Human identification system
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per...
Iris ID, a global provider of iris recognition technology, announced its iCAM 7S series has been certified by the Bureau of Indian Standards (BIS) under license number R-41110639, the national standards-setting body for India. The recently mandatory BIS certification attests to the safety, quality and reliability of electronic, medical, construction and other many other commercial and consumer products. The iCAM 7S series and other company products are extensively used by India’s Unique I...
Evolis, global provider of personalization systems for plastic cards, announced the creation of a subsidiary in Tokyo under the name of Evolis Japan. Evolis Japan Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support. Since 2008, Evolis has been present in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group’s business developm...
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's p...
Plasco ID, global integrator of identification solutions, announces it has hired Jeff Bill as its Chief Operating Officer. Bringing a valuable combination of industry experience and proven results, he will focus on business operations and strategic initiatives. Physical Card Access Control A veteran in visual and physical card access control, Jeff formerly held the position of President at Bristol ID, global technology card business; prior, he served as General Manager for Brady’s Peopl...
BriefCam, the provider of Video Synopsis and Deep Learning solutions, announced that it will demonstrate the BriefCam v5.2.1 video content analytics platform at the Global Security Exchange (GSX) Security Conference & Expo in Las Vegas. BriefCam’s Integration Technology BriefCam’s breakthrough technology detects, tracks, extracts and identifies people and objects from video, including; men, women, children, clothing, bags, vehicles, animals, size, color, speed, path, direction,...
Rhombus Systems, an enterprise video security startup, is redefining video security for businesses around the world with their AI-powered security camera – the Rhombus R1. This next-generation security camera has the ability to learn and alert users to an unidentified person, making threat detection faster than ever before. Rhombus’s video security system continuously analyses video to help organizations better secure their physical spaces. Today the company announced a $3 million seed round led by Lemnos Labs, with participation from Promus Ventures and Portfolia, to help accelerate its growth and transform video security. With Rhombus, users have the power to trust or flag certain faces giving it the ability to pre-emptively detect potential threatsRhombus Systems is a major advancement to outdated CCTV systems that encounter a wide range of problems, such as bulky hardware, difficult installations, complicated servers, outdated network video recorders (NVRs) and the risk of becoming compromised. The R1 solves these issues and can even examine its environment, people, objects and motion to improve its overall performance. Pre-emptive Detection Of Potential Threats “Traditional business video security is outdated,” said Garrett Larsson, Rhombus Systems Co-founder and CEO. “By combining AI and computer vision, we are able to offer a video security system unlike any other. Modern businesses and organizations want better technology, and our system symbolises the first step, and our commitment, in providing next-generation solutions to better understand and protect our spaces.” With Rhombus, users have the power to trust or flag certain faces giving it the ability to pre-emptively detect potential threats. For example, if the cameras identify an individual or object that is prohibited from a school campus or business, the system can provide their location and alert the appropriate personnel with real-time notifications, all without having to monitor a video feed. The system can also count and record the number of unique people, measure foot traffic, and pull quantitative data to help businesses understand how their space is being utilised. Cloud-managed Secure Access System Rhombus is entirely cloud managed, allowing users to securely access their system from any computer or mobile device“We previously managed a system that couldn’t scale with our growth,” said Arik Levy, CEO of Luxer One which makes package delivery smart lockers. “They seem to have really taken their time in solving the problems that exist with traditional systems. The productivity and features we’ve gained was like a breath of fresh air.” The Rhombus R1 cameras are plug-and-play – meaning they can be setup, taken down, and moved in a matter of minutes providing unique flexibility and scalability. Rhombus is entirely cloud managed, allowing users to securely access their system from any computer or mobile device. End-to-end encryption and automatic firmware updates come standard to ensure the system itself is secure. Seamless IT integrations, such as single sign-on (SSO), Office 365, and Slack are included to make managing the system and user-experience effortless. Rhombus’s $3 million seed round will allow them to execute its vision in replacing outdated video security systems to better protect organizations, as well as accelerate its growth into different sectors, and recruit more talent for sales and marketing.
Exabeam, next-gen security information and event management company, and Okta, global provider of identity solutions for the enterprise, have partnered to deliver a robust identity security solution that enables organizations to detect, investigate and respond to credential-based attacks in real time. By joining the Okta Integration Network, Exabeam benefits from Okta’s identity platform, helping security teams to proactively detect and respond to user-based threats before they become critical. Countering Credentials Thefts and Data Breaches According to the 2018 Verizon Data Breach Investigations Report, stolen credentials continue to top the list of causes for data breaches. Many organizations still focus on securing their network perimeter instead of how they secure their extended enterprises. By adopting a Zero Trust security model, organizations can better position themselves to respond to credential-based attacks by shifting their focus from protecting legacy single, large perimeters to protecting every user and device within the organization. The joint Exabeam and Okta solution will help security teams to monitor and protect enterprises against credential-based threats. Exabeam Security Intelligence Platform (SIP) ingests user authentication events and rich identity context via API integration. Exabeam then analyses that information and adds meaningful context to enable the detection of suspicious login activities. Security teams can then take immediate action via fully or partially automated playbooks that require suspicious users to verify their identity via step-up authentication, or that enforce containment actions, such as disabling the user’s account, reducing the user’s access or denying authentication attempts. Exabeam - Okta Security Integration Whether it’s a malicious or compromised insider, credential-based threats are tricky to identify" “Whether it’s a malicious or compromised insider, credential-based threats are tricky to identify,” said Ted Plumis, vice president of Worldwide Channels at Exabeam. “We are excited to partner with Okta to deliver a sophisticated, orchestrated security solution that will provide customers with visibility and additional context—empowering analysts to identify and remediate compromised user accounts in real time.” “In today’s threat environment, security is at the forefront of every organization’s mind, no matter what industry they are in, and the more intelligence that is available to them, the better decisions they can make to keep their users and data safe,” said Chuck Fontana, vice president of Integrations and Strategic Partnerships, Okta. “We’re excited to be working hand-in-hand with Exabeam to unite Okta's rich identity insights and user remediation with Exabeam's exceptional user and entity behavior analytics capabilities to help close the security loop against sophisticated threats.” Unified Security Management System The joint solution provides a complete view of security events across an organization, contextualised with user identity information, in a unified security management system that detects suspicious from normal behavior, surfaces real alerts instantly with clarifying contextual data, and initiates automated remediation measures where appropriate.
Allegion US, global provider of security products and solutions, announced the latest version of the Keri Systems’ software now supports Schlage locks in no-tour mode. Schlage Locks The supported locks, which include Schlage Control, NDE and LE, are ideal for multi-family property managers looking to retrofit their existing properties with electronic access control on individual apartment spaces. This provides more security, eliminates unnecessary expenses around managing traditional keys and offers an enhanced tenant experience with ID card or phone access. These are also excellent options to consider for common areas within the building such as meeting rooms, recreational areas and laundry rooms. “Allegion strives to offer solutions that keep people safe and give businesses peace of mind,” said Robert Gaulden, Allegion project-based business leader, electronic access control. “Schlage offers a complete multifamily solution and having Keri Systems come on board with their easy-to-use software is a win for us and our customers.” Keri’s Intuitive Software Keri’s intuitive software is a choice solution for companies looking to enhance their security on a platform that requires minimal training This new capability of the Keri software makes it an ideal solution for managing all aspects of a multi-family property, from exterior doors and parking gates to resident doors and common areas. Keri’s intuitive software is a choice solution for companies looking to enhance their security on a platform that requires minimal training. “With the added no-tour capabilities, we now offer the ability to manage Schlage locks in RS-485, Gateway and Wi-Fi Direct modes,” said Vince Deiuliis, director of marketing and national accounts for Keri. “We pride ourselves on being able to show our dedicated support to this powerful and flexible locking solution.”
ACRE, global integrated technology solutions and services provider announced that CEO Joe Grillo has been named as a 2018 IFSEC Global Security & Fire Influencer in the Security Tech Leaders category for his ability to drive technological innovation and elevate the industry globally. 2018 IFSEC Global Security & Fire Influencer The list of influencers, which is selected by a panel of highly respected judges, seeks to recognize fire and security professionals who are influential in improving regulation, standards/guidance or best practice; driving the success of the organization they lead or are employed by; or being a prominent, persuasive voice in the media. Grillo has been a regular on the list over the last several years for his efforts to elevate ACRE and its brands within the industry and beyond. For more than 30 years, Grillo has been actively involved in the electronic security and identification industries, where he's been successful in growing, acquiring and restructuring businesses. He is well known for being a founder of HID, as well as its Vice President of Sales and Marketing, COO and President, where he led the company’s growth for its sale to Assa Abloy, where he eventually ran the $700M Global Technologies Division. Grillo founded ACRE in 2012 and has steered the company through several acquisitions in the electronic security industry with a primary focus on access control. This past year, ACRE sold Mercury Security to HID Global, further solidifying his role in the consolidation of the market. Electronic Security and Identification Expert “Throughout my career, I've had the privilege of working alongside executives who share the same vision for sales growth fueled by innovation and the goal to expand the security industry into the mainstream,” Grillo said. “The IFSEC Global influencer recognition is an honor that I share with these individuals.” ACRE's brands Vanderbilt and ComNet will participate in IFSEC International June 19-21, at ExCeL London, at Stands F305 and E420, respectively.
Robotic Assistance Devices, Inc. (RAD), an innovator in the delivery of artificial intelligence-based solutions that empower organizations to gain new insight, announced it has released its latest version of the Security Control and Observation Tower (SCOT): Wally, a wall-mounted security solution that harnesses the power of AI to enhance an organization's situational awareness, communication abilities and control. SCOT Wally provides organizations with 110 degrees of visibility and takes full advantage of the RAD Software Suite, which is a collection of integrated software applications hosted in Microsoft’s Azure Cloud services that allows immediate and mobile access to alerts and controls generated by SCOT. Scaled security applications Priced at two-thirds less than the original SCOT tower, SCOT Wally can be used in lobbies, parking structures, corporate campuses or exterior areas. “SCOT Wally builds on the success of our original SCOT solution, providing a wall-mounted version for organizations looking to scale their security teams in a way that is good for the bottom line,” said Steve Reinharz, President and CEO, RAD. “This unique security solution can be paired with other original SCOT deployments or be used on its own.” Long-Range Human Detection Analytics SCOT solutions, including SCOT Wally, are equipped with AI-centric technology that powers human detection analytics, featuring long-range detection at low false-alarm rates. SCOT Wally will be demonstrated for the first time at the upcoming BOMA 2018 International Conference and Expo for the commercial real estate market, June 23-26, in San Antonio, Texas, alongside its partners at Allied Universal (Booth #704).
Iris ID, a premier provider of iris recognition technology, announced its iCAM R100 face and iris cameras will be integrated into Mentalix, Inc.’s Fed Submit suite of live scan solutions. Fed Submit, currently employed by civilian and law enforcement agencies across the county, provides users with intuitive, multi-modal booking and background check systems. Mentalix, headquartered in Dallas, is an industry leader in FBI-certified identification software. Iris ID’s IrisAccess iCAM R100 cameras will now be made available with Mentalix Fed Submit live scan stations, operating alongside standard fingerprint scanners so iris information may be shared with the FBI as part of its NGI (Next Generation Identification) program. With Fed Submit it’s possible for agencies to access the FBI’s iris database, as well as create and grow their own local iris archive. Accurately Capture Iris Data Dale Remmers, the chief technology officer of Mentalix, said the Iris ID technology was selected for its speed and accuracy in capturing iris data. He reported that jail officials can often acquire, submit and receive an FBI response to an iris query before a suspect’s booking procedure is completed. “They can know within a few minutes if the suspect arrested for public intoxication has any felony warrants in other states,” Remmers said. “We’re excited to be able to offer our law enforcement customers the Iris ID technology as an additional modality within our Fed Submit product.” The iris solution is contactless, unlike fingerprint pads which need to be wiped clean after each use R100 Iris Recognition Technology The R100 iris recognition technology can obtain a valid identity scan from virtually any suspect. While fingerprints can be altered intentionally or worn down by jobs in industries such as agriculture, construction and manufacturing, iris patterns remain unchanged through a person’s life. The iris solution is also contactless, unlike fingerprint pads which need to be wiped clean after each use. Remmers said law enforcement clients may also use the iris scan feature of the Mentalix Fed Submit system to authenticate the identity of suspects being released from jail. Iris ID Authentication Mohammed Murad, vice president global sales and business development, Iris ID, said the Mentalix partnership is another example of how Iris ID’s technology is being used to assist law enforcement officials. “Our iCAM R100 cameras add a valuable dimension to the Fed Submit kiosks” he said. “The Mentalix solution will make it easier – and faster – for local officials to know who is being booked and released from their facilities.” Iris ID technology is also being used by governments around the world for authentication at border crossings, national ID and voter registration efforts and by corporations large and small for access control and time and attendance applications.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organization's security, while enhancing user convenience.Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics Challenges For Biometric Authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal among older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realize the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimizing performance through a combination of new technology and algorithms, while ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimizing Capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data.The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness Detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimizes performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimizes performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted Performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template Matching Modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical Access Control Integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy Considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
The Food Standards Agency (FSA) in the UK has begun investigations into meat wholesalers after a raise in concern for food hygiene. This investigation has impacted businesses such as Wetherspoons, as well as schools and care homes up and down the country. Consumers are beginning to lose trust in businesses that are supplied by untrustworthy production companies and it seems to be becoming more common, if we are to look back to the horse meat scandal in 2013. But what are the benefits of having security systems within these types of production facilities? From ensuring consumer confidence, to maintaining quality control within products, what does it achieve? Finally, what crime exists surrounding the industry and how can the implementation of protective systems boost satisfaction? Instant Barriers For Unwanted People The world is becoming more advanced and revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices — whether this is protecting people from a physical threat or a threat that is much more devious within our foods. Food factories should start with access control systems. This will put an instant barrier between operations and any entry attempts by unauthorized personnel. Whether this a swiped identification card, biometrics or a passcode way of entry, only authorized personnel will be granted access. Revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices Another security system that could be put in place to help food factories and encourage them to work more efficiently is CCTV. By spring 2018, all slaughterhouses within England are required to have CCTV systems in place that can be reviewed by the FSA who have unprecedented access to footage within a 90-day period — is this something we should be looking to do in food factories to ensure safety for the British people? CCTV is a worthwhile investment for production companies who want to gain visibility of their entire operation and gain the respect from consumers across the country. The Benefits For CCTV Customer reassurance — as food factories don’t operate openly and everything is hidden away, this instantly creates suspicion from a consumer’s perspective as they will be the ones buying the final product once distributed to stores around the country. CCTV will counter this issue as it shows that operation centers have nothing to hide — giving them the ability to publish any footage if accused of misconduct. Maintaining quality — using more advanced CCTV within food factories will enable production companies to monitor the production line and maintain the standards that they sell themselves on. Sometimes, a human error is unavoidable on a production line after several hours of non-stop work — being able to detect it instantly is essential. Criminal Activity Across Food Factories 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. It has been proven that CCTV can deter criminals. By installing these systems, food factories can protect themselves from threats that are external and internal as well as being able to support themselves in any claims of violation. Although produced goods have been at the center of news stories regarding the integrity and containments of what is being delivered, another common crime within this industry is fraud. 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. Common Perpetrators In Fraud When it comes to the most common types of fraud, information theft stood at 30%, compliance breach at 30% and intellectual property theft standing at 26% of the respondents who were asked — all of which could cause great impacts to production lines. It was also found that those who had recently started working for the company, such as junior employees, were the most common preparators when it came to fraud within a manufacturing factory (39%). Temporary manufacturing workers came in at second place with 37%, while those in senior or middle management positions were at 33% — the same as ex-staff members. However, vendors/suppliers who do not have as much access to your business accounted for 33% too. This clarifies that anyone has the potential to commit a crime within a factory. To ensure protection for the British consumer, food production factories should seriously consider implementing similar systems to UK slaughterhouses. This article was contributed by IP security provider 2020Vision.
This time last year, we predicted 2017 would be the year digital identities began transforming trusted access and other interactions in physical and online environments. Continuous Authentication Experience Demand grew for unified identity and access management systems supporting both cards and cellphone devices. Trusted identities began bridging the gap between connected workers and smart buildings. We saw new IoT use cases that employ location services technologies to create a continuous authentication experience that is invisible to the user. There was growing emphasis on combining on-premises solutions and the cloud to create identity-aware environments. Trusted identities were embedded more deeply in everyday activities, and biometrics improved the user experience. The strengthening economy in 2017 was reflected through growing interest in our product offerings – both through R&D and strategic acquisitions. High-profile breaches continued to expose our customers’ infrastructure vulnerabilities and their need to upgrade from older technologies to our latest solutions. Increased IoT adoption provided new reasons to invest in trusted identity solutions that improve security while creating a better user experience.Cloud-based platforms simplify upgrades while improving identity solutions scalability and deliverability The Cloud, Analytics and AI Capabilities Looking ahead to 2018, we anticipate a more people-centric view of security for today’s more dynamic workforce. There also is the growing need to secure IoT end-devices with digital certificates that add trust to everything, from printers for remotely provisioning employee ID cards, to asset-tracking systems that predict and pre-empt equipment failures while optimising supply-chain efficiency. Cloud-based platforms will simplify upgrades while improving how identity solutions are delivered and scaled. They will also drive more advanced data analytics that will lead to an array of artificial intelligence capabilities in connected, more intelligent environments. Escalating security threats will reinforce the need to combat identity and data theft while protecting privacy, and there will be an increased focus on complying with Europe’s General Data Protection Regulation (GDPR). The Year To Come 2017 was a successful year for HID Global as we served growing demand for our award-winning products that power the trusted identities of people, places and things. Digitization, connectivity and cloud adoption trends will drive new recurring revenue opportunities through 2018 and beyond, and we will work with our partners to help organizations create trusted environments where employees, customers, contractors and visitors can securely interact with their workplace in new, more convenient and appealing ways.
The Middle East security market provides a healthy opportunity for manufacturers who can capitalize on the region’s key verticals. Intersec’s 20th edition show focused more on solutions than on products, including solutions for the growing retail sector and an infrastructure market requiring ruggedized equipment to stand up to harsh environments. Intersec hosted security, safety and fire protection exhibitors from over fifty countries at Dubai’s spacious International Convention and Exhibition Centre on January 21 - 23. For the security market, the show was an opportunity to demonstrate how the industry’s latest technologies can benefit end-users in the UAE and globally. While the show hosted many impressively-sized stands from key security players, these tended to reflect the ongoing shift from a product-centric market to a focus on customer problems and solutions. Rather than filling the floorspace with an abundance of products, many brands chose to showcase how their flagship solutions could function in real-world applications. Retail Surveillance Delivers ROI Numerous companies opted to highlight their retail solutions – a key vertical for Dubai, which is known for its elaborate city shopping hubs. The Axis Communications stand allowed visitors to experience its network video offerings for the retail sector, including integrations with Electronic Article Surveillance (EAS) and Point of Sale (POS) technologies. Solutions on show reflected how security systems are increasingly expected to provide a tangible return on investment: With options for queue management and people counting, Axis video technology can be used to provide business intelligence and improve the customer experience, as well as enhancing safety. IP video manufacturer Vivotek also showcased its latest retail offering, including fisheye cameras with built-in crowd detection and heatmap technology, which can help retail managers analyze customer traffic patterns and highly frequented areas. The panoramic nature of Vivotek’s IP cameras makes them ideal for collecting comprehensive data from retail stores. MOBOTIX CEO Thomas Lausten demonstrates how the company’s dual modular camera delivers high-quality images in extreme weather conditions IP Video In Extreme Conditions The MOBOTIX stand was also less product-driven than at past shows. Instead, the focus was on how the manufacturer combines intelligent IoT technology and robust materials to address real end-user needs. CEO Thomas Lausten, who joined the company in June 2017, was on-hand to demonstrate how the company’s dual modular camera continues to deliver high-quality images in extreme weather conditions including ice, rain and sand. Rugged solutions were a big theme across the show floor. This is unsurprising given Intersec’s location in Dubai – the Middle East provides ample opportunity for the security market to capitalise on large outdoor projects, including the oil and gas industry. Video surveillance manufacturer Videotec showcased its latest HD PTZ cameras built to withstand harsh outdoor environments. The stand hosted an immersive ‘Experience Center’, where the company’s flagship PTZ cameras moved in sync to a rolling video, demonstrating their use in vertical markets including oil and gas, marine surveillance, and critical infrastructure. Video surveillance manufacturer Videotec showcased its latest HD PTZ cameras built to withstand harsh outdoor environments MENA Security Market Requirements Storage provider Promise Technology showcased its latest portfolio of surveillance solutions, including a cloud-based infrastructure optimised for growing IP video requirements. The manufacturer also introduced its new Vess A700 network video recorder series. This latest NVR offering specifically targets medium- to large-scale applications such as banking and industry. Such a solution is ideal for the growing Dubai market, where strict legislation requires a video retention time of 180 days. Intersec is set to return to Dubai from 20th - 22nd January 2019. Organisers expect over 1,300 exhibitors from across to globe to come together for a bigger, wider ranging and more innovative show.
Amazon Go is a new idea in retailing, now being tested at a store in Seattle, that eliminates the need for customers to go through a checkout line. The so-called “just walk out” experience depends on “the world’s most advanced shopping technology.” Customers simply enter a retail store, choose the goods they want, and leave. The checkout process is automated: The selected goods are charged to the customer’s account automatically. Solving Shoplifting Most of the information I have read about the system emphasizes its benefits in terms of customer convenience. However, another huge benefit would be to essentially “solve” the problem of shoplifting. Anyone – criminal or not – who enters the store, takes items and leaves will be charged for the goods. Shoplifting has been a huge and intractable cost for retailers for decades. Solving it is no small feat, and the potential money savings could help to pay for wider use of Amazon Go technology. After all, the high costs of the system are cited as one obstacle to wider implementation. Amazon Go Smart Phone App The Amazon Go system involves a smart phone app that identifies the customer as he or she walks into the store (presumably through a turnstile). In addition, there are computerized systems in place that automatically identify which customers pick up which items from the store shelves, and keep a running, real-time tally of who buys what. No need for check-out lines; it’s all automatic. Customers only need an Amazon account, a supported smartphone, and the free Amazon Go app. There are computerized systems in place that automatically identify which customers pick up which items from the store shelves, and keep a running, real-time tally Currently, the first Amazon Go store is being tested in Seattle; Amazon employees are using the store now in a Beta program, and it will be opened to the public in 2017. Goods include ready-to-eat food items, as well as grocery essentials ranging from bread and milk to artisan cheeses and locally made chocolates. Future Of Amazon Go How fast might the technology become more widespread? The Wall Street Journal earlier reported that Amazon envisioned opening more than 2,000 physical stores in the United States, although the company denies the report, perhaps in the interest of lowering expectations. Amazon describes the technologies involved as “computer vision, deep learning algorithms and sensor fusion.” Suffice it to say the 1,800-square-foot store relies on cameras and microphones, as well as infrared, pressure and load sensors on the store shelves. Surveillance cameras track customers through the store, as does computerized analysis of the sounds they make as they move about. In effect, the store has a continuous awareness of where everything and everyone are at any moment, and movements are analyzed to determine what items are being purchased. The system also relies heavily on Amazon’s cloud computing service. Eliminating Retail Shrinkage Shoplifting accounts for some 38 percent of shrinkage in the retail community. It appears Amazon Go would eliminate most, if not all, of those losses, which could contribute substantially to any return-on-investment evaluation when deciding whether to expand the concept to a wider audience. Customers would likely also be willing to pay a premium for the convenience of not waiting in line, and automated processes tend to lower labor costs. The retail market depends on physical security technologies to fight shoplifting, and is also embracing a variety of those technologies, especially video surveillance, to boost the level of customer service. Amazon Go is a showcase for how far technologies have come, and it also suggests other ways innovation could be used in the physical security market and beyond. By automating the checkout process, while also eliminating shoplifting and adding customer convenience, the concept of Amazon Go might just be a winner. That is, assuming customers wouldn’t rather just shop online and have goods delivered.
The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a way of preserving “privacy.” The clothing, covered with ghostly face-like designs to specifically trigger face-detection algorithms, are a backlash against the looming possibility of facial recognition being used in retail environments and for other commercial purposes. Increasingly Common Facial Recognition Technology It’s another possible obstacle to the use of a technology that has faced many challenges already. Successful implementations of facial recognition technology have been elusive over the years, especially when it comes to identifying “faces in a crowd.” Variables such as partial obstructions, movement, lighting, etc., have been a challenge to the algorithms tasked with identifying faces. Most successful face recognition systems have been those that have controlled the positioning of each face in order to maximize recognition. People walking single-file through a door, for example, provide faces one by one to make them easier to recognize. Despite the challenges, face recognition technology is becoming more common. The ability to recognizes faces (and identities) is central to new marketing technologies such as automated customer service or signage that targets an individual’s buying habits. For example, face recognition is an element in Amazon Go’s recently announced automated convenience store concept. In the online world, many ofus are willing to give up alevel of privacy if we perceivea benefit tradeoff. But whatabout the physical world? Infringement On Privacy? Clothing or other textiles with face-like patterns are being positioned as a way for consumers to fight back against any perceived invasions of privacy. Berlin-based artist and technologist Adam Harvey is designing the clothing to confuse face recognition software algorithms. In effect, the clothing “overloads an algorithm with what it wants, oversaturating an area with faces to divert the gaze of the computer vision algorithm,” Harvey told a recent hacking conference in Hamburg. One pattern would reportedly give a computer more than 1,200 possible facial detections. Concerns about face recognition algorithms extend beyond the ability to identify a person. Algorithms can also identify traits such as “calm” or “kind,” or demographics such as age and gender. Using such small bits of data to drive marketing efforts is problematic for many. Harvey points to the capabilities as another way that facial recognition is changing our expectations of privacy – and even more reason to fight back. Harvey’s Other Anti-Surveillance Work It’s not the first time Harvey has been involved in trying to foil facial recognition systems; he previously proposed using makeup and hairstyling to prevent machines from detecting a face. There are also some “anti-drone stealth wear” fashions on the market, made of silver-plated fabric that reflects thermal radiation to enable the wearer to avert overhead thermal surveillance. Privacy is an ongoing concern in the physical security and video surveillance market, and public opinion is evolving. In the online world, many of us are willing to give up a level of privacy if we perceive a benefit tradeoff. But what about the physical world? Face detection technology is a common feature of today’s video surveillance cameras, and facial recognition algorithms are becoming more sophisticated. Questions of privacy in the physical world have not yet evolved, and it’s unclear what benefits (if any) there are for consumers to allow machines to invade their privacy. Until those benefits become apparent, it’s not surprising there would be backlash. However, anti-surveillance clothing would have to really catch on to make any real difference, wouldn’t it?
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organizations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric High-Throughput System The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility Entry Control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless Iris Authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
People and vehicle access control specialist Nortech has recently seen St James’ Market in central London update and improve access to its site using Nedap’s uPASS Target system. Supplied by Nortech, Nedap’s uPASS Target was installed by leading supplier of integrated security systems Total Support Services (Security) Ltd, which was selected to supply the robust solution for long-range identification to its recently installed security gates at the market. Total Support Services (Security) Ltd, TSS, which designs and engineers its own brand of security products and equipment, was able to use its 26 years of experience in specialized security products and services to provide the ideal security and access system that fitted the client’s needs. TSS selected the uPASS Target as it is easy to integrate with any existing access control system so users don’t need to get out of their vehicles to get into the development. Reliable And Easy To Install System Guy Bulmer, Director at Total Security Services commented, “We use Nortech as they are our ‘go-to’ provider for access control and vehicle identification systems. We have had a great relationship with them for nearly 20 years, ever since we were asked to install a Norpass system for some clients, and it just went from there.” The uPASS Target is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots He continued, “We certainly recommend Nortech products to others and we are very happy with the end result achieved for the client. We have our core products that we use because they are easy to install and they just work. Any issues are dealt with in a helpful and friendly way by the tech guys and we always get a reliable system at the end of it.” Ideal For Access Control And Monitoring Activities The uPASS Target is a robust solution for long-range identification of vehicles, people and rolling stock. It is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots. Its plug-and-play features enable it to be installed in just a few simple steps, and its variety of industry-standard communication interfaces support seamless integration into any existing or new third-party systems for access control, logistic operations, security and parking. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Dayton Public Schools (DPS) covers about 53 square miles in Dayton, Ohio. The school system is comprised of 30 school buildings and special centers with approximately 15,000 students in pre-kindergarten through high school. An urban district, DPS brings innovative students and teachers together to develop productive citizens ready to serve their communities. Core to achieving their mission is ensuring first, that students arrive at their school and at their classes, on time and ready to learn. DPS had a wide variety of, and in some cases a lack of, ID system capabilities throughout the district. This made it difficult to implement standard process improvements that would speed the creation of new IDs at the beginning of each school year. Additionally, DPS needed to expedite the check-in of tardy students thus allowing them to arrive at their classes faster. For managing tardy students, the schools traditionally used manual processes with handwritten passes which were inefficient and caused unnecessary delays if multiple students came to school late. Seeking to streamline processes, the school district realised that it needed to institute a universal, mandatory student ID system that allowed them to improve student attendance across the district while enhancing the security of its students and visitors. PlascoID Card-based Management System PlascoID showed DPS HID’s FARGO desktop card printers and their automated student management system, PlascoTrac, as a possible solution to the challenges the school system was facing While attending the Ohio eTech conference in early 2011, DPS learned about PlascoID, an authorized HID Global FARGO integrator and global provider of card-based ID systems. PlascoID showed DPS HID’s FARGO desktop card printers and their automated student management system, PlascoTrac, as a possible solution to the challenges the school system was facing. Because the printers and software integrated seamlessly with eSchoolPlus, the school system’s existing Web-based student-information system, DPS selected PlascoID to help streamline its attendance processes. Genuine HID products including the DTC4500 card printer/encoder, non-technology cards and Asure ID Enterprise card personalisation software were recommended by PlascoID to support the creation of efficient, multipurpose IDs. HID Global’s Asure ID software would enable the school system to create customized student ID cards while the DTC4500 printers would allow campus officials at each school location to instantly issue all student IDs. The printer’s modular design and small footprint were also ideal features for the school environment where space is at a premium. Asure ID Enterprise Software Prior to the start of the 2012 school year DPS implemented the solution over the course of just two weeks, installing the PlascoTrac system with 31 DTC4500 printers and Asure ID Enterprise software so it could be used on the first day of the new academic year. With the new DTC4500 printers and Asure ID software, DPS can now: Print a high volume of cards at fast print speeds: Every year, 15,000 IDs are needed by DPS in just the first week of school. The DTC4500 meets this challenge by quickly and reliably producing large quantities of cards with high-quality images. Able to withstand the day-to-day wear and tear by students these new IDs are now also uniform in image quality, design and durability. Save money and training time: The modestly priced DTC4500 has an intuitive set up and is easy to use. Already optimized for organizations like DPS, the printer is a high-security, high-performance ID issuance system that doesn’t require large capital investments or extensive training by system operators. Prepare for future ID card needs: The DTC4500 is field upgradeable. As their student ID system changes and evolves, DPS can modify their printers to fit new requirements. Achieve multiple uses with a single software application: With Asure ID Enterprise software, DPS is able to easily design card templates, enter student data and create photo ID badges. Additionally, Asure ID’s LiveLink capability enables the schools to sync student ID badge data with attendance data in PlascoTrac, and with student records in eSchoolPLUS. PlascoTrac Card ID System The newly designed DPS student ID is a white card featuring the district’s logo and mission statement With this combined solution from PlascoID and HID Global, DPS can now easily and quickly provide all students with IDs during the first week of the new school year. And when a student loses his or her badge, or is newly enrolled in school, a new ID can be created and issued that same day. The newly designed DPS student ID is a white card featuring the district’s logo and mission statement. New visual security elements include a large color photo of the student and his/her name printed in large font on the front of the card, so school personnel can easily identify individuals. Additionally, the ID now includes a barcode that is used in conjunction with the PlascoTrac system. So, when a student arrives late to school or is tardy to a class, they are scanned into PlascoTrac and a tardy pass is printed automatically. HID's Plasco ID Cards With this brand-new student ID system, processing tardy students now takes 25 to 35 percent less time than before, enabling DPS students to spend more time in class while reducing the administrative burden of its staff. Some schools have even tied the new ID cards to their media center In addition to addressing their original challenges, DPS has now found that the new HID and Plasco ID card solution gives them even greater functionality and versatility. Some schools have even tied the new ID cards to their media center for checking out books or documenting lunches purchased in the cafeteria. Elementary schools are even exploring ways to use the IDs to encourage positive reinforcement of good behaviors. HID Global Card Issuance/PlascoTrac Solution “We are extremely satisfied with how adaptable the solution is on a per-school basis,” said Richard Melson, director of The Office of Information Technology at Dayton Public Schools. “Initially the principals had one vision of how things were going to work and now that they have the technology in their possession, they each use it a little differently based on specific needs of their school.” In the near future, DPS expects to expand its use of the HID Global card issuance/PlascoTrac solution to keep track of visitors. Currently the district provides printed temporary ID passes, but it plans to eventually incorporate scanning of government IDs, such as a driver’s license, before granting visitors entry.
Safety is at the forefront of hospitals across the nation. According to a landmark report To Err is Human (2000) by The Institute of Medicine (IOM), between 44,000 and 98,000 patients die a year in the U.S. due to preventable medical errors including wrongful administration of medication. Beyond the cost of human life, these errors cost the healthcare industry as much as $29 million per year. This figure takes into account the expenses associated with additional care, loss of income and disability so as to reduce medication administration errors, hospitals are modifying their current medical dispensing systems in operation to prevent and eliminate these errors. Based in Portsmouth, Ohio, Southern Ohio Medical Center (SOMC) is one such hospital that is addressing this concern. A 222-bed hospital that provides emergency and surgical care, as well as a wide range of other health-care services, SOMC employs 2,200 full and part-time doctors and volunteers. SOMC has a medical staff of more than 140 board-certified or board-eligible physicians and specialists and is supported by more than 800 volunteers. WALLaroo 2000 Wall Station The WALLaroo 2000 wall station featured a cabinet mounted outside each patient’s room to temporarily stock the non-narcotic medications prior to dispensing One of the “Best Practices” outlined in the IOM report calls for the healthcare industry to utilize technology, such as bed side bar coding, to improve patient identification. To meet these standards, SOMC quickly modernized their process from relying heavily on a two-cart dispensing system that included laptops on wheels (LOW’s) and pharmacy carts, to a system that was more efficient and accurate. The new solution, the WALLaroo 2000 wall station, featured a cabinet mounted outside each patient’s room to temporarily stock the non-narcotic medications prior to dispensing. SOMC’s IT department was tasked with finding a way to integrate the wall stations with a state-of-the-art access control system that was equipped with an access-controlled lock and reader. By implementing this solution, SOMC has been able to strictly adhere to their patient’s rights as they pertain to medication dispensing, which includes: the right patient, the right medication, the right dose, the right time and the right route of administration. Centrally Networked Access Control System “When we started our quest for an access-control solution, we looked for two things,” said Dennis Ward, information services and applications manager for SOMC. “First SOMC needed a solution that would be centrally networked with the current eMAR system, as well as have a main power source. Additionally, we needed to replace the magnetic strip on employee badges with a more effective technology.” Ward consulted with several companies within the security industry, including Accu-Tech, SecuriCo, Microman and HID Global, before finding the optimal solution- SecuriCo’s Securus Web software solution. The solution operates with a HID EdgeReader coupled with iCLASS 2K (37-bit) smart cards and Rutherford Controls 3513 Lock. SecurusWeb Software Solution SOMC project requirements indicated that both a Web-based software solution and an IP PoE Access Control solution were required" “SOMC project requirements indicated that both a Web-based software solution and an IP PoE Access Control solution were required,” said Jim Andrews, president of SecuriCo, Inc. “After Dennis and I reviewed the project requirements and discussed the design options with AccuTech and Microman, everyone agreed that the SecurusWeb software solution with a pre-configured HID EdgeReader and iCLASS 2K (37-bit) smart cards were the perfect fit for the hospital’s unique access control needs.” According to Ward, “As I conducted product research in the security information space, I noted that most available solutions were based on HID technology. This was important since the hospital was growing, and our security needs would grow, too. HID Global has a great industry reputation so it was a natural and easy decision to select the company’s solutions and OEM partner, SecuriCo, Inc.” Installing WALLaroo Wall Stations and HID EdgeReader Since Ward had never implemented a project like this before, he obtained samples of one of the WALLaroo wall stations, a HID EdgeReader and evaluation software from SecuriCo. Using the samples, he created a prototype that would fit all his access control needs and serve SOMC in the best possible way. Installed by Microman, these pre-programmed wall units have the SOMC specifications that Ward devised. While physical access control is delivered through the HID EdgeReader and iCLASS cards, the control of the hardware is provided through SecuriCo’s Securus Web software. The software controls which individuals are granted access to each station based upon a preset access level, which includes the day and time access is allowed. In addition, the application also records how access is added and removed. This innovative solution also enables pharmacy technicians to deliver barcoded, 24-hour scheduled, non-narcotic medications to the secured wall mounted stations. Using their authorized HID iCLASS cards, the nursing staff is then able to access and administer the medication. SecurusWeb and HID Global’s Edge IP Access Solutions SecurusWeb and HID Global’s Edge IP access solutions can make it easier to meet the unique and demanding needs of healthcare applications, as experienced by SOMC Thinking outside the box and using innovative products like SecurusWeb and HID Global’s Edge IP access solutions can make it easier to meet the unique and demanding needs of healthcare applications, as experienced by SOMC. Accuracy for patient medication dispensing has improved significantly thanks to the new solution. Workflow is also more efficient because the amount of time it previously took nurses to go to the medication room and retrieve new medications has been significantly reduced. Additionally, medication is secure and located where the staff expects it to be, while eliminating the need for medication carts, making the hospital hallways accessible and less cluttered. With the original installation of 73 of HID’s EdgeReaders being such a great success, SOMC ordered and installed an additional102 EdgeReaders in the hospital’s new North Tower, including 12 on the first floor Heart Care Unit (HCU), 30 on the second floor in the Surgical-Vascular Care Unit (SVCU), 30 on the third floor in the Medical-Surgical Care Unit (MSCU), and 30 more that are located on the fourth floor in the Progressive Care Unit (PCU).
The Lagoon Amusement Park in Farmington, Utah, likes things fast, too. For more than 100 years, it has offered exhilarating thrill rides as part of its entertainment package. The park’s Fire Dragon Double-Loop Rollercoaster hits speeds of 90 kilometers per hour, and its Lagoon-A-Beach Waterpark promises 550,000 gallons of liquid fun. Identification Cards Like many other parks, Lagoon provides identification cards to its employees and offers season passes (called Season Passports) with identification cards to its guests. But the equipment formerly used to print the cards was not keeping up with the pace of the park. “As the public demand for Season Passports increased, it was becoming more difficult to keep up with the desired pace,” said Nic Young, ticketing manager. “We used to take Polaroid pictures and laminate them onto pre-printed cards but matching the pictures with the cards was tricky. It was easy to put the wrong picture on someone’s card.”Lagoon now is able to satisfy the needs of its employees and guests with the updated card printing technology The multi-step process also was slow and cumbersome – not a minor concern with 2,500 employee ID badges and more than 30,000 season passes issued every year. Lagoon now is able to satisfy the needs of its employees and guests with the updated card printing technology, bringing the park back to its desired speed. ID badges And Card-printing Technology “These printers are extremely fast,” said Young, “which is especially important during our busy months of May and June. I also like the one-step printing process and the fact that the printers are easy to maintain and keep clean.” The Employee Services department uses colored ribbons when printing employee ID cards, identifying employees 15 years of age or younger by printing those names in red on the employee’s card. The Ticketing department uses standard black ribbons for its season passes. With five computer stations in the Season Passport photo area, ticketers can issue passes to large groups of people at the same time. Barcode Technology Both employee and Season Passport ID cards use barcode technologyBoth employee and Season Passport ID cards use barcode technology. For employees, the barcodes specify the level of park access and also bring up full-sized pictures of the employees to be viewed by Lagoon security. For Season Passport holders, barcodes record when a passport has been used or restrict passport usage on specified dates (such as during Lagoon’s July Fun Pass). Now that the Lagoon Amusement Park has established its current system, computer stations at the gates can track Season Passport access information and provide valuable marketing information. “We’re trying to increase our per person usage through promotions such as our Season Passport Holder coupon books,” Young said. “Our ID card system allows us to record our progress.” The bottom line, however, is speed. “There are no more long lines,” Young said. “We’re able to operate at full capacity all day long, allowing our guests to get their Season Passports quickly and proceed directly to the fun.”
Established by the French Government’s Ministry of Finance and Economics, the ACCORD project was commissioned to design and implement financial system modernization. The charter of the ACCORD initiative team, composed of representatives from multiple government ministries, is to architect solutions that enable the French government to manage the finances of the country with the same level of accountability as private sector enterprises. The technology-based infrastructure selected was a smart card solution to confirm and authenticate users across 40 departments. HID Global’s Identity Assurance Software The systems operated in parallel but could not leverage the benefits of a unified system. AIFE – Agence pour l’Informatique Financière de l’Etat – chose HID Global’s Identity Assurance software coupled with smart cards for the solution. Ensuring users are ‘who they say they are’ over the course of several decades, individual French government departments had developed separate and distinct applications to manage activities such as budgeting, processing purchase orders, and other accounting activities. The systems operated in parallel but could not leverage the benefits of a unified system. Enterprise Resource Planning System With the inception of the ACCORD project, the government committed to streamlining finance management by moving to one system for centralized control of the country’s budgeting and finance operations – with a goal that by 2004, all government central entities will be using the standard Enterprise Resource Planning (ERP) system. The transition to an online application that consolidates financial reporting and transactions requires an organization to determine how it will identify users with certainty prior to granting them access to the system and to valuable data. The solution must be easy to use to ensure departmental acceptance of the new application and authentication process. It must also minimize the IT staff time required for day-to-day administration and helpdesk activities for a large population over 7,000 dispersed users. These multiple challenges presented an opportunity to leverage proven digital identification solutions from HID Global. Smart card-based PKI Identification Solution HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entrySmart card-based solution using digital certificates with PKI, The French government-wide implementation securely links multiple departments, such as the Ministries of Education, Justice, Transportation and Housing, and Foreign Affairs, to the unified ERP application, enabling the exchange and ultimate consolidation of digital information. In 2000, the Ministry of Finance began deploying HID Global’s smart card-based PKI solution. HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entry – any of which could become a source of fraudulent or malicious activity in the absence of strong authentication and confirmation of digital identity. Today, employees regularly use the card with a microchip that holds their unique credentials in the form of an Entrust digital certificate. HID Global’s Gold Entrust-Ready certification ensures a smooth deployment to large numbers of users, and the combined solution with Entrust TruePass delivers the following benefits: Enhanced Security: HID Global’s multi-factor authentication reinforces the fundamental security and intent of a PKI by requiring something the user has (a smart card) and something the user knows (a PIN code) in order to use the private keys stored on the card. To further enhance security, the key pair is generated on the cryptographic smart card itself, so that the private key is never exposed to the insecure PC environment. The tight integration of HID Global’s client software with Entrust ensures certificate key updates are transparently and automatically made on the card. Non-Repudiation: To support non-repudiation, it is essential that ERP system users provide undeniable proof that they are who they say they are. Keys used for that authentication can never be stored on the potentially vulnerable user workstation. Those sensitive keys must remain under the sole control of the user, and HID Global’s client software ensures private keys are generated on the card and remain in the rightful owner’s possession at all times. User Simplicity: HID Gobal’s Security Client software provides a familiar ATM-like user interface that makes complex digital identity and PKI technologies transparent, so employees can focus on their work responsibilities and financial application activities to easily access the system. HID Global’s commitment to openness and industry standards ensures that the French Government’s initial investment in digital identity products and smart card client software infrastructure is capable of supporting multiple PKI vendors and other forms of identity credentials in the future.