Human identification system
Redrock Biometrics, a provider of palm-based biometrics for authentication and identification, announces the official launch of their breakthrough identification solution – PalmID-X at the exclusive invitation-only Finovate Spring 2019. PalmID-X expands the applicability of biometric identification to large groups of people, creating a basis for seamless services and transactions without physical tokens. “Identification is much more challenging task than authentication. Most biometr...
3xLOGIC, PAC/GDX and PACOM, providers of security and access control solutions, have announced they will be exhibiting on stand IF2930 at IFSEC International 2019, which takes place on 18th-20th June at ExCeL, London. For over 15 years as one of the USA’s most respected innovators in server, cloud and artificial intelligence-based solutions, 3xLOGIC has an enviable track record in redefining what’s possible with security technology. After successfully launching into the European mar...
Knightscope’s long-term mission is to “make America the safest country in the world,” says William Santana Li, Chairman and CEO. “The company was started six years ago as we had grown tired and horrified by the ongoing violence in our country and decided to do something about it.” But are security robots the solution to crime and violence in the United States? “There are 2+ million law enforcement and security professionals trying to secure 328+ million peopl...
Connected Technologies LLC, maker of the award-winning Connect ONE cloud-hosted security management platform, has added Mobile Badge to its wide range of value-add features and capabilities included in the turnkey system interface. Designed for schools, campuses, construction sites, clubhouses or other locations with a changing, fluid population, Mobile Badge puts credentialing identification management on the user’s phone, similar to a traditional physical badge. Mobile Badge can be used...
GET Group North America, global provider of end-to-end solutions for secure credentials with over 20 years of experience in identity management, has announced a partnership with Secure Planet, an I3 affiliated company, which provides facial recognition-based solutions of the highest overall quality, security, and value to U.S. Government, industry and commercial clients. Under the terms of the agreement, Secure Planet’s cutting-edge facial recognition technology will be incorporated in sel...
Altek Corp., global digital imaging company based in Taiwan, is introducing three new technologies: Vision AI chips, AI commercial surveillance cameras, and 3D depth image sensing modules with the theme of ‘Bringing Vision AI to The Edge’. The company’s vision AI chip and AI commercial surveillance cameras enable high-resolution smart surveillance by supporting AI human/object detection, event detection and behavior recognition. The entire AI process is conducted in the camera...
Ping Identity, global identity defined security solutions provider, has announced new programs and benefits for its Technology Alliance and Channel Program partners, including a new online partner directory, app integrations catalog, education and training services, on-demand resources, and enhanced services designed to improve partner products and drive business. Ping is also recognizing Microsoft, Optiv and ProofID for their shared commitment to deliver innovative identity solutions to the market and driving new license revenue through customer acquisition. Digital Transformation Digital transformation is driving demand for identity and access management (IAM) solutions and paving the way for Ping’s increasingly robust partner network. The transition from legacy to modern systems, combined with new industry regulations, have led companies to face complex issues in their IT environments. This is where Ping Identity and its partners can help customers understand the broader market dynamics associated with these challenges and offer solutions tailored to their IAM needs. “The Ping Global Partner Network is an extensive group of leading advisors, systems integrators, resellers and technology companies,” said Andre Durand, CEO, Ping Identity. “With our strong global partner network and the investments, we’re making in our partner ecosystem, we’re well positioned to continue enabling the expertise, value-added services and technology that are critical to driving success for our customers.” Technology Alliance Program (TAP) The Technology Alliance Program’s tiered structure includes Emerging, Engaged and Established partners Ping’s Technology Alliance Program (TAP) fosters collaboration with other security leaders to create integrated solutions that solve unique IAM challenges, increase effectiveness of IAM products, and take advantage of emerging technologies. Ping’s Intelligent Identity Platform integrates with more than one hundred IAM vendors that provide complementary security technologies. The Technology Alliance Program’s tiered structure includes Emerging, Engaged and Established partners. TAP delivers tangible technical, business and marketing benefits to drive product innovation, extend market reach and generate revenue. Because of Microsoft’s commitment to enabling Ping Identity customers to seamlessly connect Microsoft Azure Active Directory to hybrid IT environments, Microsoft was awarded the “Technology Alliance Partner of the Year” accolade at Ping’s recent Partner Summit. Intelligent Identity Platform “Microsoft is very proud of its partnership with Ping Identity, because it brings Azure Active Directory, the largest cloud enterprise directory, together with a leading provider of on-premises identity technology,” said Sue Bohn, director, program management, Microsoft Identity Division. “We look forward to continuing to innovate and extending the reach of Azure Active Directory with Ping Identity.” Channel Program Ping Identity’s Channel Program provides value-added resellers, distributors, managed service providers (MSPs) and systems integrators with the tools and resources they need to be successful in the enterprise identity market. The program’s tiered structure includes Registered, Authorized, Preferred and Elite, affording partners the opportunity to advance and unlock new benefits at each level. At Ping’s annual Partner Summit this month, Optiv received the “Channel Partner of the Year” award Also, at Ping’s annual Partner Summit this month, Optiv received the “Channel Partner of the Year” award, recognizing that the organization outperformed its 2017 benchmarks. Julie Talbot-Hubbard, global vice president and general manager, digital identity and data services, Optiv, commented, “We believe an integrated solution brings together all innovations across a comprehensive IAM program, and assures businesses are protected regardless of where data is used, resides, and is accessed." "Ping’s comprehensive, standards-based platform is an important part of that integrated solution, spanning deployment models and helping Optiv address many of the challenging enterprise identity use cases presented by our clients. We're proud to be recognized as the Channel Partner of the Year and look forward to continuing to work together to provide even more clients with end-to-end solutions that deliver measurable outcomes." ProofID, “Channel Delivery Partner of the Year” ProofID was also honored with the “Channel Delivery Partner of the Year” recognition for its consistent service and results-driven offerings, designed to solve complex identity challenges for Ping Identity customers. “We’re thrilled to be named the Channel Delivery Partner of the Year. For nearly 10 years, we’ve helped enable enterprise digital transformation projects leveraging the Ping Intelligent Identity Platform. It’s been a very rewarding partnership, and we’re excited to continue our collaboration with the Ping team,” added Tom Eggleston, CEO, ProofID.
MOBOTIX and Konica Minolta are currently developing a new camera platform that specifically meets the requirements of deep learning methods and will lead to innovative recurring revenue models for both companies: MOBOTIX Camera Platform The new MOBOTIX camera platform, jointly developed with Konica Minolta, is based on the distributed intelligence in our camera system and is crucial for artificial intelligence and at the same time the key for the communication of our products with other sensors and devices in the network to enable "Beyond Human Vision" solutions. These solutions include the reliable detection of threats through the combination of different sensor technologies as well as the independent initiation of measures to counter such threats. Increased Process Efficiency The state-of-the-art analysis methods located on the camera itself helps users increase process efficiency and develop new business and revenue models The state-of-the-art analysis methods located on the camera itself helps users increase process efficiency and develop new business and revenue models. Future software updates will enable completely new functions based on deep learning methods, such as the recognition of human behavior, moods or voices. In order to make this possible, a so-called "plug-in concept" is being further developed that goes far beyond what is available on competing products. This allows customers to easily create new features similar to developing apps for mobile devices while taking full advantage of the system's performance, including full CPU and GPU power and programmable logic. Examples could be analyzing customer behavior in retail situations and detect emergency situations in elderly homes and hospitals or analyze quality in production lines. The first products based on the new camera platform will be launched in the first quarter of our financial year 2019/20.
Evolis announces the formation of a wholly-owned subsidiary in Tokyo, Evolis Japan K.K. The globally renowned French card issuance company designs, manufactures and commercializes a complete range of personalization and issuance solutions for plastic cards in various markets such as retail, hospitality, banking or public administrations across the globe.Evolis has been present since 2008 in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group's business development and establish a long-term presence in Japan. Evolis Japan K.K. Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support by Japanese speakers Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support by Japanese speakers, expand the traditional distribution network, develop channels dedicated to new industry sectors, and strengthen response to the demands of government bodies and financial institutions."Japan is one of the world's leading economies with more than 125 million people. We therefore see strong potential for card personalization in several markets. The creation of a Japanese company will help in our existing business relationships and facilitate the development of new partnerships" says Eirik Bakke, Managing Director, Evolis APAC. On-Site Encoding And Securing Key Cards Evolis systems allow for the on-site personalization, encoding and securing of cards that support various applications, such as access control badges, debit and credit cards, ID cards, resident permits, drivers' licenses, transport passes, student IDs, as well as product tags for the retail and hospitality market.Evolis' solutions support any requirement in card personalization, from basic printing in small runs up to the personalization of advanced and secured cards in large volumes. Numerous governments, financial institutions and large retail chains are using Evolis' card personalization systems to issue their cards. Card Personalization Systems Due to its flexible manufacturing capabilities and technical expertise, Evolis meets stringent customer demands in terms or technical features, quality and delivery lead times. A project team is dedicated to designing specific and tailored solutions, recognized at national and international levels.
Iris ID, global provider of iris recognition technology, and GenKey, a trusted provider of biometric identification solutions, has announced the integration of iris recognition cameras and matching engine into GenKey’s biometric ID platform, to provide an all-in-one solution for various biometric registration and verification initiatives. Advanced Security And Privacy Iris ID iCAM TD100 and iCAM T10 cameras and IrisAccelerator matching engine have been integrated into GenKey’s ID solutions. GenKey’s ID platform has helped many governments and organizations to improve inclusivity, reduce fraud and improve time and cost efficiencies. IrisID, the world’s most deployed iris recognition platform, provides advanced security and privacy, which further enhances GenKey’s ID platform. “GenKey’s ID platform is being used to identify and verify millions of people in several countries worldwide,” said Arnd Langguth, chief operating officer, GenKey. “We are experts in fingerprint biometrics, but our ID platform has been designed for multi-modality. Our customers expect proven, secure, high performance, that is why we choose IrisID. IrisID’s IrisAccelerator will plug-in seamlessly into our ID platform.” Iris ID Biometrics Authentication Systems The integration into Genkey’s ID platform now offers full deduplication on both modalities" The Iris ID technology provides a fast, accurate and non-contact method of capturing citizens’ biometrics, identifying people and detecting duplicates. Iris ID authentication systems are used worldwide for access control, time and attendance checks, national ID programs, border crossings, voter registration, and many other applications. The company’s solutions are currently being used by public and private organizations across Africa and on five other continents. Mohammed Murad, vice president of global sales and business development, Iris ID said the company’s technology is a natural fit with GenKey. Integration With GenKey Biometrics ID Platform “Our cameras are unaffected by dirt, grease, gloves, facial hair and other factors that can limit the quality of registration and identity verification of other biometric systems.” he said. “In addition to its speed and accuracy, our software has been proven to be highly effective for deduplication – the elimination of multiple registrations by the same person. The integration into Genkey’s ID platform now offers full deduplication on both modalities.” GenKey’s ID platform is designed for capturing biographic and biometric data of individuals in small to large-scale registrations and ensuring that each subject stored is unique. Besides its standard registration, verification and reporting modules, the software has customized modules for biometric voter verification, election management and biometric member verification for healthcare, and other use cases.
Iris ID, a global provider of iris recognition technology, announced its iCAM 7S series has been certified by the Bureau of Indian Standards (BIS) under license number R-41110639, the national standards-setting body for India. The recently mandatory BIS certification attests to the safety, quality and reliability of electronic, medical, construction and other many other commercial and consumer products. The iCAM 7S series and other company products are extensively used by India’s Unique Identification Authority as part of the country’s national identity program. Registrations, known as Aadhaar numbers, are used for Indians to apply for a passport, obtain a driver’s license, receive social services and many other daily activities. More than 1 billion citizens are enrolled in the program. Used For Access Control, Time And Attendance Once a product has passed BIS certification, manufacturers may use the agency’s mark on products used in IndiaMohammed Murad, vice president global sales and business development, Iris ID, said the BIS certification is similar to Underwriters Laboratories (UL) standards found throughout the world and the CE mark used in Europe. “We’re pleased to have received BIS certification as India is a very important market for Iris ID,” he said. “Our products are used not only by government agencies, but also by many commercial organizations.” Once a product has passed BIS certification, manufacturers may use the agency’s mark on products used in India. Iris ID authentication systems are currently used worldwide for access control, time and attendance, national ID programs, border crossings, voter registration and many other applications.
Evolis, global provider of personalization systems for plastic cards, announced the creation of a subsidiary in Tokyo under the name of Evolis Japan. Evolis Japan Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support. Since 2008, Evolis has been present in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group’s business development and maximize the chances to establish a long-term presence in Japan. Card Personalization Solutions Evolis Japan’s mission is to expand the traditional distribution network, develop a new network dedicated to new sectors and to strengthen its ability to reply to demands of government bodies and financial institutions. "Japan is one of the world’s leading economies with more than 125 million people. We therefore see strong potential in several key markets for card personalization. The creation of a Japanese company will help us reinforcing our existing business relationships and facilitate the development of new partnerships" says Emmanuel Picot, president of Evolis.
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot Detection Solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognize firearms in different shapes, sizes, colors, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyze the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-Shot Detection Advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimize the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organized manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organization's security, while enhancing user convenience.Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics Challenges For Biometric Authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal among older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realize the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimizing performance through a combination of new technology and algorithms, while ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimizing Capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data.The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness Detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimizes performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimizes performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted Performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template Matching Modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical Access Control Integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy Considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
The Food Standards Agency (FSA) in the UK has begun investigations into meat wholesalers after a raise in concern for food hygiene. This investigation has impacted businesses such as Wetherspoons, as well as schools and care homes up and down the country. Consumers are beginning to lose trust in businesses that are supplied by untrustworthy production companies and it seems to be becoming more common, if we are to look back to the horse meat scandal in 2013. But what are the benefits of having security systems within these types of production facilities? From ensuring consumer confidence, to maintaining quality control within products, what does it achieve? Finally, what crime exists surrounding the industry and how can the implementation of protective systems boost satisfaction? Instant Barriers For Unwanted People The world is becoming more advanced and revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices — whether this is protecting people from a physical threat or a threat that is much more devious within our foods. Food factories should start with access control systems. This will put an instant barrier between operations and any entry attempts by unauthorized personnel. Whether this a swiped identification card, biometrics or a passcode way of entry, only authorized personnel will be granted access. Revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices Another security system that could be put in place to help food factories and encourage them to work more efficiently is CCTV. By spring 2018, all slaughterhouses within England are required to have CCTV systems in place that can be reviewed by the FSA who have unprecedented access to footage within a 90-day period — is this something we should be looking to do in food factories to ensure safety for the British people? CCTV is a worthwhile investment for production companies who want to gain visibility of their entire operation and gain the respect from consumers across the country. The Benefits For CCTV Customer reassurance — as food factories don’t operate openly and everything is hidden away, this instantly creates suspicion from a consumer’s perspective as they will be the ones buying the final product once distributed to stores around the country. CCTV will counter this issue as it shows that operation centers have nothing to hide — giving them the ability to publish any footage if accused of misconduct. Maintaining quality — using more advanced CCTV within food factories will enable production companies to monitor the production line and maintain the standards that they sell themselves on. Sometimes, a human error is unavoidable on a production line after several hours of non-stop work — being able to detect it instantly is essential. Criminal Activity Across Food Factories 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. It has been proven that CCTV can deter criminals. By installing these systems, food factories can protect themselves from threats that are external and internal as well as being able to support themselves in any claims of violation. Although produced goods have been at the center of news stories regarding the integrity and containments of what is being delivered, another common crime within this industry is fraud. 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. Common Perpetrators In Fraud When it comes to the most common types of fraud, information theft stood at 30%, compliance breach at 30% and intellectual property theft standing at 26% of the respondents who were asked — all of which could cause great impacts to production lines. It was also found that those who had recently started working for the company, such as junior employees, were the most common preparators when it came to fraud within a manufacturing factory (39%). Temporary manufacturing workers came in at second place with 37%, while those in senior or middle management positions were at 33% — the same as ex-staff members. However, vendors/suppliers who do not have as much access to your business accounted for 33% too. This clarifies that anyone has the potential to commit a crime within a factory. To ensure protection for the British consumer, food production factories should seriously consider implementing similar systems to UK slaughterhouses. This article was contributed by IP security provider 2020Vision.
The Middle East security market provides a healthy opportunity for manufacturers who can capitalize on the region’s key verticals. Intersec’s 20th edition show focused more on solutions than on products, including solutions for the growing retail sector and an infrastructure market requiring ruggedized equipment to stand up to harsh environments. Intersec hosted security, safety and fire protection exhibitors from over fifty countries at Dubai’s spacious International Convention and Exhibition Centre on January 21 - 23. For the security market, the show was an opportunity to demonstrate how the industry’s latest technologies can benefit end-users in the UAE and globally. While the show hosted many impressively-sized stands from key security players, these tended to reflect the ongoing shift from a product-centric market to a focus on customer problems and solutions. Rather than filling the floorspace with an abundance of products, many brands chose to showcase how their flagship solutions could function in real-world applications. Retail Surveillance Delivers ROI Numerous companies opted to highlight their retail solutions – a key vertical for Dubai, which is known for its elaborate city shopping hubs. The Axis Communications stand allowed visitors to experience its network video offerings for the retail sector, including integrations with Electronic Article Surveillance (EAS) and Point of Sale (POS) technologies. Solutions on show reflected how security systems are increasingly expected to provide a tangible return on investment: With options for queue management and people counting, Axis video technology can be used to provide business intelligence and improve the customer experience, as well as enhancing safety. IP video manufacturer Vivotek also showcased its latest retail offering, including fisheye cameras with built-in crowd detection and heatmap technology, which can help retail managers analyze customer traffic patterns and highly frequented areas. The panoramic nature of Vivotek’s IP cameras makes them ideal for collecting comprehensive data from retail stores. MOBOTIX CEO Thomas Lausten demonstrates how the company’s dual modular camera delivers high-quality images in extreme weather conditions IP Video In Extreme Conditions The MOBOTIX stand was also less product-driven than at past shows. Instead, the focus was on how the manufacturer combines intelligent IoT technology and robust materials to address real end-user needs. CEO Thomas Lausten, who joined the company in June 2017, was on-hand to demonstrate how the company’s dual modular camera continues to deliver high-quality images in extreme weather conditions including ice, rain and sand. Rugged solutions were a big theme across the show floor. This is unsurprising given Intersec’s location in Dubai – the Middle East provides ample opportunity for the security market to capitalise on large outdoor projects, including the oil and gas industry. Video surveillance manufacturer Videotec showcased its latest HD PTZ cameras built to withstand harsh outdoor environments. The stand hosted an immersive ‘Experience Center’, where the company’s flagship PTZ cameras moved in sync to a rolling video, demonstrating their use in vertical markets including oil and gas, marine surveillance, and critical infrastructure. Video surveillance manufacturer Videotec showcased its latest HD PTZ cameras built to withstand harsh outdoor environments MENA Security Market Requirements Storage provider Promise Technology showcased its latest portfolio of surveillance solutions, including a cloud-based infrastructure optimised for growing IP video requirements. The manufacturer also introduced its new Vess A700 network video recorder series. This latest NVR offering specifically targets medium- to large-scale applications such as banking and industry. Such a solution is ideal for the growing Dubai market, where strict legislation requires a video retention time of 180 days. Intersec is set to return to Dubai from 20th - 22nd January 2019. Organisers expect over 1,300 exhibitors from across to globe to come together for a bigger, wider ranging and more innovative show.
Amazon Go is a new idea in retailing, now being tested at a store in Seattle, that eliminates the need for customers to go through a checkout line. The so-called “just walk out” experience depends on “the world’s most advanced shopping technology.” Customers simply enter a retail store, choose the goods they want, and leave. The checkout process is automated: The selected goods are charged to the customer’s account automatically. Solving Shoplifting Most of the information I have read about the system emphasizes its benefits in terms of customer convenience. However, another huge benefit would be to essentially “solve” the problem of shoplifting. Anyone – criminal or not – who enters the store, takes items and leaves will be charged for the goods. Shoplifting has been a huge and intractable cost for retailers for decades. Solving it is no small feat, and the potential money savings could help to pay for wider use of Amazon Go technology. After all, the high costs of the system are cited as one obstacle to wider implementation. Amazon Go Smart Phone App The Amazon Go system involves a smart phone app that identifies the customer as he or she walks into the store (presumably through a turnstile). In addition, there are computerized systems in place that automatically identify which customers pick up which items from the store shelves, and keep a running, real-time tally of who buys what. No need for check-out lines; it’s all automatic. Customers only need an Amazon account, a supported smartphone, and the free Amazon Go app. There are computerized systems in place that automatically identify which customers pick up which items from the store shelves, and keep a running, real-time tally Currently, the first Amazon Go store is being tested in Seattle; Amazon employees are using the store now in a Beta program, and it will be opened to the public in 2017. Goods include ready-to-eat food items, as well as grocery essentials ranging from bread and milk to artisan cheeses and locally made chocolates. Future Of Amazon Go How fast might the technology become more widespread? The Wall Street Journal earlier reported that Amazon envisioned opening more than 2,000 physical stores in the United States, although the company denies the report, perhaps in the interest of lowering expectations. Amazon describes the technologies involved as “computer vision, deep learning algorithms and sensor fusion.” Suffice it to say the 1,800-square-foot store relies on cameras and microphones, as well as infrared, pressure and load sensors on the store shelves. Surveillance cameras track customers through the store, as does computerized analysis of the sounds they make as they move about. In effect, the store has a continuous awareness of where everything and everyone are at any moment, and movements are analyzed to determine what items are being purchased. The system also relies heavily on Amazon’s cloud computing service. Eliminating Retail Shrinkage Shoplifting accounts for some 38 percent of shrinkage in the retail community. It appears Amazon Go would eliminate most, if not all, of those losses, which could contribute substantially to any return-on-investment evaluation when deciding whether to expand the concept to a wider audience. Customers would likely also be willing to pay a premium for the convenience of not waiting in line, and automated processes tend to lower labor costs. The retail market depends on physical security technologies to fight shoplifting, and is also embracing a variety of those technologies, especially video surveillance, to boost the level of customer service. Amazon Go is a showcase for how far technologies have come, and it also suggests other ways innovation could be used in the physical security market and beyond. By automating the checkout process, while also eliminating shoplifting and adding customer convenience, the concept of Amazon Go might just be a winner. That is, assuming customers wouldn’t rather just shop online and have goods delivered.
The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a way of preserving “privacy.” The clothing, covered with ghostly face-like designs to specifically trigger face-detection algorithms, are a backlash against the looming possibility of facial recognition being used in retail environments and for other commercial purposes. Increasingly Common Facial Recognition Technology It’s another possible obstacle to the use of a technology that has faced many challenges already. Successful implementations of facial recognition technology have been elusive over the years, especially when it comes to identifying “faces in a crowd.” Variables such as partial obstructions, movement, lighting, etc., have been a challenge to the algorithms tasked with identifying faces. Most successful face recognition systems have been those that have controlled the positioning of each face in order to maximize recognition. People walking single-file through a door, for example, provide faces one by one to make them easier to recognize. Despite the challenges, face recognition technology is becoming more common. The ability to recognizes faces (and identities) is central to new marketing technologies such as automated customer service or signage that targets an individual’s buying habits. For example, face recognition is an element in Amazon Go’s recently announced automated convenience store concept. In the online world, many ofus are willing to give up alevel of privacy if we perceivea benefit tradeoff. But whatabout the physical world? Infringement On Privacy? Clothing or other textiles with face-like patterns are being positioned as a way for consumers to fight back against any perceived invasions of privacy. Berlin-based artist and technologist Adam Harvey is designing the clothing to confuse face recognition software algorithms. In effect, the clothing “overloads an algorithm with what it wants, oversaturating an area with faces to divert the gaze of the computer vision algorithm,” Harvey told a recent hacking conference in Hamburg. One pattern would reportedly give a computer more than 1,200 possible facial detections. Concerns about face recognition algorithms extend beyond the ability to identify a person. Algorithms can also identify traits such as “calm” or “kind,” or demographics such as age and gender. Using such small bits of data to drive marketing efforts is problematic for many. Harvey points to the capabilities as another way that facial recognition is changing our expectations of privacy – and even more reason to fight back. Harvey’s Other Anti-Surveillance Work It’s not the first time Harvey has been involved in trying to foil facial recognition systems; he previously proposed using makeup and hairstyling to prevent machines from detecting a face. There are also some “anti-drone stealth wear” fashions on the market, made of silver-plated fabric that reflects thermal radiation to enable the wearer to avert overhead thermal surveillance. Privacy is an ongoing concern in the physical security and video surveillance market, and public opinion is evolving. In the online world, many of us are willing to give up a level of privacy if we perceive a benefit tradeoff. But what about the physical world? Face detection technology is a common feature of today’s video surveillance cameras, and facial recognition algorithms are becoming more sophisticated. Questions of privacy in the physical world have not yet evolved, and it’s unclear what benefits (if any) there are for consumers to allow machines to invade their privacy. Until those benefits become apparent, it’s not surprising there would be backlash. However, anti-surveillance clothing would have to really catch on to make any real difference, wouldn’t it?
The high-performance Predator Ultra HD PTZ video surveillance camera from UK CCTV manufacturer, 360 Vision Technology, has entered service at the National Coastwatch Institution’s (NCI) Felixstowe lookout station, to help protect lives along the coastline of the River Deben estuary. Felixstowe Coastwatch is a charity funded, volunteer-based organization with over 50 highly trained volunteers available to man lookout shifts. It’s also part of the NCI, a voluntary organization established in 1994 to restore a visual watch along UK shores, after many small Coastguard stations had been closed. Maritime navigation Felixstowe Coastwatch took over operations at the Lookout in April 1996 Under Felixstowe Coastwatch’s territory is the Deben estuary, whose treacherous shifting shingle banks and bar can present quite a challenge for maritime navigation, as Ian Clarke of Felixstowe Coastwatch explains: “Half of all call outs from the RNLI Harwich Lifeboat Station during 2016/17 were to attend incidents in this area, so it was clear that additional observation of the area would be beneficial and help to make it safer.” Felixstowe Coastwatch’s Lookout is built on top of Martello Tower ‘P’, one of the famous ‘Martello Towers’, built in the early 1800s as a defense against a possible invasion by Napoleon. The first lookout was originally built by HM Coastguard (replaced in 1979 by the current structure), who operated the Lookout until 1994. Felixstowe Coastwatch took over operations at the Lookout in April 1996. Experiencing CCTV cameras “Originally, the first idea to tackle the maritime issues at the River Deben estuary was to build an additional lookout tower,” says Ian. “That would have been a prohibitively costly exercise for a charity-based organization. However, after a visit to the NCI Station at Portland Bill, I was inspired by the use of CCTV there and interested to establish if video surveillance could be deployed to monitor the remote Deben estuary from our existing lookout station.” “The first task was to experience CCTV cameras in action, so we visited the Port of Felixstowe, the Felixstowe Town CCTV system and the Great Yarmouth Port Authority, where we saw the 360 Vision Predator in action. Impressed by the quality of its images, I contacted 360 Vision Technology for a demonstration, at which we were able to record video from the proposed location of the camera mast.” Comprehensive business case 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom" “After the demonstration of the camera’s capability, I was able to prepare a detailed report to our trustees, setting out a comprehensive business case as to why a CCTV camera would offer the best solution to the issues we were facing at the mouth of the River Deben. I was able to use the recorded footage of the demonstration to produce a video highlighting the impressive capability of the imaging technology.” From Ian’s report, approval of the project was granted and the 360 Vision Predator Ultra HD was installed by STC Solutions Ltd, after funds were raised from council-allocated budget and fundraising events organized by Felixstowe Coastwatch volunteers. “When we placed the order, 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom,” Ian continues. Wireless transmission solution “This was an important factor for us, as the entrance to the River Deben is expansive, and identifying vessels and individuals there would be greatly assisted by the optical zoom of the 360 Vision Predator camera.” With no line of sight from the camera to the lookout tower, an innovative wireless transmission solution was employed, using a belfry tower at a midway point in Felixstowe, where the signal is relayed to enable control and recording of the high definition images back at the lookout station. “Now operators can view superb live images of the River Deben, to confirm the identity, position and situation of vessels in the mouth of the river and if necessary, contact HM Coastguard if we observe any problems,” Ian explains. Seamless ONVIF integration Thanks to the broad integration capability of 360 Vision’s Predator Ultra HD, all surveillance video is archived for retrospective investigation, and controlled via a QVIS Viper NVR recorder. In addition, seamless ONVIF integration into Cambridge Pixel’s ‘RadarWatch’, a flexible client display application for radar display and target tracking, allows Felixstowe Coastwatch’s operators to set up virtual tripwire lines across dangerous areas of the river and shallow waters close to the main shipping channel. The trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location Once crossed by a vessel, the trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location, along with high-definition visual verification from the Predator camera. Also displayed as an overlay on screen, via the Predator Ultra camera and Cambridge Pixel technology integration, is Automatic Identification System (AIS) ship transponder information for each vessel, including a compass bearing supplied by the Predator camera’s head, which indicates which way the camera is pointing. Innovative installation “This means we can instantly identify and position any specific vessel we’re seeing with the camera,” says Ian. “We can also view the banks of the river and its beaches, to ensure that no members of the public are in danger.” Taking advantage of 360 Vision Technology’s any color and any finish design offer, the Predator Ultra camera was supplied in a Marine Grade white paint finish, and along with its powerful 40x zoom lens, is equipped with a ½” Ultra camera module to ensure maximum imaging performance, even in low-light conditions. This innovative installation has been so successful that Felixstowe Coastwatch are currently looking at other areas of the coastline where high-definition 360 Vision Predator Ultra HD cameras could assist with their daily operations, to protect the public and maritime traffic.
It is essential that governments be able to issue identification credentials so citizens can exercise their civic rights and duties, access programs and services, and travel freely to and from other countries. HID Global, globally renowned trusted identity solutions, has enabled numerous African countries to issue millions of these credentials as the company helps to propel a variety of initiatives across the continent aimed at providing “identity for all.” Secure ID card issuance “Secure issuance is a key part of our identity portfolio that is helping nations in Africa and other emerging economies close a big gap between citizens who have a legal way to identify themselves and those who don’t,” said Craig Sandness, Vice President & Managing Director – Secure Issuance with HID Global. We are also actively involved in designing programs for civil servants to securely access government buildings" He adds, “Our successes in Africa range from Angola’s voter ID card program to deployments in multiple countries that enable governments to issue national IDs, driver’s licenses, health cards, work permits and refugee identification credentials. We are also actively involved in designing programs for civil servants to securely access government buildings and government assets such as PCs or server rooms.” HID Global identification program For many countries, an e-Passport is the building block of democracy and cornerstone of citizenship as their first step to launching an identification program. HID Global’s secure issuance offering spans all aspects of creating and managing these and other credentials and issuing them wherever citizens are located. Notable deployments in Africa include: Resident, Healthcare and other National IDs: Eight African countries have either deployed or are developing one or more of these ID card programs using HID Global printers. Several are also in the early stages of deploying systems for issuing government employee ID cards for use by members of their military and police forces. Voter IDs: Angola used HID FARGO DTC5500LMX printers to roll out a voter ID program in over 200 municipalities and cities across the country. Over 650 systems were deployed in Angola to issue over 8 million cards in less than 8 months. ePassports: Several countries in Africa are using HID Global’s ID personalization systems for ePassports that provide successful identification and an easier travel experience for citizens. Driver’s Licenses: HID Global’s decentralized driver’s license issuance solution is being used by several African governments. Noticeably, one country is using these solutions to speed program deployment for over 25 million citizens. The company is also supplying pre-printed smart cards that include various overt and covert security features. The cards are then personalized locally with photo, variables data, custom holographic laminate and owner biometrics using FARGO HDP5000 printers. Refugee Identification: HID Global is working with international organizations to help connect African refugees with vital resources in multiple countries. HID FARGO HDP8500 and HDP5000 printers are being deployed at refugee camps to issue the necessary credentials for accessing food, water, shelter, financial aid and educational and other services. Student IDs: The West African Examinations Council (WAEC) is using HID FARGO Direct-to-Card ID card printers/encoders to improve the efficiency, accuracy and integrity of its educational testing program for more than 2 million students annually. HID FARGO Connect solution HID FARGO Connect solution enables ID cards to be issued from anywhere and any device via a web interface The latest additions to HID Global’s portfolio address the challenges African nations face in issuing credentials to remote locations while also serving high-volume needs of large metropolitan areas. The company’s HID FARGO Connect solution enables ID cards to be issued from anywhere and any device via a web interface in a trusted environment, changing the paradigm for governments whose citizens live in distant, hard-to-reach locations with limited infrastructure. For governments that need to meet the needs of large metropolitan populations, the new HID FARGO HDP6600 printer offers the world’s fastest retransfer throughput for ID card personalization.
HID Global, provider of trusted identity solutions, announces that the European Molecular Biology Laboratory (EMBL) in Grenoble, France has selected HID’s radio frequency identification (RFID) tags and its patented direct bonding technology for automated handling of biological samples at cryogenic temperatures of 196°C (-321° F) in liquid nitrogen. EMBL Grenoble creates high-resolution pictures and 3D atomic models of biological macromolecules using a specialized imaging process called macromolecular crystallography (MX). These images are useful for studying biological materials, developing highly efficient medicine, and fighting cancer more effectively. Limited Storage Density The images require molecular samples to be prepared in a crystalised form and frozen The images require molecular samples to be prepared in a crystalised form and frozen. Handling these samples is a complex task: tiny crystals must be grown, harvested, frozen on a sample holder at the tip of a tiny needle, and stored in liquid nitrogen at cryogenic temperatures and identified for further processing while remaining cool. Most current sample holders used in MX imaging offer limited storage density and poor initial crystal-positioning, which affects processing and limits the benefits of automated crystal harvesting systems. As a result, EMBL set out to design a storage and identification solution robust enough to function at extreme cold temperatures, but small enough to facilitate high precision and storage density. It also needed to support high-speed, automated handling by robots. Direct Bonding Technology “The HID Global technology has proven to be reliable against temperature cycling between room and liquid nitrogen temperatures, and the HID team was very supportive in helping us with our new designs,” said Florent Cipriani, Head of Instrumentation Team, EMBL Grenoble. HID’s direct bonding further allows the secure attachment of antennas to chips without the bulk of added modules Embeddable RFID tags and direct bonding technology from HID were chosen for identification in EMBL’s new sample holders due to the tags’ tiny footprint, proven track record to work in cryogenic environments, and ability to be custom designed to meet the needs of EMBL. HID’s direct bonding further allows the secure attachment of antennas to chips without the bulk of added modules, making the units the smallest HF formats available in the market that deliver uncompromised performance. Reliable Sample Tracking “HID Global’s proven RFID technology has been used in various cryogenic environments for years,” said Richard Aufreiter, Director Product Management, Identification Technology with HID Global. “It was a natural partnership between HID and EMBL to design a tracking system resistant to frosting and other aspects of extreme cold. Our team worked directly with EMBL engineers to ensure the best tracking system was deployed in their newly designed sample storage solution.” With HID technology, EMBL developed two new sample holders optimized for high throughput, precision, and reliable sample tracking of more than 200 thousand crystals per year. The new RFID-enabled sample holders increase throughput by allowing the crystal harvesting, cryogenic storage, and MX beamline feeding process to be fully automated using robot grippers and specifically designed RFID readers. Available memory space in the RFID tags can store additional information about the samples.
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organizations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric High-Throughput System The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility Entry Control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless Iris Authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
People and vehicle access control specialist Nortech has recently seen St James’ Market in central London update and improve access to its site using Nedap’s uPASS Target system. Supplied by Nortech, Nedap’s uPASS Target was installed by leading supplier of integrated security systems Total Support Services (Security) Ltd, which was selected to supply the robust solution for long-range identification to its recently installed security gates at the market. Total Support Services (Security) Ltd, TSS, which designs and engineers its own brand of security products and equipment, was able to use its 26 years of experience in specialized security products and services to provide the ideal security and access system that fitted the client’s needs. TSS selected the uPASS Target as it is easy to integrate with any existing access control system so users don’t need to get out of their vehicles to get into the development. Reliable And Easy To Install System Guy Bulmer, Director at Total Security Services commented, “We use Nortech as they are our ‘go-to’ provider for access control and vehicle identification systems. We have had a great relationship with them for nearly 20 years, ever since we were asked to install a Norpass system for some clients, and it just went from there.” The uPASS Target is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots He continued, “We certainly recommend Nortech products to others and we are very happy with the end result achieved for the client. We have our core products that we use because they are easy to install and they just work. Any issues are dealt with in a helpful and friendly way by the tech guys and we always get a reliable system at the end of it.” Ideal For Access Control And Monitoring Activities The uPASS Target is a robust solution for long-range identification of vehicles, people and rolling stock. It is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots. Its plug-and-play features enable it to be installed in just a few simple steps, and its variety of industry-standard communication interfaces support seamless integration into any existing or new third-party systems for access control, logistic operations, security and parking. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Dayton Public Schools (DPS) covers about 53 square miles in Dayton, Ohio. The school system is comprised of 30 school buildings and special centers with approximately 15,000 students in pre-kindergarten through high school. An urban district, DPS brings innovative students and teachers together to develop productive citizens ready to serve their communities. Core to achieving their mission is ensuring first, that students arrive at their school and at their classes, on time and ready to learn. DPS had a wide variety of, and in some cases a lack of, ID system capabilities throughout the district. This made it difficult to implement standard process improvements that would speed the creation of new IDs at the beginning of each school year. Additionally, DPS needed to expedite the check-in of tardy students thus allowing them to arrive at their classes faster. For managing tardy students, the schools traditionally used manual processes with handwritten passes which were inefficient and caused unnecessary delays if multiple students came to school late. Seeking to streamline processes, the school district realised that it needed to institute a universal, mandatory student ID system that allowed them to improve student attendance across the district while enhancing the security of its students and visitors. PlascoID Card-based Management System PlascoID showed DPS HID’s FARGO desktop card printers and their automated student management system, PlascoTrac, as a possible solution to the challenges the school system was facing While attending the Ohio eTech conference in early 2011, DPS learned about PlascoID, an authorized HID Global FARGO integrator and global provider of card-based ID systems. PlascoID showed DPS HID’s FARGO desktop card printers and their automated student management system, PlascoTrac, as a possible solution to the challenges the school system was facing. Because the printers and software integrated seamlessly with eSchoolPlus, the school system’s existing Web-based student-information system, DPS selected PlascoID to help streamline its attendance processes. Genuine HID products including the DTC4500 card printer/encoder, non-technology cards and Asure ID Enterprise card personalisation software were recommended by PlascoID to support the creation of efficient, multipurpose IDs. HID Global’s Asure ID software would enable the school system to create customized student ID cards while the DTC4500 printers would allow campus officials at each school location to instantly issue all student IDs. The printer’s modular design and small footprint were also ideal features for the school environment where space is at a premium. Asure ID Enterprise Software Prior to the start of the 2012 school year DPS implemented the solution over the course of just two weeks, installing the PlascoTrac system with 31 DTC4500 printers and Asure ID Enterprise software so it could be used on the first day of the new academic year. With the new DTC4500 printers and Asure ID software, DPS can now: Print a high volume of cards at fast print speeds: Every year, 15,000 IDs are needed by DPS in just the first week of school. The DTC4500 meets this challenge by quickly and reliably producing large quantities of cards with high-quality images. Able to withstand the day-to-day wear and tear by students these new IDs are now also uniform in image quality, design and durability. Save money and training time: The modestly priced DTC4500 has an intuitive set up and is easy to use. Already optimized for organizations like DPS, the printer is a high-security, high-performance ID issuance system that doesn’t require large capital investments or extensive training by system operators. Prepare for future ID card needs: The DTC4500 is field upgradeable. As their student ID system changes and evolves, DPS can modify their printers to fit new requirements. Achieve multiple uses with a single software application: With Asure ID Enterprise software, DPS is able to easily design card templates, enter student data and create photo ID badges. Additionally, Asure ID’s LiveLink capability enables the schools to sync student ID badge data with attendance data in PlascoTrac, and with student records in eSchoolPLUS. PlascoTrac Card ID System The newly designed DPS student ID is a white card featuring the district’s logo and mission statement With this combined solution from PlascoID and HID Global, DPS can now easily and quickly provide all students with IDs during the first week of the new school year. And when a student loses his or her badge, or is newly enrolled in school, a new ID can be created and issued that same day. The newly designed DPS student ID is a white card featuring the district’s logo and mission statement. New visual security elements include a large color photo of the student and his/her name printed in large font on the front of the card, so school personnel can easily identify individuals. Additionally, the ID now includes a barcode that is used in conjunction with the PlascoTrac system. So, when a student arrives late to school or is tardy to a class, they are scanned into PlascoTrac and a tardy pass is printed automatically. HID's Plasco ID Cards With this brand-new student ID system, processing tardy students now takes 25 to 35 percent less time than before, enabling DPS students to spend more time in class while reducing the administrative burden of its staff. Some schools have even tied the new ID cards to their media center In addition to addressing their original challenges, DPS has now found that the new HID and Plasco ID card solution gives them even greater functionality and versatility. Some schools have even tied the new ID cards to their media center for checking out books or documenting lunches purchased in the cafeteria. Elementary schools are even exploring ways to use the IDs to encourage positive reinforcement of good behaviors. HID Global Card Issuance/PlascoTrac Solution “We are extremely satisfied with how adaptable the solution is on a per-school basis,” said Richard Melson, director of The Office of Information Technology at Dayton Public Schools. “Initially the principals had one vision of how things were going to work and now that they have the technology in their possession, they each use it a little differently based on specific needs of their school.” In the near future, DPS expects to expand its use of the HID Global card issuance/PlascoTrac solution to keep track of visitors. Currently the district provides printed temporary ID passes, but it plans to eventually incorporate scanning of government IDs, such as a driver’s license, before granting visitors entry.
Round table discussion
Ensuring privacy is often a concern for video surveillance systems, especially in situations where a system intended for “public” surveillance could somehow, perhaps inadvertently, view private areas or situations. The classic example is an apartment building whose windows are within the range of a video surveillance camera. How can you provide video surveillance without invading the privacy of the apartment dwellers? Integrators and end users often turn to technology for a solution. We asked this week’s Expert Panel Round Table: How can smart camera features (such as privacy masking and programmable pan-tilt-zoom) address concerns about privacy?
Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-world solutions that can prevent terrorist attacks? We presented the question to this week’s Expert Panel Roundtable, and received a variety of interesting responses. Specifically, we asked: How is the recent rise in terrorism impacting the physical security market (e.g., higher demand, different mix of products, etc.)? How should the physical security market respond? What solutions are needed?