and not solely focus on a single biometric approach. With the rapid rate of innovation in the field, an open biometric strategy that delivers the ability for the police to use the right biometric techniques for the right requirements will accelerate the benefits associated with digital policing and achieve public acceptance by linking the strategy to ease of adoption.”
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organizations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric High-Throughput System The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility Entry Control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless Iris Authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
Kredi Kayıt Bürosu (KKB) was founded by the then nine leading banks of Turkey on 11th April, 1995. KKB is a highly regarded financial institution in turkey and has a total of 156 members. The KKB Anadolu Data Center is located in the capital city of Ankara across 43,000 square meters of land, consists of three main sections. The facility is equipped with protection systems against lightning and earthquake. Center authorities to provide the supervisors with an additional option of authentication through RFID cards Need Of Cost Effective Solution The data center has cabinet system in place while access to data racks require biometric authentication. The center is equipped with numerous data racks for which they required a display device at the entrance. Each rack was locked with physical locks as a result of which the center required a cost effective solution that did not include a device for each rack. Moreover, they required devices that supported both smart card authentication as well as door locks. The center authorities were looking forward to provide the supervisors with an additional option of authentication through RFID cards. With respect to gaining access, they wanted a solution that would grant access through two steps, biometric authentication and physically opening the locking system. Finally, the center wanted a solution that could alert them in case of situations such as a door being left open. Data Center Solution Matrix, in association with SouthCo, provided the KKB Anadolu Data Center with the following solution. The data center required a display device at the entrance, integrated with the biometric device installed by Matrix. So, we integrated our Data Center solution with a touch screen display. Whenever any user tried to access the data center with their biometric credentials, the touch screen would display a list of racks the respective user is authorized to access. From the display, the user would be allowed to choose the racks he/she would like to access. Once the user is granted access into the chosen racks, they will be allowed to access the same for a pre-defined period of time. COSEC ARC provides the admin personnel with real-time notifications such as SMS or email notifications in case of any mishaps Gather Customized Reports User based access makes ensures security of sensitive company data. We also installed 200 COSEC ARCs, at the entry/exit of racks between 400 SouthCo locks, one between two door locks, making it a cost-effective solution for the center. Additionally, the COSEC ARC also provides the admin personnel with real-time notifications such as SMS or email notifications in case of any mishaps such as an open door, a door forced open, door being left open, etc. The personnel can also gather customized reports on events like who, when and which rack was accessed. Results Maintenance of Diverse Data Foolproof Security with Biometric User-wise Rack Access Accurate Records of Who Accessed Data Center at What Time
JK Tyre & Industries Ltd. have its biggest manufacturing setup in Mysore. The premise consists of a manufacturing unit as well as the administrative department. Since the plant runs 24×7 and there are numerous shifts of workers, they found it difficult to manage multiple shifts manually. Managing visitors was also a problem for the company. So, they required a software that would help them keep a record of visitors on time-to-time basis. Creating a visitor’s identity in the form of visitor pass and generating reports of visitors on a monthly basis was a tiresome process. JK Tyres was looking for a vendor who could offer them a complete solution related to Time-Attendance and Visitor Management. Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees Matrix Time-Attendance Solution Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees. Numerous shifts were created to manage Time-Attendance of over 500+ workers. Moreover, we provided Employee Self Service, which helped the employees view day-to-day attendance, apply for leave/tour, etc. JK Tyres further required a record of visitors so we delivered Visitor Management software, which helped them create a visitor pass, fetch visitor records and generate reports of the same. 40% Increase in Productivity of Employees and Workers Results Reduction in Cumbersome HR tasks Automatic Maintenance of Visitor Records on Day-to-Day basis 40% Increase in Productivity of Employees and Workers The Products COSEC VEGA FAX - Fingerprint and Card based Door Controller with Touchscreen, IP65, Wi-Fi and 3G/4G Connectivity Option COSEC PATH RDFM - Fingerprint and Card based Exit Reader with IP65 COSEC CENTRA ME - Application Server Platform with 500 Users and Expandable up to 1,000 Users for Basic Access Control and Raw Event Data COSEC ME TAM - Time-Attendance Software Module for COSEC CENTRA ME Users COSEC ME ESS - Employee Self Service Software Module for COSEC CENTRA ME Users COSEC ME VMM - Visitor Management Software Module for COSEC CENTRA ME Users
JCB Co. Ltd, the only international payments brand based in Japan, will conduct a pilot trial of its latest JCB Biometrics Card with fingerprint authentication. JCB's contactless's payment solution is provided by IDEMIA, a global augmented identity solution provider. Toppan Printing will also take part in the demonstration trial in respect of card personalization. Users first record one or more fingerprints for authentication purposes. When they want to buy something, they need only touch the fingerprint sensor on the card's lower right corner with their finger so as to authenticate payment. The fingerprint record is only kept in the card and given that fingerprint authentication is also done on the card, merchants do not need any further equipment to accept payment. The purpose of the pilot is to validate whether the solution is convenient for consumers and practical for the payment Secure Customer Experiences While currently most contact chip cards rely on users entering a PIN number for authentication, this will be replaced by the fingerprint authentication. With the new JCB Biometrics Card strict security is upheld with fingerprint authentication for any payment method, while maintaining efficiency and speed. The pilot trial first involves issuing the JCB Biometric Card to JCB employees from April. Once card users have recorded their fingerprints using a smartphone or tablet app, they can make purchases via fingerprint authentication at merchants accepting JCB Contactless payments. The purpose of the pilot is to validate whether the solution is convenient for consumers and practical for the payment. JCB will continue to explore and develop various authentication solutions in order to provide consumers with reliable and secure customer experiences.