Human identification system
GET Group North America, global provider of end-to-end solutions for secure credentials with over 20 years of experience in identity management, has announced a partnership with Secure Planet, an I3 affiliated company, which provides facial recognition-based solutions of the highest overall quality, security, and value to U.S. Government, industry and commercial clients. Under the terms of the agreement, Secure Planet’s cutting-edge facial recognition technology will be incorporated in sel...
Altek Corp., global digital imaging company based in Taiwan, is introducing three new technologies: Vision AI chips, AI commercial surveillance cameras, and 3D depth image sensing modules with the theme of ‘Bringing Vision AI to The Edge’. The company’s vision AI chip and AI commercial surveillance cameras enable high-resolution smart surveillance by supporting AI human/object detection, event detection and behavior recognition. The entire AI process is conducted in the camera...
Ping Identity, global identity defined security solutions provider, has announced new programs and benefits for its Technology Alliance and Channel Program partners, including a new online partner directory, app integrations catalog, education and training services, on-demand resources, and enhanced services designed to improve partner products and drive business. Ping is also recognizing Microsoft, Optiv and ProofID for their shared commitment to deliver innovative identity solutions to the mar...
MOBOTIX and Konica Minolta are currently developing a new camera platform that specifically meets the requirements of deep learning methods and will lead to innovative recurring revenue models for both companies: MOBOTIX Camera Platform The new MOBOTIX camera platform, jointly developed with Konica Minolta, is based on the distributed intelligence in our camera system and is crucial for artificial intelligence and at the same time the key for the communication of our products with other sensor...
Evolis announces the formation of a wholly-owned subsidiary in Tokyo, Evolis Japan K.K. The globally renowned French card issuance company designs, manufactures and commercializes a complete range of personalization and issuance solutions for plastic cards in various markets such as retail, hospitality, banking or public administrations across the globe.Evolis has been present since 2008 in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local...
Iris ID, global provider of iris recognition technology, and GenKey, a trusted provider of biometric identification solutions, has announced the integration of iris recognition cameras and matching engine into GenKey’s biometric ID platform, to provide an all-in-one solution for various biometric registration and verification initiatives. Advanced Security And Privacy Iris ID iCAM TD100 and iCAM T10 cameras and IrisAccelerator matching engine have been integrated into GenKey’s ID s...
Iris ID, a global provider of iris recognition technology, announced its iCAM 7S series has been certified by the Bureau of Indian Standards (BIS) under license number R-41110639, the national standards-setting body for India. The recently mandatory BIS certification attests to the safety, quality and reliability of electronic, medical, construction and other many other commercial and consumer products. The iCAM 7S series and other company products are extensively used by India’s Unique Identification Authority as part of the country’s national identity program. Registrations, known as Aadhaar numbers, are used for Indians to apply for a passport, obtain a driver’s license, receive social services and many other daily activities. More than 1 billion citizens are enrolled in the program. Used For Access Control, Time And Attendance Once a product has passed BIS certification, manufacturers may use the agency’s mark on products used in IndiaMohammed Murad, vice president global sales and business development, Iris ID, said the BIS certification is similar to Underwriters Laboratories (UL) standards found throughout the world and the CE mark used in Europe. “We’re pleased to have received BIS certification as India is a very important market for Iris ID,” he said. “Our products are used not only by government agencies, but also by many commercial organizations.” Once a product has passed BIS certification, manufacturers may use the agency’s mark on products used in India. Iris ID authentication systems are currently used worldwide for access control, time and attendance, national ID programs, border crossings, voter registration and many other applications.
Evolis, global provider of personalization systems for plastic cards, announced the creation of a subsidiary in Tokyo under the name of Evolis Japan. Evolis Japan Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support. Since 2008, Evolis has been present in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group’s business development and maximize the chances to establish a long-term presence in Japan. Card Personalization Solutions Evolis Japan’s mission is to expand the traditional distribution network, develop a new network dedicated to new sectors and to strengthen its ability to reply to demands of government bodies and financial institutions. "Japan is one of the world’s leading economies with more than 125 million people. We therefore see strong potential in several key markets for card personalization. The creation of a Japanese company will help us reinforcing our existing business relationships and facilitate the development of new partnerships" says Emmanuel Picot, president of Evolis.
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's prisons, particularly as a means of smuggling. SPYNEL 360° Thermal Imaging Sensors To protect prisons, borders and critical infrastructures from smuggling and terrorism, Electro Optical Industries upgraded their most powerful 360° thermal imaging sensors SPYNEL-X and SPYNEL-S, integrating a visible channel and a laser rangefinder to the thermal cameras. The new V-LRF option aims to facilitate the tracking and the identification of a detected threat, thanks to the full HD visible cameras’ optical zoom (x30). The exact distance of the threat is provided by the laser rangefinder in real time, an option particularly adapted to the detection, tracking and recognition of the smallest targets, like UAVs. SPYNEL & its V-LRF option ensure no blind sector for a real 360° coverage in all surveillance phases: detection & identification An innovation it is, as all other systems on the market must use separate sensors to get similar functions: one sensor for detection, a radar for instance, and another sensor for identification, such as a PanTiltZoom (PTZ) camera. Xavier Elbaz, Sales Manager at Electro Optical Industries explains: "With separate systems, it is hardly possible to ensure a real 360° coverage for detection and identification because of blind sectors created by the mechanical supports. Moreover, separate sensors must be integrated and calibrated to properly operate together. SPYNEL & its V-LRF option ensure no blind sector for a real 360° coverage in all surveillance phases: detection & identification." SPYNEL V-LRF With CYCLOPE Detection Software In addition, most of the time, UAVs' small size and low electromagnetic signature go unregistered by traditional detection measures. With SPYNEL's thermal imaging technology, it is impossible for a drone to go unnoticed: any object, hot or cold will be detected by the 360° thermal sensor, day and night. SPYNEL V-LRF and its automatic detection & tracking software CYCLOPE are easy to deploy and to use, and the system is easily interfaceable for multi-sensor protection of critical infrastructure like prisons. Data is smoothly merged with other sensors’ data like radars, AIS, fence vibration sensors, etc., and displayed on the same interface, whereas separate sensors must be integrated and calibrated to operate properly together.
Plasco ID, global integrator of identification solutions, announces it has hired Jeff Bill as its Chief Operating Officer. Bringing a valuable combination of industry experience and proven results, he will focus on business operations and strategic initiatives. Physical Card Access Control A veteran in visual and physical card access control, Jeff formerly held the position of President at Bristol ID, global technology card business; prior, he served as General Manager for Brady’s People ID and IDenticard business units. This hiring directly correlates to Plasco ID’s customer-centric philosophy and strong commitment to customer service excellence. The secure ID solutions company continually leads industry innovation, with a mission to providing customers with the best solutions available to meet their unique business needs. Proximity Technology Cards Partnerships with the industry’s best manufacturers has resulted in exclusive printer offerings with unique benefits. In addition, the organization has launched its own brand of proximity technology cards, allowing it to pass along significant cost-savings to its customer base. Most notably, the organization developed the first subscription and cloud-based ID card management software, allowing an unlimited number of users to manage, design and print their card program from any location, any time. “We are pleased to welcome Jeff to the Plasco ID family. It is an exciting time for our organization as we add this new role to further bolster our senior executive team. Jeff brings a unique skill set that will enhance our ability to execute on both our strategic growth and improvement initiatives,” stated Alan Mendelson, Plasco ID President and CEO.
BriefCam, the provider of Video Synopsis and Deep Learning solutions, announced that it will demonstrate the BriefCam v5.2.1 video content analytics platform at the Global Security Exchange (GSX) Security Conference & Expo in Las Vegas. BriefCam’s Integration Technology BriefCam’s breakthrough technology detects, tracks, extracts and identifies people and objects from video, including; men, women, children, clothing, bags, vehicles, animals, size, color, speed, path, direction, dwell time, and more. By leveraging this extracted and aggregated video metadata within BriefCam’s embedded BI platform, users can perform quantitative analysis on their video, derive actionable insights, and visualize them within customizable dashboards, enabling data driven safety, security and operational decision making. BriefCam integrates with complementary technologies to provide a comprehensive video security solution BriefCam integrates with complementary technologies such as Video Management Systems (VMS), Physical Security Information Management Systems (PSIM), Command & Control Systems (C&C), and cloud-based video surveillance solutions to provide a comprehensive video security solution. Advanced Analytical Capabilities BriefCam will be demonstrating its unique advanced analytical capabilities that enable breakthroughs in safety, security and operational efficiencies in booth #538. Additionally, several Technology Partners and System Integrators will showcase BriefCam’s video content analytics platform at GSX 2018 including: Genetec, Booth #2951: Embedded within the Genetec Security Center, BriefCam enables customers to maximize security and gain operational insights from within the Genetec VMS. Milestone, Booth #2664: Embedded within the Milestone XProtect VMS client, BriefCam seamlessly transforms video into actionable intelligence. BriefCam’s Smart Alerts seamlessly appear in Security Center’s Alarms screen, and quantitative dashboards can be rapidly configured for daily monitoring and trend spotting. Pivot3, Booth #2471: The Pivot3 Intelligent Video Analytics Solution is an innovative combination of BriefCam’s comprehensive video content analytics delivered on a hyperconverged platform for a secure, resilient and scalable infrastructure. Salient, Booth #2170: Integrated with the Salient CompleteView VMS, BriefCam enables customers to make video searchable, actionable and quantifiable, transforming their organizations into productive, proactive and predictive enterprises.
Rhombus Systems, an enterprise video security startup, is redefining video security for businesses around the world with their AI-powered security camera – the Rhombus R1. This next-generation security camera has the ability to learn and alert users to an unidentified person, making threat detection faster than ever before. Rhombus’s video security system continuously analyses video to help organizations better secure their physical spaces. Today the company announced a $3 million seed round led by Lemnos Labs, with participation from Promus Ventures and Portfolia, to help accelerate its growth and transform video security. With Rhombus, users have the power to trust or flag certain faces giving it the ability to pre-emptively detect potential threatsRhombus Systems is a major advancement to outdated CCTV systems that encounter a wide range of problems, such as bulky hardware, difficult installations, complicated servers, outdated network video recorders (NVRs) and the risk of becoming compromised. The R1 solves these issues and can even examine its environment, people, objects and motion to improve its overall performance. Pre-emptive Detection Of Potential Threats “Traditional business video security is outdated,” said Garrett Larsson, Rhombus Systems Co-founder and CEO. “By combining AI and computer vision, we are able to offer a video security system unlike any other. Modern businesses and organizations want better technology, and our system symbolises the first step, and our commitment, in providing next-generation solutions to better understand and protect our spaces.” With Rhombus, users have the power to trust or flag certain faces giving it the ability to pre-emptively detect potential threats. For example, if the cameras identify an individual or object that is prohibited from a school campus or business, the system can provide their location and alert the appropriate personnel with real-time notifications, all without having to monitor a video feed. The system can also count and record the number of unique people, measure foot traffic, and pull quantitative data to help businesses understand how their space is being utilised. Cloud-managed Secure Access System Rhombus is entirely cloud managed, allowing users to securely access their system from any computer or mobile device“We previously managed a system that couldn’t scale with our growth,” said Arik Levy, CEO of Luxer One which makes package delivery smart lockers. “They seem to have really taken their time in solving the problems that exist with traditional systems. The productivity and features we’ve gained was like a breath of fresh air.” The Rhombus R1 cameras are plug-and-play – meaning they can be setup, taken down, and moved in a matter of minutes providing unique flexibility and scalability. Rhombus is entirely cloud managed, allowing users to securely access their system from any computer or mobile device. End-to-end encryption and automatic firmware updates come standard to ensure the system itself is secure. Seamless IT integrations, such as single sign-on (SSO), Office 365, and Slack are included to make managing the system and user-experience effortless. Rhombus’s $3 million seed round will allow them to execute its vision in replacing outdated video security systems to better protect organizations, as well as accelerate its growth into different sectors, and recruit more talent for sales and marketing.
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot Detection Solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognize firearms in different shapes, sizes, colors, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyze the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-Shot Detection Advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimize the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organized manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organization's security, while enhancing user convenience.Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics Challenges For Biometric Authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal among older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realize the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimizing performance through a combination of new technology and algorithms, while ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimizing Capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data.The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness Detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimizes performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimizes performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted Performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template Matching Modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical Access Control Integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy Considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
The Food Standards Agency (FSA) in the UK has begun investigations into meat wholesalers after a raise in concern for food hygiene. This investigation has impacted businesses such as Wetherspoons, as well as schools and care homes up and down the country. Consumers are beginning to lose trust in businesses that are supplied by untrustworthy production companies and it seems to be becoming more common, if we are to look back to the horse meat scandal in 2013. But what are the benefits of having security systems within these types of production facilities? From ensuring consumer confidence, to maintaining quality control within products, what does it achieve? Finally, what crime exists surrounding the industry and how can the implementation of protective systems boost satisfaction? Instant Barriers For Unwanted People The world is becoming more advanced and revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices — whether this is protecting people from a physical threat or a threat that is much more devious within our foods. Food factories should start with access control systems. This will put an instant barrier between operations and any entry attempts by unauthorized personnel. Whether this a swiped identification card, biometrics or a passcode way of entry, only authorized personnel will be granted access. Revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices Another security system that could be put in place to help food factories and encourage them to work more efficiently is CCTV. By spring 2018, all slaughterhouses within England are required to have CCTV systems in place that can be reviewed by the FSA who have unprecedented access to footage within a 90-day period — is this something we should be looking to do in food factories to ensure safety for the British people? CCTV is a worthwhile investment for production companies who want to gain visibility of their entire operation and gain the respect from consumers across the country. The Benefits For CCTV Customer reassurance — as food factories don’t operate openly and everything is hidden away, this instantly creates suspicion from a consumer’s perspective as they will be the ones buying the final product once distributed to stores around the country. CCTV will counter this issue as it shows that operation centers have nothing to hide — giving them the ability to publish any footage if accused of misconduct. Maintaining quality — using more advanced CCTV within food factories will enable production companies to monitor the production line and maintain the standards that they sell themselves on. Sometimes, a human error is unavoidable on a production line after several hours of non-stop work — being able to detect it instantly is essential. Criminal Activity Across Food Factories 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. It has been proven that CCTV can deter criminals. By installing these systems, food factories can protect themselves from threats that are external and internal as well as being able to support themselves in any claims of violation. Although produced goods have been at the center of news stories regarding the integrity and containments of what is being delivered, another common crime within this industry is fraud. 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. Common Perpetrators In Fraud When it comes to the most common types of fraud, information theft stood at 30%, compliance breach at 30% and intellectual property theft standing at 26% of the respondents who were asked — all of which could cause great impacts to production lines. It was also found that those who had recently started working for the company, such as junior employees, were the most common preparators when it came to fraud within a manufacturing factory (39%). Temporary manufacturing workers came in at second place with 37%, while those in senior or middle management positions were at 33% — the same as ex-staff members. However, vendors/suppliers who do not have as much access to your business accounted for 33% too. This clarifies that anyone has the potential to commit a crime within a factory. To ensure protection for the British consumer, food production factories should seriously consider implementing similar systems to UK slaughterhouses. This article was contributed by IP security provider 2020Vision.
The Middle East security market provides a healthy opportunity for manufacturers who can capitalize on the region’s key verticals. Intersec’s 20th edition show focused more on solutions than on products, including solutions for the growing retail sector and an infrastructure market requiring ruggedized equipment to stand up to harsh environments. Intersec hosted security, safety and fire protection exhibitors from over fifty countries at Dubai’s spacious International Convention and Exhibition Centre on January 21 - 23. For the security market, the show was an opportunity to demonstrate how the industry’s latest technologies can benefit end-users in the UAE and globally. While the show hosted many impressively-sized stands from key security players, these tended to reflect the ongoing shift from a product-centric market to a focus on customer problems and solutions. Rather than filling the floorspace with an abundance of products, many brands chose to showcase how their flagship solutions could function in real-world applications. Retail Surveillance Delivers ROI Numerous companies opted to highlight their retail solutions – a key vertical for Dubai, which is known for its elaborate city shopping hubs. The Axis Communications stand allowed visitors to experience its network video offerings for the retail sector, including integrations with Electronic Article Surveillance (EAS) and Point of Sale (POS) technologies. Solutions on show reflected how security systems are increasingly expected to provide a tangible return on investment: With options for queue management and people counting, Axis video technology can be used to provide business intelligence and improve the customer experience, as well as enhancing safety. IP video manufacturer Vivotek also showcased its latest retail offering, including fisheye cameras with built-in crowd detection and heatmap technology, which can help retail managers analyze customer traffic patterns and highly frequented areas. The panoramic nature of Vivotek’s IP cameras makes them ideal for collecting comprehensive data from retail stores. MOBOTIX CEO Thomas Lausten demonstrates how the company’s dual modular camera delivers high-quality images in extreme weather conditions IP Video In Extreme Conditions The MOBOTIX stand was also less product-driven than at past shows. Instead, the focus was on how the manufacturer combines intelligent IoT technology and robust materials to address real end-user needs. CEO Thomas Lausten, who joined the company in June 2017, was on-hand to demonstrate how the company’s dual modular camera continues to deliver high-quality images in extreme weather conditions including ice, rain and sand. Rugged solutions were a big theme across the show floor. This is unsurprising given Intersec’s location in Dubai – the Middle East provides ample opportunity for the security market to capitalise on large outdoor projects, including the oil and gas industry. Video surveillance manufacturer Videotec showcased its latest HD PTZ cameras built to withstand harsh outdoor environments. The stand hosted an immersive ‘Experience Center’, where the company’s flagship PTZ cameras moved in sync to a rolling video, demonstrating their use in vertical markets including oil and gas, marine surveillance, and critical infrastructure. Video surveillance manufacturer Videotec showcased its latest HD PTZ cameras built to withstand harsh outdoor environments MENA Security Market Requirements Storage provider Promise Technology showcased its latest portfolio of surveillance solutions, including a cloud-based infrastructure optimised for growing IP video requirements. The manufacturer also introduced its new Vess A700 network video recorder series. This latest NVR offering specifically targets medium- to large-scale applications such as banking and industry. Such a solution is ideal for the growing Dubai market, where strict legislation requires a video retention time of 180 days. Intersec is set to return to Dubai from 20th - 22nd January 2019. Organisers expect over 1,300 exhibitors from across to globe to come together for a bigger, wider ranging and more innovative show.
Amazon Go is a new idea in retailing, now being tested at a store in Seattle, that eliminates the need for customers to go through a checkout line. The so-called “just walk out” experience depends on “the world’s most advanced shopping technology.” Customers simply enter a retail store, choose the goods they want, and leave. The checkout process is automated: The selected goods are charged to the customer’s account automatically. Solving Shoplifting Most of the information I have read about the system emphasizes its benefits in terms of customer convenience. However, another huge benefit would be to essentially “solve” the problem of shoplifting. Anyone – criminal or not – who enters the store, takes items and leaves will be charged for the goods. Shoplifting has been a huge and intractable cost for retailers for decades. Solving it is no small feat, and the potential money savings could help to pay for wider use of Amazon Go technology. After all, the high costs of the system are cited as one obstacle to wider implementation. Amazon Go Smart Phone App The Amazon Go system involves a smart phone app that identifies the customer as he or she walks into the store (presumably through a turnstile). In addition, there are computerized systems in place that automatically identify which customers pick up which items from the store shelves, and keep a running, real-time tally of who buys what. No need for check-out lines; it’s all automatic. Customers only need an Amazon account, a supported smartphone, and the free Amazon Go app. There are computerized systems in place that automatically identify which customers pick up which items from the store shelves, and keep a running, real-time tally Currently, the first Amazon Go store is being tested in Seattle; Amazon employees are using the store now in a Beta program, and it will be opened to the public in 2017. Goods include ready-to-eat food items, as well as grocery essentials ranging from bread and milk to artisan cheeses and locally made chocolates. Future Of Amazon Go How fast might the technology become more widespread? The Wall Street Journal earlier reported that Amazon envisioned opening more than 2,000 physical stores in the United States, although the company denies the report, perhaps in the interest of lowering expectations. Amazon describes the technologies involved as “computer vision, deep learning algorithms and sensor fusion.” Suffice it to say the 1,800-square-foot store relies on cameras and microphones, as well as infrared, pressure and load sensors on the store shelves. Surveillance cameras track customers through the store, as does computerized analysis of the sounds they make as they move about. In effect, the store has a continuous awareness of where everything and everyone are at any moment, and movements are analyzed to determine what items are being purchased. The system also relies heavily on Amazon’s cloud computing service. Eliminating Retail Shrinkage Shoplifting accounts for some 38 percent of shrinkage in the retail community. It appears Amazon Go would eliminate most, if not all, of those losses, which could contribute substantially to any return-on-investment evaluation when deciding whether to expand the concept to a wider audience. Customers would likely also be willing to pay a premium for the convenience of not waiting in line, and automated processes tend to lower labor costs. The retail market depends on physical security technologies to fight shoplifting, and is also embracing a variety of those technologies, especially video surveillance, to boost the level of customer service. Amazon Go is a showcase for how far technologies have come, and it also suggests other ways innovation could be used in the physical security market and beyond. By automating the checkout process, while also eliminating shoplifting and adding customer convenience, the concept of Amazon Go might just be a winner. That is, assuming customers wouldn’t rather just shop online and have goods delivered.
The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a way of preserving “privacy.” The clothing, covered with ghostly face-like designs to specifically trigger face-detection algorithms, are a backlash against the looming possibility of facial recognition being used in retail environments and for other commercial purposes. Increasingly Common Facial Recognition Technology It’s another possible obstacle to the use of a technology that has faced many challenges already. Successful implementations of facial recognition technology have been elusive over the years, especially when it comes to identifying “faces in a crowd.” Variables such as partial obstructions, movement, lighting, etc., have been a challenge to the algorithms tasked with identifying faces. Most successful face recognition systems have been those that have controlled the positioning of each face in order to maximize recognition. People walking single-file through a door, for example, provide faces one by one to make them easier to recognize. Despite the challenges, face recognition technology is becoming more common. The ability to recognizes faces (and identities) is central to new marketing technologies such as automated customer service or signage that targets an individual’s buying habits. For example, face recognition is an element in Amazon Go’s recently announced automated convenience store concept. In the online world, many ofus are willing to give up alevel of privacy if we perceivea benefit tradeoff. But whatabout the physical world? Infringement On Privacy? Clothing or other textiles with face-like patterns are being positioned as a way for consumers to fight back against any perceived invasions of privacy. Berlin-based artist and technologist Adam Harvey is designing the clothing to confuse face recognition software algorithms. In effect, the clothing “overloads an algorithm with what it wants, oversaturating an area with faces to divert the gaze of the computer vision algorithm,” Harvey told a recent hacking conference in Hamburg. One pattern would reportedly give a computer more than 1,200 possible facial detections. Concerns about face recognition algorithms extend beyond the ability to identify a person. Algorithms can also identify traits such as “calm” or “kind,” or demographics such as age and gender. Using such small bits of data to drive marketing efforts is problematic for many. Harvey points to the capabilities as another way that facial recognition is changing our expectations of privacy – and even more reason to fight back. Harvey’s Other Anti-Surveillance Work It’s not the first time Harvey has been involved in trying to foil facial recognition systems; he previously proposed using makeup and hairstyling to prevent machines from detecting a face. There are also some “anti-drone stealth wear” fashions on the market, made of silver-plated fabric that reflects thermal radiation to enable the wearer to avert overhead thermal surveillance. Privacy is an ongoing concern in the physical security and video surveillance market, and public opinion is evolving. In the online world, many of us are willing to give up a level of privacy if we perceive a benefit tradeoff. But what about the physical world? Face detection technology is a common feature of today’s video surveillance cameras, and facial recognition algorithms are becoming more sophisticated. Questions of privacy in the physical world have not yet evolved, and it’s unclear what benefits (if any) there are for consumers to allow machines to invade their privacy. Until those benefits become apparent, it’s not surprising there would be backlash. However, anti-surveillance clothing would have to really catch on to make any real difference, wouldn’t it?
HID Global, provider of trusted identity solutions, announces that the European Molecular Biology Laboratory (EMBL) in Grenoble, France has selected HID’s radio frequency identification (RFID) tags and its patented direct bonding technology for automated handling of biological samples at cryogenic temperatures of 196°C (-321° F) in liquid nitrogen. EMBL Grenoble creates high-resolution pictures and 3D atomic models of biological macromolecules using a specialized imaging process called macromolecular crystallography (MX). These images are useful for studying biological materials, developing highly efficient medicine, and fighting cancer more effectively. Limited Storage Density The images require molecular samples to be prepared in a crystalised form and frozen The images require molecular samples to be prepared in a crystalised form and frozen. Handling these samples is a complex task: tiny crystals must be grown, harvested, frozen on a sample holder at the tip of a tiny needle, and stored in liquid nitrogen at cryogenic temperatures and identified for further processing while remaining cool. Most current sample holders used in MX imaging offer limited storage density and poor initial crystal-positioning, which affects processing and limits the benefits of automated crystal harvesting systems. As a result, EMBL set out to design a storage and identification solution robust enough to function at extreme cold temperatures, but small enough to facilitate high precision and storage density. It also needed to support high-speed, automated handling by robots. Direct Bonding Technology “The HID Global technology has proven to be reliable against temperature cycling between room and liquid nitrogen temperatures, and the HID team was very supportive in helping us with our new designs,” said Florent Cipriani, Head of Instrumentation Team, EMBL Grenoble. HID’s direct bonding further allows the secure attachment of antennas to chips without the bulk of added modules Embeddable RFID tags and direct bonding technology from HID were chosen for identification in EMBL’s new sample holders due to the tags’ tiny footprint, proven track record to work in cryogenic environments, and ability to be custom designed to meet the needs of EMBL. HID’s direct bonding further allows the secure attachment of antennas to chips without the bulk of added modules, making the units the smallest HF formats available in the market that deliver uncompromised performance. Reliable Sample Tracking “HID Global’s proven RFID technology has been used in various cryogenic environments for years,” said Richard Aufreiter, Director Product Management, Identification Technology with HID Global. “It was a natural partnership between HID and EMBL to design a tracking system resistant to frosting and other aspects of extreme cold. Our team worked directly with EMBL engineers to ensure the best tracking system was deployed in their newly designed sample storage solution.” With HID technology, EMBL developed two new sample holders optimized for high throughput, precision, and reliable sample tracking of more than 200 thousand crystals per year. The new RFID-enabled sample holders increase throughput by allowing the crystal harvesting, cryogenic storage, and MX beamline feeding process to be fully automated using robot grippers and specifically designed RFID readers. Available memory space in the RFID tags can store additional information about the samples.
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organizations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric High-Throughput System The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility Entry Control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless Iris Authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
People and vehicle access control specialist Nortech has recently seen St James’ Market in central London update and improve access to its site using Nedap’s uPASS Target system. Supplied by Nortech, Nedap’s uPASS Target was installed by leading supplier of integrated security systems Total Support Services (Security) Ltd, which was selected to supply the robust solution for long-range identification to its recently installed security gates at the market. Total Support Services (Security) Ltd, TSS, which designs and engineers its own brand of security products and equipment, was able to use its 26 years of experience in specialized security products and services to provide the ideal security and access system that fitted the client’s needs. TSS selected the uPASS Target as it is easy to integrate with any existing access control system so users don’t need to get out of their vehicles to get into the development. Reliable And Easy To Install System Guy Bulmer, Director at Total Security Services commented, “We use Nortech as they are our ‘go-to’ provider for access control and vehicle identification systems. We have had a great relationship with them for nearly 20 years, ever since we were asked to install a Norpass system for some clients, and it just went from there.” The uPASS Target is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots He continued, “We certainly recommend Nortech products to others and we are very happy with the end result achieved for the client. We have our core products that we use because they are easy to install and they just work. Any issues are dealt with in a helpful and friendly way by the tech guys and we always get a reliable system at the end of it.” Ideal For Access Control And Monitoring Activities The uPASS Target is a robust solution for long-range identification of vehicles, people and rolling stock. It is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots. Its plug-and-play features enable it to be installed in just a few simple steps, and its variety of industry-standard communication interfaces support seamless integration into any existing or new third-party systems for access control, logistic operations, security and parking. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Dayton Public Schools (DPS) covers about 53 square miles in Dayton, Ohio. The school system is comprised of 30 school buildings and special centers with approximately 15,000 students in pre-kindergarten through high school. An urban district, DPS brings innovative students and teachers together to develop productive citizens ready to serve their communities. Core to achieving their mission is ensuring first, that students arrive at their school and at their classes, on time and ready to learn. DPS had a wide variety of, and in some cases a lack of, ID system capabilities throughout the district. This made it difficult to implement standard process improvements that would speed the creation of new IDs at the beginning of each school year. Additionally, DPS needed to expedite the check-in of tardy students thus allowing them to arrive at their classes faster. For managing tardy students, the schools traditionally used manual processes with handwritten passes which were inefficient and caused unnecessary delays if multiple students came to school late. Seeking to streamline processes, the school district realised that it needed to institute a universal, mandatory student ID system that allowed them to improve student attendance across the district while enhancing the security of its students and visitors. PlascoID Card-based Management System PlascoID showed DPS HID’s FARGO desktop card printers and their automated student management system, PlascoTrac, as a possible solution to the challenges the school system was facing While attending the Ohio eTech conference in early 2011, DPS learned about PlascoID, an authorized HID Global FARGO integrator and global provider of card-based ID systems. PlascoID showed DPS HID’s FARGO desktop card printers and their automated student management system, PlascoTrac, as a possible solution to the challenges the school system was facing. Because the printers and software integrated seamlessly with eSchoolPlus, the school system’s existing Web-based student-information system, DPS selected PlascoID to help streamline its attendance processes. Genuine HID products including the DTC4500 card printer/encoder, non-technology cards and Asure ID Enterprise card personalisation software were recommended by PlascoID to support the creation of efficient, multipurpose IDs. HID Global’s Asure ID software would enable the school system to create customized student ID cards while the DTC4500 printers would allow campus officials at each school location to instantly issue all student IDs. The printer’s modular design and small footprint were also ideal features for the school environment where space is at a premium. Asure ID Enterprise Software Prior to the start of the 2012 school year DPS implemented the solution over the course of just two weeks, installing the PlascoTrac system with 31 DTC4500 printers and Asure ID Enterprise software so it could be used on the first day of the new academic year. With the new DTC4500 printers and Asure ID software, DPS can now: Print a high volume of cards at fast print speeds: Every year, 15,000 IDs are needed by DPS in just the first week of school. The DTC4500 meets this challenge by quickly and reliably producing large quantities of cards with high-quality images. Able to withstand the day-to-day wear and tear by students these new IDs are now also uniform in image quality, design and durability. Save money and training time: The modestly priced DTC4500 has an intuitive set up and is easy to use. Already optimized for organizations like DPS, the printer is a high-security, high-performance ID issuance system that doesn’t require large capital investments or extensive training by system operators. Prepare for future ID card needs: The DTC4500 is field upgradeable. As their student ID system changes and evolves, DPS can modify their printers to fit new requirements. Achieve multiple uses with a single software application: With Asure ID Enterprise software, DPS is able to easily design card templates, enter student data and create photo ID badges. Additionally, Asure ID’s LiveLink capability enables the schools to sync student ID badge data with attendance data in PlascoTrac, and with student records in eSchoolPLUS. PlascoTrac Card ID System The newly designed DPS student ID is a white card featuring the district’s logo and mission statement With this combined solution from PlascoID and HID Global, DPS can now easily and quickly provide all students with IDs during the first week of the new school year. And when a student loses his or her badge, or is newly enrolled in school, a new ID can be created and issued that same day. The newly designed DPS student ID is a white card featuring the district’s logo and mission statement. New visual security elements include a large color photo of the student and his/her name printed in large font on the front of the card, so school personnel can easily identify individuals. Additionally, the ID now includes a barcode that is used in conjunction with the PlascoTrac system. So, when a student arrives late to school or is tardy to a class, they are scanned into PlascoTrac and a tardy pass is printed automatically. HID's Plasco ID Cards With this brand-new student ID system, processing tardy students now takes 25 to 35 percent less time than before, enabling DPS students to spend more time in class while reducing the administrative burden of its staff. Some schools have even tied the new ID cards to their media center In addition to addressing their original challenges, DPS has now found that the new HID and Plasco ID card solution gives them even greater functionality and versatility. Some schools have even tied the new ID cards to their media center for checking out books or documenting lunches purchased in the cafeteria. Elementary schools are even exploring ways to use the IDs to encourage positive reinforcement of good behaviors. HID Global Card Issuance/PlascoTrac Solution “We are extremely satisfied with how adaptable the solution is on a per-school basis,” said Richard Melson, director of The Office of Information Technology at Dayton Public Schools. “Initially the principals had one vision of how things were going to work and now that they have the technology in their possession, they each use it a little differently based on specific needs of their school.” In the near future, DPS expects to expand its use of the HID Global card issuance/PlascoTrac solution to keep track of visitors. Currently the district provides printed temporary ID passes, but it plans to eventually incorporate scanning of government IDs, such as a driver’s license, before granting visitors entry.
Safety is at the forefront of hospitals across the nation. According to a landmark report To Err is Human (2000) by The Institute of Medicine (IOM), between 44,000 and 98,000 patients die a year in the U.S. due to preventable medical errors including wrongful administration of medication. Beyond the cost of human life, these errors cost the healthcare industry as much as $29 million per year. This figure takes into account the expenses associated with additional care, loss of income and disability so as to reduce medication administration errors, hospitals are modifying their current medical dispensing systems in operation to prevent and eliminate these errors. Based in Portsmouth, Ohio, Southern Ohio Medical Center (SOMC) is one such hospital that is addressing this concern. A 222-bed hospital that provides emergency and surgical care, as well as a wide range of other health-care services, SOMC employs 2,200 full and part-time doctors and volunteers. SOMC has a medical staff of more than 140 board-certified or board-eligible physicians and specialists and is supported by more than 800 volunteers. WALLaroo 2000 Wall Station The WALLaroo 2000 wall station featured a cabinet mounted outside each patient’s room to temporarily stock the non-narcotic medications prior to dispensing One of the “Best Practices” outlined in the IOM report calls for the healthcare industry to utilize technology, such as bed side bar coding, to improve patient identification. To meet these standards, SOMC quickly modernized their process from relying heavily on a two-cart dispensing system that included laptops on wheels (LOW’s) and pharmacy carts, to a system that was more efficient and accurate. The new solution, the WALLaroo 2000 wall station, featured a cabinet mounted outside each patient’s room to temporarily stock the non-narcotic medications prior to dispensing. SOMC’s IT department was tasked with finding a way to integrate the wall stations with a state-of-the-art access control system that was equipped with an access-controlled lock and reader. By implementing this solution, SOMC has been able to strictly adhere to their patient’s rights as they pertain to medication dispensing, which includes: the right patient, the right medication, the right dose, the right time and the right route of administration. Centrally Networked Access Control System “When we started our quest for an access-control solution, we looked for two things,” said Dennis Ward, information services and applications manager for SOMC. “First SOMC needed a solution that would be centrally networked with the current eMAR system, as well as have a main power source. Additionally, we needed to replace the magnetic strip on employee badges with a more effective technology.” Ward consulted with several companies within the security industry, including Accu-Tech, SecuriCo, Microman and HID Global, before finding the optimal solution- SecuriCo’s Securus Web software solution. The solution operates with a HID EdgeReader coupled with iCLASS 2K (37-bit) smart cards and Rutherford Controls 3513 Lock. SecurusWeb Software Solution SOMC project requirements indicated that both a Web-based software solution and an IP PoE Access Control solution were required" “SOMC project requirements indicated that both a Web-based software solution and an IP PoE Access Control solution were required,” said Jim Andrews, president of SecuriCo, Inc. “After Dennis and I reviewed the project requirements and discussed the design options with AccuTech and Microman, everyone agreed that the SecurusWeb software solution with a pre-configured HID EdgeReader and iCLASS 2K (37-bit) smart cards were the perfect fit for the hospital’s unique access control needs.” According to Ward, “As I conducted product research in the security information space, I noted that most available solutions were based on HID technology. This was important since the hospital was growing, and our security needs would grow, too. HID Global has a great industry reputation so it was a natural and easy decision to select the company’s solutions and OEM partner, SecuriCo, Inc.” Installing WALLaroo Wall Stations and HID EdgeReader Since Ward had never implemented a project like this before, he obtained samples of one of the WALLaroo wall stations, a HID EdgeReader and evaluation software from SecuriCo. Using the samples, he created a prototype that would fit all his access control needs and serve SOMC in the best possible way. Installed by Microman, these pre-programmed wall units have the SOMC specifications that Ward devised. While physical access control is delivered through the HID EdgeReader and iCLASS cards, the control of the hardware is provided through SecuriCo’s Securus Web software. The software controls which individuals are granted access to each station based upon a preset access level, which includes the day and time access is allowed. In addition, the application also records how access is added and removed. This innovative solution also enables pharmacy technicians to deliver barcoded, 24-hour scheduled, non-narcotic medications to the secured wall mounted stations. Using their authorized HID iCLASS cards, the nursing staff is then able to access and administer the medication. SecurusWeb and HID Global’s Edge IP Access Solutions SecurusWeb and HID Global’s Edge IP access solutions can make it easier to meet the unique and demanding needs of healthcare applications, as experienced by SOMC Thinking outside the box and using innovative products like SecurusWeb and HID Global’s Edge IP access solutions can make it easier to meet the unique and demanding needs of healthcare applications, as experienced by SOMC. Accuracy for patient medication dispensing has improved significantly thanks to the new solution. Workflow is also more efficient because the amount of time it previously took nurses to go to the medication room and retrieve new medications has been significantly reduced. Additionally, medication is secure and located where the staff expects it to be, while eliminating the need for medication carts, making the hospital hallways accessible and less cluttered. With the original installation of 73 of HID’s EdgeReaders being such a great success, SOMC ordered and installed an additional102 EdgeReaders in the hospital’s new North Tower, including 12 on the first floor Heart Care Unit (HCU), 30 on the second floor in the Surgical-Vascular Care Unit (SVCU), 30 on the third floor in the Medical-Surgical Care Unit (MSCU), and 30 more that are located on the fourth floor in the Progressive Care Unit (PCU).
The Lagoon Amusement Park in Farmington, Utah, likes things fast, too. For more than 100 years, it has offered exhilarating thrill rides as part of its entertainment package. The park’s Fire Dragon Double-Loop Rollercoaster hits speeds of 90 kilometers per hour, and its Lagoon-A-Beach Waterpark promises 550,000 gallons of liquid fun. Identification Cards Like many other parks, Lagoon provides identification cards to its employees and offers season passes (called Season Passports) with identification cards to its guests. But the equipment formerly used to print the cards was not keeping up with the pace of the park. “As the public demand for Season Passports increased, it was becoming more difficult to keep up with the desired pace,” said Nic Young, ticketing manager. “We used to take Polaroid pictures and laminate them onto pre-printed cards but matching the pictures with the cards was tricky. It was easy to put the wrong picture on someone’s card.”Lagoon now is able to satisfy the needs of its employees and guests with the updated card printing technology The multi-step process also was slow and cumbersome – not a minor concern with 2,500 employee ID badges and more than 30,000 season passes issued every year. Lagoon now is able to satisfy the needs of its employees and guests with the updated card printing technology, bringing the park back to its desired speed. ID badges And Card-printing Technology “These printers are extremely fast,” said Young, “which is especially important during our busy months of May and June. I also like the one-step printing process and the fact that the printers are easy to maintain and keep clean.” The Employee Services department uses colored ribbons when printing employee ID cards, identifying employees 15 years of age or younger by printing those names in red on the employee’s card. The Ticketing department uses standard black ribbons for its season passes. With five computer stations in the Season Passport photo area, ticketers can issue passes to large groups of people at the same time. Barcode Technology Both employee and Season Passport ID cards use barcode technologyBoth employee and Season Passport ID cards use barcode technology. For employees, the barcodes specify the level of park access and also bring up full-sized pictures of the employees to be viewed by Lagoon security. For Season Passport holders, barcodes record when a passport has been used or restrict passport usage on specified dates (such as during Lagoon’s July Fun Pass). Now that the Lagoon Amusement Park has established its current system, computer stations at the gates can track Season Passport access information and provide valuable marketing information. “We’re trying to increase our per person usage through promotions such as our Season Passport Holder coupon books,” Young said. “Our ID card system allows us to record our progress.” The bottom line, however, is speed. “There are no more long lines,” Young said. “We’re able to operate at full capacity all day long, allowing our guests to get their Season Passports quickly and proceed directly to the fun.”
Round table discussion
Ensuring privacy is often a concern for video surveillance systems, especially in situations where a system intended for “public” surveillance could somehow, perhaps inadvertently, view private areas or situations. The classic example is an apartment building whose windows are within the range of a video surveillance camera. How can you provide video surveillance without invading the privacy of the apartment dwellers? Integrators and end users often turn to technology for a solution. We asked this week’s Expert Panel Round Table: How can smart camera features (such as privacy masking and programmable pan-tilt-zoom) address concerns about privacy?
Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-world solutions that can prevent terrorist attacks? We presented the question to this week’s Expert Panel Roundtable, and received a variety of interesting responses. Specifically, we asked: How is the recent rise in terrorism impacting the physical security market (e.g., higher demand, different mix of products, etc.)? How should the physical security market respond? What solutions are needed?