Near Field Communication
Suprema Inc., a globally-renowned provider of security and biometrics solutions, has announced 'Suprema Mobile Access', a new mobile contactless solution and complete platform for managing, issuing and tracking access credentials using smartphones. As access control systems have evolved beyond physical access cards, access control solutions using mobile phones as a credential were introduced. Suprema Mobile Access Suprema Mobile Access employs a smartphone application with NFC (Near Field Com...
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that...
FIME launches its new Smartspy+ solution to support the adoption of contact and contactless transaction technologies for payments, transport and access control. Enhanced portability and performance allow product developers and system integrators to check, debug and validate their products wherever they are. This accelerates time to market for smart cards, NFC tags, ePassports, mobile devices and readers by identifying interoperability issues quickly and easily. “Smartspy+ is the best cont...
Identiv, Inc., a provider of physical security and secure identification, will exhibit at the WestPack Packaging Expo February 11 - 13, 2020 at the Anaheim Convention Center. The company will also showcase its near-field communication (NFC) solutions as part of the Cannabis Packaging Summit, running alongside WestPack as a subset of the show. Expecting approximately 20,000 visitors, ranging from packaging engineers to executives and operations professionals, WestPack provides industry professio...
Iris ID, a globally renowned provider of iris recognition technology solutions, has announced the integration of its handheld iCAM M300 multimode platform for biometric enrollment and verification with the FBI-certified Sherlock fingerprint scanner from Spartanburg, S.C.-based Integrated Biometrics (“IB”). Sherlock fingerprint scanner The fingerprint reader snaps on to the iCAM M300 to create one lightweight portable unit for field use. Sherlock is certified by the FBI as a FAP 45...
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall succes...
PAC & GDX, global provider of access control and door entry solutions, has announced the availability of its new Architect range of readers. By integrating cutting edge radio frequency identification (RFID), near field communication (NFC) and Bluetooth technologies into the Architect range, PAC & GDX has made it possible for smartphones to be used as an access control identification tool, thereby providing the highest level of convenience, flexibility and ease of operation. Integrating radio frequency identification technology PAC & GDX offers a lifetime warranty for all Architect readers on account of their quality In addition, PAC & GDX is so confident in the production quality of these products that it is offering a lifetime warranty for all Architect readers. Offering unrivalled levels of modular scalability, Architect can be configured to suit every application – from a single door to a fully integrated global internet based system – and the range currently comprises two variants. Architect-A readers The ‘Architect-A’ is a compact sized reader, while the ‘Architect-One’ is a Mullion reader, which is specially designed for installation in small spaces. Both variants are available in two options, either with RFID only or with Bluetooth & RFID. “In modern workplaces the vast majority of employees have smartphones, so utilizing these devices for access control purposes makes perfect sense,” explained Pete England, Global Product Manager for PAC & GDX. Mobile access He adds, “Put simply, people don’t want to be carrying multiple keys and tokens around when their smartphones can do the same job. Architect is the only solution that provides secure identification modes without the constraint of having to swipe a card.” An access control system needs to perfectly meet the requirements of the environment in which it is installed, and Architect offers five identification modes for a unique user experience. Remote access and control Card Mode allows a smartphone to be used as a classic badge, while Slide Mode makes a user’s hand a card Card Mode allows a smartphone to be used as a classic badge, Slide Mode makes a user’s hand a card, and with Tap-Tap Mode a user taps their smartphone twice and a Bluetooth signal is sent to the reader to unlock. Remote Mode allows a smartphone to be used as a remote control and, last but not least, Hands-Free Mode means a user can simply walk past a reader. In light of the General Data Protection Regulation (GDPR) organizations must do all they can to avoid unauthorized access to personal information. When using an Architect reader, PAC & GDX ensures the process is highly secure thanks to the implementation of encrypted SQL databases and an EAL5+ crypto processor. Security key management AES 256-bit SSL encryption is also employed at server level – the same grade used by banks and hospitals – while master key databases are not stored but regenerated and authenticated after each use. This means that there is no transit of personal data when using Architect. Designed to be used in a wide variety of environments and applications, Architect readers have a rugged design that makes them weather resistant, chemical resistant and able to self-extinguish in a fire. They are also vandal resistant to IK10, which means that they are protected against 20J of impact. This is equivalent to the impact of a 5kg mass dropped from 400mm above a surface. Advanced access control technology With growing demand for access control technology that is intuitive, flexible and secure, products also need to be environmentally friendly. This was an important factor for PAC & GDX when deciding to launch the Architect range and so the entire unit is recyclable, as no resin is used.Using smartphones credentials reduces the need for physical tokens, which reduces inventory, logistical and transport costs Furthermore, the use of smartphones as credentials reduces the need for physical tokens, which reduces inventory, as well as logistic and transport costs. This is not at the expense of style though and bespoke fascia designs are available to complement an organization’s corporate profile. Smartphone access control solution “PAC & GDX is driven by constant innovation and the desire to push the boundaries of what’s possible with access control,” said Pete England, further adding “Smartphones offer new possibilities and it is estimated that over 20 per cent of people within organizations will be using them for access control by 2022.” Pete concluded, “It’s why we have launched the Architect range, which combines convenience, flexibility, operational ease and efficiency, high levels of security, modular scalability and a vandal-proof design. Anyone with a traditional physical based token and reader system that wants to embrace newer technologies now has the perfect solution within reach.”
Identiv, Inc announced that the company is expanding its partnership with Les Bouchages Delage to deliver Internet of Things (IoT)-ready solutions for near field communication (NFC)-connected bottles in the wine and spirit industry. Identiv and Les Bouchages Delage originally partnered while collaborating on an intelligent NFC bottle cap for a luxury cognac brand. Now, the two companies are expanding their partnership by equipping a wide variety of Les Bouchages Delage cap designs with Identiv’s NFC technology. Near Field Communications technology Identiv and Les Bouchages Delage incorporated a contactless NFC tag into the cork stopper of all decanters While partnering on the luxury cognac project, Identiv and Les Bouchages Delage incorporated a contactless NFC tag into the cork stopper of all decanters. By tapping their mobile device to the cork, consumers are able to register their purchase and become a member of a private club providing exclusive content, unique experiences, and personalized services. The expanded partnership between the two companies will now apply the same intelligent technology to a greater selection of Les Bouchages Delage bottle caps. Custom Near Field Communications tag Identiv has developed a custom NFC tag design that fulfills a variety of unique bottle cap requirements, including high-performance in complex metal environments, maximum durability and readability by both Apple iOS and Android mobile devices at a small tag size, and 100% tested, secured, encoded, and locked variable data. As an expert in closure design and production, Les Bouchages Delage has provided the most reliable industrial production process for tag embedding, ensuring maximum radio frequency identification (RFID) performance and luxury-brand quality control. Radio frequency identification performance “Forty billion devices will be connected to the IoT by 2020,” said Stephane Ardiley, Identiv Director of Product Management. “Identiv’s expanded partnership with Les Bouchages Delage meets the increasing demands of consumers in this NFC-enabled world.” He adds, “people expect to connect to products in new ways, and through this partnership, we’re strengthening our commitment to consumer engagement, asset tracking, and authentication in the IoT.” IoT-connected products We saw a tremendous response to the intelligent corks in the luxury cognac project" “We saw a tremendous response to the intelligent corks in the luxury cognac project,” said Christian Delage, Les Bouchages Delage CEO. “Les Bouchages Delage is expanding its partnership with Identiv to apply this same intelligent technology to our complete line of customizable bottle caps to meet the increasing consumer demand for IoT-connected products. He further said, “Identiv’s tag designs meet each unique requirement in the wine and spirits industry and the team shares our vision for truly trustworthy product authentication.” NFC-compatible electronic devices Identiv’s complete portfolio of NFC-enabled solutions features a catalog of transponders compatible with NFC Forum, created for contactless transactions and connecting electronic devices with a simple tap-and-go model.
At GSX 2019, SilverShield™ Safety & Information Systems will showcase their award-winning visitor and information management system (Booth #1594). The solution is an easy-to-use, cloud-based SAAS approach to security, with several different modules that provide a complete safety solution. “The SilverShield Visitor and Information Management System is the most effective way for users to vet and manage visitors for any size facility,” said Robin Baker, CTO, SilverShield. “We look forward to demonstrating the powerful software to GSX attendees this year.” The SilverShield Visitor Management System enables staffed or unstaffed visitor screening at all types of facilities – schools, medical facilities, or any type of business that screens visitors and maintains visitor records. This cloud-based (SAAS) multi-platform solution allows users to quickly screen a visitor’s credentials against custom watchlists and the national sex offender database, in near-real-time, to decide if the visitor should be welcomed or denied entry. If welcomed, your staff is notified of visitor and VIP arrivals. Register manually or by scanning a valid ID The Virtual Lockdown System alerts users to take immediate action to initiate their lockdown procedures If there is a threat identified at any entrance, the system allows the user to immediately send silent alerts to designated stakeholders via a two-way communication mode. When integrated with the SilverShield ID Badge System, the system can create temporary ID or permanent ID badges for staff, students, and vendors. For organizations with unstaffed entrances, the SilverShield Kiosk System allows visitors to register themselves – manually or by scanning a valid ID. The interactive Kiosk System will also notify staff of VIPs or unwelcome guests, increasing security and safety even in unmanned entry points. In the event of an emergency situation or unwanted guest, the system’s Incident Management module can alert local police, initiate a virtual lockdown, and produce mass emergency notifications via email, SMS/text, cellphone and web push notifications. The Virtual Lockdown System alerts designated stakeholders via an audible siren sent to all users’ computers or cellphone devices, to alert users to take immediate action to initiate their lockdown procedures. Event Management System The solution pre-screens guests, ensuring that unwanted guests are not invited to events or facility activities SilverShield’s HR & Safety Resource Center enables companies and schools alike to store their Security Plans in a secure Learning Management System (LMS) and share it along with supporting materials with staff and stakeholders. The system also encourages assessments to ensure comprehension of security protocols, procedures and plans. The solution’s Event Management System pre-screens guests against watchlists and the national sex offender database, ensuring that unwanted guests are not inadvertently invited to events or facility activities. The system will manage invitations and RSVPs and can issue parking and visitor passes to approved guests via email and SMS/text, helping to safeguard a safe and secure event.
Identiv, Inc. has announced that the company and Schreiner Group GmbH & Co. KG have entered into a multi-year agreement for the delivery of Identiv’s RFID Inlays for device-level authentication and anti-counterfeiting of one-time-use medical devices in hospitals. Identiv RFID portfolio Currently contracted to strengthen secure authentication in the Internet of Things (IoT) over the next three years, several million inlays from Identiv’s radio-frequency identification (RFID) portfolio will be connected to high-tech labels and attached to one-time-use medical devices in hospitals throughout Europe. Identiv’s RFID Inlays will provide contactless identification of the devices, optimizing processes during medical procedures (i.e., checking for compatibility between different types of equipment) and protecting patients’ health and safety from counterfeiting. Identiv’s RFID Inlays will provide contactless identification of the devices, optimising processes during medical procedures Device-level authentication “Identiv is proud that our highly secure RFID Inlays were the right fit for this project, strengthening our long-term partnership with Schreiner Group,” said Dr. Manfred Mueller, Identiv COO and General Manager Identity. “We see device-level authentication and anti-counterfeiting applications gaining further importance throughout the IoT, not just in the medical field. Customers looking to protect people and products are our priority at Identiv.” Meeting the highest industry standards in the challenging healthcare market, Identiv’s dry 32 x 15 mm RFID Inlays feature Infineon SRF55V02P chips, aiming to provide the best possible treatment for patients. Once the three-year contract has been fulfilled, there will be discussion to expand the business. Intelligent identity solutions “At Schreiner Group, it’s our mission to benefit our customers by delivering intelligent solutions that optimize processes and enhance product safety,” said Manfred Laschinger, Schreiner Group GmbH Head of Corporate Purchasing. “Our customers are challenging us to meet the highest standards in terms of quality, reliability, and service. And we are pleased to continue working with Identiv to deliver just this.” Identiv’s comprehensive RFID, NFC, and inlay transponder portfolio brings smart identities and security to the IoT. Identiv’s innovative high-frequency (HF) and ultra-high frequency (UHF) 13.56 MHz RFID Inlays are completely customizable, are available as dry or wet inlays, and come in various shapes and sizes. The inlays can feature multiple designs integrating various materials, chip technologies, and frequencies for metal and non-metal environments. Near field communication smart posters Identiv produces inlays using advanced flip-chip technology and state-of-the-art, high-volume die-bonding processes with integrated inline quality and process control to guarantee superior quality performance. In addition to healthcare and the IoT, Identiv’s RFID Inlay portfolio can benefit near field communication (NFC) smart posters and billboards, libraries, event and transportation ticketing, automotive and chemical industries, logistics and supply chain, asset management, pharmaceuticals, electronic games, event management, wearable technology, customer loyalty programs, and more.
GET Group North America, an innovative developer of mobile ID technology with over 20 years of experience in identity management, announced that its GET Mobile ID Digital Identity Solution for iOS can support near-field communication (NFC) for identity transactions at Point of Sale (POS), airports, and even kiosks. GET Mobile ID for Android already supports NFC identity transactions. GET Group NA and global partner Scytáles AB, innovative developers of mobile ID technology, are the first to extend the new ISO 18013-5 standard so that iOS devices can also use NFC for data transmission, or allow NFC tap followed by either local or online data transfer, all under citizen control. Protecting citizen privacy We are proud to be participating in the development of the ISO 18013-5 standard, together with Scytáles AB"“Supporting NFC for both iOS and Android devices is critical to developing a variety of more secure and convenient retail, payment, and ID verification use cases for mobile driver’s licenses and other forms of mobile ID,” said David Kelts, Director of Product Development, Mobile Identity, GET Group North America. “We are proud to be participating in the development of the ISO 18013-5 standard, together with Scytáles AB, and committed to ensuring our technology will protect citizen privacy and meet specifications for secure interoperability on all mobile device operating systems.” David Kelts will be participating on the Secure Technology Alliance's Industry Panel Review of Retail Use Cases of mDLs on July 16th at the Atlanta Airport Marriott Hotel as part of the ‘Mobile Driver’s Licenses for Retail Use’ workshop. From 2:00-2:45, this industry panel will feature mDL solution providers discussing their approaches, functionalities, and the use cases important for MDLs to succeed in retail identity transactions. ISO 18013-5-Compliant identity transactions ISO 18013-5, which is expected to be published later this year, is the international standard that specifies the technical and interoperability requirements for mobile driver’s licenses (mDL). GET Group NA and Scytáles AB are ready to enable ISO 18013-5-compliant identity transactions between both iOS and Android devices and POS terminals already used today for payments. This will broaden the possibilities for retail, payment and ID verification use cases of mDLs, such as: Age-based purchases where both age-verification and payment information can be transmitted in the same tap of a mobile device; “Tap & Go” identity transactions at stadiums, federal buildings, airports, etc.; Electronic identity and address verification for check cashing.
In business and at home, the smartphone is a remote control for our lives. It’s a calendar and a credit card. We book holidays and do our daily banking. With video calling technology, we can even be in two places at once (or make it seem that way). Could there be untapped potential in using mobile phones for access control, too? According to official EU data, by 2016 94% of European large businesses were issuing their workers with some sort of connected mobile device. We seem to use our smartphones for everything. Yet mobile phones are under utilized when it comes to building security and access management. Mobile access Evolving technologies now enable us to manage access rights via mobile phone apps Evolving technologies now enable us to manage access rights via mobile phone apps, open a door with a virtual key credential, and much more. An estimated 44 million mobile credentials will be downloaded by 2021, according to a recent IHS Markit forecast. Smartphones enable wireless access control: Convenience: Part of the reason Apple Pay, Instagram and many more mobile services succeed is for the simple reason, we like to carry less stuff. With secure credentials on your phone, there’s no more need for a fob, a plastic smart-card or anything similar. Security: A screen-lock adds an extra layer of PIN, swipe passcode or fingerprint security. With phones, multi-factor authentication is baked into the credential. And how quickly would you notice if a plastic key-card went missing? Nowhere near as fast as you’d spot your smart phone was gone. Flexibility: Security and facility managers can do things with virtual keys that are impossible with a plastic credential. They can issue, revoke or amend them instantly and from anywhere with secure cloud access via a mobile phone. However briefly a temporary visitor needs to enter your building, the easiest way to let them in is with their phone. Efficiency: Scrap the queues at reception waiting for temporary visitor permits, waste fewer hours in plastic key-card handover meetings and spend less of your budget replacing lost and damaged credentials. Phone-based access control saves businesses time and money. Compatibility: Mobile phones are machines built for connectivity, including with your existing RFID locks. Bluetooth and NFC radio technology are already inside most modern smartphones. Every future viable wireless and contactless technology will be there, too. Another recent analyst report suggested as many as 20% of organizations would use smartphones for access, in place of plastic smart-cards, by 2020. The move to mobile access control seems inevitable. “Other highly security-aware industries like banking demonstrate the advantages of the smartphone,” says Thomas Schulz, Director Marketing & Communications Digital and Access Solutions at ASSA ABLOY EMEA. “Similarly, we see fast-growing interest in unlocking doors and other openings with mobile credentials, and in facility managers administering access rights via their smartphone.” SMARTair Openow solution “To take one example from our portfolio of mobile access solutions, security managers using our new SMARTair Openow solution manage all users’ virtual keys inside a secure app. If an administrator cancels a virtual key, it vanishes immediately from a user’s Openow app.” Schulz points to the new Arkansas State University campus in Mexico, where students and staff have no access cards to collect or validate. Every site user installs and validates their own Openow app and collects keys virtually. Wireless access control Smartphones add convenience and functionality right across our wireless access control product" “Smartphones add convenience and functionality right across our wireless access control product and solutions portfolio,” said Schulz. “Users can unlock our Aperio wireless locks with a Seos mobile credential. Small and medium-sized business managers can run their own access control with no specialist knowledge, using just the CLIQ Go app and their phone.” He further adds, “For companies with a remote workforce, the CLIQ Connect app updates access rights of programmable keys with just a secure Bluetooth connection. Access control from your mobile phone offers so many efficiency advantages. I’d encourage everyone involved in managing access control to take a look.”
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
The security marketplace is talking about a lot of different subjects. Our website’s Expert Panel Roundtable discussions in 2018 reflected some of the “hot topics” in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2018 was about privacy issues and GDPR’s impact on physical security systems. Other hot topics that made the Top-10 list of roundtable discussions included obstacles to adoption of mobile credentials, what’s new “on the edge,” and the value of physical security data. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2018, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2018 (including the quotable panelists named and linked below). 1. How do privacy issues and GDPR impact physical security systems? "GDPR specifically restricts the capture and use of EU residents’ personal data and is in direct conflict with the adoption of artificial intelligence (AI) platforms to track individual activities. The challenge for manufacturers will be to design solutions capable of capturing valuable information for security or business intelligence purposes while simultaneously anonymizing retained data.” - Peter Strom, March Networks 2. What are the security challenges of the hospitality market? "The primary challenge the hospitality industry faces is the fine balance between the delivery of exceptional customer service and maintaining a safe and secure environment. The industry sees a range of threats, including theft, terrorism and natural disasters, and more modern risks, such as those related to cybersecurity, liability and compliance." - Jumbi Edulbehram, Oncam 3. Where is it inappropriate to install video cameras? "The most obvious examples would be in bathrooms or bedrooms, but the more interesting cases are those that are not so obvious – such as religious institutions like a church or a mosque. An increase in the boldness of would-be thieves has led to a recent rise in surveillance outside of houses of worship." - Stuart Rawling, Pelco by Schneider Electric 4. What technology will impact security most in the rest of 2018? "The hottest trend we are currently seeing in 2018 is the continued adoption of intelligent devices and automation into the security framework. We have embraced a model where our software and hardware components continually get smarter and easier for security and IT teams to manage and deploy." - Stuart Tucker, AMAG Technology 5. What are the obstacles to adoption of mobile credentials for access control? "Mobile credentials have been slow to take off because legacy readers traditionally did not have Bluetooth or NFC capacity. However, upgrade kits will soon be available from some access control vendors, and customers will be able to easily upgrade their readers." - Derek Arcuri, Genetec 6. What’s new “on the edge” of security and video surveillance systems? "As more powerful in-camera chipsets are developed, edge devices are capable of even more powerful analytics that can inform operators in real-time of events requiring attention. Part of this significant evolution is from a form of artificial intelligence (AI) called deep learning." - Paul Kong, Hanwha Techwin America 7. Are integrators and end users overwhelmed by too many choices? "Being proactive in tracking new developments and networking with like-minded professionals are critical. Find out what your colleagues are using or testing, and get their feedback on what is working well, especially if their organization is similar to yours. Join local groups, attend industry conferences, and connect on social media to compare notes on emerging technologies." - Brandon Reich, Pivot3 8. What role does social media play in promoting security? "Social media can help us reduce false police dispatches by drawing in a personal circle of people that can validate an alarm, whether it be a neighbour looking out their window to see what’s going on, or a family member that knows your travel plans and is taking care of your house." - Wayne Jared, 3xLOGIC 9. How should your security company measure total cost of ownership (TCO)? “When looking at TCO you need to consider the obvious initial capital cost – compared to alternatives – and also the operational costs across the lifespan of the systems, across one, three and five years. On top of this, though, security can add additional value through integration.” - John Davies, TDSi 10. What is the value of physical security data? "While active protection is the primary job of a security system, the data generated by today’s networked solutions can provide a wealth of intelligence to help organisations optimize both their security strategies and their business operations.” - Mark Perkins, Boon Edam
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable Advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorized user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted Part Of Security Network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorized user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorized individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security By Location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal Items Using QR codes seem to be a simple but reliable identity and access control authentication optionMobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost Savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated Technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading Existing Security Systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid Systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organizations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing The Benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
As a security service provider with a rich history in manguarding, Allied Universal is launching a new technology platform to increase productivity and accountability of security officers and to transform guard service operations from an ‘observe and report’ mission to a ‘detect and respond’ function. Mark Mullison, Allied Universal’s Chief Information Officer (CIO), says the new Heliaus platform also uses artificial intelligence (AI) to analyze data, predict outcomes, and prescribe optimum responses. The platform includes a smart phone app that guides security officers to ensure post orders are followed and provides a ‘virtual’ coach or supervisor to guide security officers throughout the day. “The walls between technology and people need to come down in the future,” says Mullison. “We need an ecosystem in which people and technology can cooperate well and respond to threats and drive outcomes.” Real-Time situational awareness Technology plays an increasing role in security and safety, but it will never replace humans"Heliaus is a step in that direction. It has two components – the mobile app used by security officers; and a cloud-based portal, like a command and control center that compiles information from the app and other inputs and performs AI analysis of data. Heliaus is an add-on for Allied Universal customers and is offered for a per-device subscription fee of $199 per month. A customer company’s managers can also access the portal for data visualization tools and real-time situational awareness, or to input data such as ‘approving’ an incident report or action. “Technology plays an increasing role in security and safety, but it will never replace humans,” says Mullison. “It will augment and enhance the workflow and make people more effective.” “We are focusing on delivering better outcomes for safety and security,” he adds. “The impacts are as broad and diverse as the clients we serve.” Customization of forms enables the system to collect and use any information that was previously collected on paper. Monitoring and Response Center (MaRC) A system is effective only to the extent that it is used, and Allied Universal has engineered the user experience to make the mobile app easy – almost fun – to use, says Mullison. Elements of ‘gamification’ drive greater user adoption. “It is designed to support the work [security officers] do and make information collection a by-product of people doing their jobs.” The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design Effective AI depends on data, and Heliaus pulls data from Allied Universal’s Monitoring and Response Center (MaRC), where a cloud server integrates the company’s managed security services, including access control, video surveillance and video analytics. It also incorporates current weather information and forecasts, and information specific to the industry segment. Additional data is generated as officers enter data through the mobile app. The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design. It provides insight into the drivers of risk, makes recommendations about how to reduce incidents, and, through dynamic workflow automation, ensures that those recommendations are implemented. Location awareness is a combination of the global positioning system (GPS), Bluetooth beacons, and near-field communication (NFC) tags. Improves the accuracy of responses AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response“Information is organized to facilitate AI analysis. If you have the right knowledge representation then problem-solving is easy,” says Mullison, echoing a common principle of artificial intelligence. AI works to analyze data and make predictions and recommendations to guide responses by security personnel. AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response. The AI system also learns and improves the accuracy of responses with more data and over time. Responses come much faster than older ‘trial and error’ models of analysis. Another element of Heliaus is a ‘robust workflow engine’ that ensures recommendations are carried out, either by a security professional on site or by the client. Mullison says implementation of the system can result in a 20% reduction of security and safety incidents. Multiple applications of Heliaus Heliaus is already being used by some Allied Universal customers. For example, a major Hollywood production studio is using it to identify and address workplace hazards such as stray electrical cords, dripping water hoses, etc., across a 50-acre area. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard A manufacturer created a custom compliance application using the platform to track more than 140 unique incident types, such as monitoring elevated temperature in a truck trailer or drivers without proper identification. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard. The flexibility of the platform can enable expansion to incorporate other technologies in the future, too. For example, sources of data for the system could include robots, drones or various Internet of Things (IoT) sensors; or workflow engines could be used to dispatch a robot or drone to handle a situation (rather than a human).
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple color and infrared cameras that can detect facial features and confirm an identity. Real-time 3-D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System Helps In Tailgating Mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy Enrollment And Deployment Enrollment in the system is easy. Companies can deploy a separate enrollment station, or any reader can be used for enrollment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrollment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting Intent From Positioning Of Eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
Everbridge, Inc., globally renowned provider of critical event management solutions, has announced that it has been selected by Peru’s Ministry of Transportation and Communications (MTC) to power the nation’s Sistema de Mensajería de Alerta Temprana de Emergencia (Sismate), Peru’s Early Warning Emergency Messaging System. The news marks the completion of contract negotiations with the MTC that Everbridge had initially disclosed in September, without naming the country. The win reinforces Everbridge’s position as the global leader in population warning systems with contracts in the Americas, EMEA, and APAC regions. Critical messages to mobile phones After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident. The system, powered by Everbridge Public Warning, will send critical messages to mobile phones before, during and after the emergency. Sismate alerts can also be used in drills and to provide support in search and rescue operations. The Sismate is designed to serve over 37 million people including Peru’s 33 million residents and 4 million annual visitors. “This technology marks a milestone in risk and disaster management at the national level, which will be consolidated by combining joint efforts between various institutions and citizens,” explained Deputy Minister of Communications, Virginia Nakagawa to El Economista. National warning system “Everbridge is honored to support Peru with its national warning system,” said David Meredith, Chief Executive Officer at Everbridge. “Peru joins a growing number of countries that have chosen to partner with Everbridge to implement a nationwide system to protect their population and visitors amid an escalating threat environment.” The Everbridge Platform has been deployed by more local, state, and national governments across the globe than any other solution, offering the ability to reach over 500 million people in more than 200 countries. In addition to Peru, Everbridge Public Warning has been deployed to reach the mobile populations on a country-wide scale in Sweden, Iceland, the Netherlands, Singapore, Greece, and a number of the largest states in India, and is currently being implemented in Australia. Everbridge Public Warning system Everbridge is the first population alerting provider to support four EU countries in conjunction with the recent EU mandate requiring member countries to have a population-wide alerting system in place by June 2022. Everbridge Public Warning represents the only multi-channel solution which allows countries to deploy their preferred combination of emergency communications methods. The Everbridge population warning system communicates across all phases of an incident, leverages location intelligence (static location, last known location, and expected location). It provides directed two-way communications, and enables countries to combine both speed of delivering alerts with the broadest reach to cover the full population and visitors.
Cognitec maintains a successful partnership with WorldReach to facilitate remote identity verification during self-service ID issuance processes via their smartphone app. Applicants for passports, visas, residency/settlement programs or digital on-boarding services are required to take a selfie during the enrollment process. An automated back-end process verifies the claimed identity, validates the ID document via NFC and chip reads, checks for watch list alerts, completes a liveness check, and forwards the application for completion of assessment. Uninterrupted digital services “We chose Cognitec’s market-leading face matching technology to achieve consistently high accuracy rates for the verification process,” says Gordon Wilson, President of WorldReach. “Government agencies require proven, reliable technologies for each step in the application process, as they aim to build the community’s trust in these new digital application methods. This partnership gives our companies a pioneering role in advancing e-government services.” Using the app eliminates the visit to an office facility and allows for uninterrupted digital services. Users welcome the app’s straight-forward design and the quick application process. WorldReach is currently applying this solution with passport and border control agencies in Canada, the UK, Ireland, and other organizations pursuing seamless travel initiatives. “The WorldReach solution brings the advantages of face recognition to modern ID management systems,” says Alfredo Herrera, Cognitec CEO. “We look forward to contributing our expertise as WorldReach evolves this trend-setting technology.”
Located in the South East of England, Basingstoke and Deane is a local government district and borough in the county of Hampshire. With Basingstoke as its largest town, the area is known for family-friendly living and is home to over 175,000 people. Basingstoke and Deane Borough Council consists of 60 elected members who discuss local politics, municipal budgets and taxes at regular meetings. For full transparency with the members of their constituency, the council streams live video of all its meetings, including public votes, on their YouTube channel. Automatic camera control To ensure a high level of video production, the Borough Council decided to upgrade their conference system. After discussing their requirements with Andover-based system integrator VP Bastion, a fully IP-based DICENTIS Conference System from Bosch was installed. The system meets the council’s key priorities by offering the highest audio quality, full integration of live voting, built-in automatic camera control and direct streaming with speaker-name indication. Council members wanted the freedom to sit anywhere in the council chamber during council sessions Additionally, council members wanted the freedom to sit anywhere in the council chamber during council sessions – while still being automatically identifiable on camera – and the installation needed to accommodate for the limited desk space and cabling voids. The system includes 63 DICENTIS Discussion devices with touchscreens (to support the required voting and identification capabilities for council members), nine DICENTIS discussion-only devices for guest speakers, and automatic camera control software. High directive microphones All the discussion devices are mounted on raised brackets to maximize desk space and are equipped with high directive microphones to deliver crystal-clear audio. Council members have the freedom to sit at any seat in the meeting room, as the system automatically registers their presence at a specific location thanks to the NFC (Near Field Communication) card registration on the discussion devices. When a speaker activates its microphone, the system’s automatic camera control points the camera towards their location, zooming in and displaying their image on the big screen. Additional features were added to the installation thanks to DICENTIS’ compatibility with third-party software. Two companies – Arbor Media, European market leader in conference recording and streaming services, and MVI Engineering, expert in creating conference software solutions – worked together to create a webcasting and conference control software package that was integrated with the DICENTIS system. Integrated conference system The new DICENTIS system has supported a seamless and transparent democratic process This solution helped to fulfill all the Borough Council’s requirements, including report generation via live image feed and identification by name and party affiliation on the council’s YouTube channel. In addition to displaying the DICENTIS-enabled voting results on the council chamber’s big screen, it is now possible to share the voting results on the YouTube Live feed. Since the installation, the new DICENTIS system has supported a seamless and transparent democratic process at Basingstoke and Deane Borough Council. “Having a fully integrated conference system with audio-video feeds from meetings automatically streamed to the council’s YouTube channel was a must,” says Iain Steele, Director of VP Bastion. Behind the scenes, via the third-party MVI Engineering application, the system automatically upgrades to the latest software versions. These centralized updates save time and operating costs. With the potential to increase the system’s functionality and size in the upcoming years, the council has a future-proof and expandable conference solution from Bosch, which already supplies around 50 percent of councils in the United Kingdom and Ireland.
Mobile-device and application-security technology company Trustonic announces that Hyundai Motor America will demonstrate its new Digital Key app, secured by Trustonic Application Protection, at the New York International Auto Show 2019. The Digital Key will launch with the all-new 2020 Hyundai Sonata in the fall. Hyundai’s Digital Key is a downloadable smartphone app that can replace a traditional car key by leveraging Near Field Communication (NFC) to detect an authorized smartphone. An NFC antenna is located in the driver’s door handle for locking and unlocking while a second antenna for starting the engine is located in the wireless charging pad in the center console. Seamless Vehicle Sharing The Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication Once authorized, the Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication. A user can lock and unlock the vehicle, activate panic alert and start the engine within a range of about 30 feet of the car. The new Digital Key can be utilised by up to four authorized users, facilitating seamless vehicle sharing. Users’ preferred settings are also stored in the car, meaning that when a user is recognized, the vehicle automatically adjusts settings for side mirrors, radio presets, sound settings, and seat positioning. Hyundai is using Trustonic Application Protection (TAP) to secure the Digital Key. TAP ensures that Digital Key transfer requests are securely displayed to and approved by a real, authenticated user on a trusted device. Cybersecurity Approach TAP utilizes a multilayered industry-recognized security approach for communication to and from the customer’s phone. “Hyundai has been a leader in connected car technology for a long time now, with new features like Apple CarPlay, Android Auto, Smartwatch and Smart-speaker integration into our vehicles,” said Manish Mehrotra, director of digital business planning and connected operations, Hyundai Motor America. “Digital Key adds convenience for 2020 Sonata owners and allows us to be ready for future shifts in the mobility space, such as car sharing. We chose Trustonic because of their multilayered, industry recognized cybersecurity approach.” Vehicle-Function Permissions Hyundai’s Digital Key will enable easy car sharing and improved user experiences" Car owners have a deeper level of access than other authenticated users, enabling them to set vehicle-function permissions and the duration of access for each shared user. This enables uses beyond car sharing, such as enabling couriers to access the trunk within a pre-agreed window of time to deliver a package. Future uses that the app could enable include car rentals, triggering an alarm when a vehicle travels outside a designated area and remote control of features, such as autonomous parking. Ben Cade, CEO, Trustonic, adds, “Consumers expect to be able to manage their lives on their smartphones, and this includes their vehicles. Hyundai’s Digital Key will enable easy car sharing and improved user experiences for drivers—and as international leaders in app security, it’s up to us to ensure this can happen in a scalable and secure way.”
HID Global, a global provider of trusted identity solutions, announced that Tasmania’s Old Kempton Distillery (OKD) has deployed its Internet of Things (IoT) enablement platform, HID Trusted Tag Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against gray market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. Taking Measures To Prevent Counterfeiting HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience"“Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognized the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery. “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag Services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalized communications that helps the distillery build brand loyalty in a privacy-preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC. “HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” Working Of The System The distillery’s solution incorporates HID Trusted Tag Services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. A HID cryptographically secure Near Field Communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. Combining Cloud Authentication With NFC Tags The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied“HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focused on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global. “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.” HID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
HID Global, a worldwide provider of trusted identity solutions, was selected by Skanska, one of the world’s project development and construction groups with operations in Europe and North America, to incorporate HID’s mobile solution for secure access to its new office complex in Warsaw. Powered by Seos, HID Mobile Access improves the user experience and increases security throughout the entire building – from the parking lot and elevators to areas with limited access to the public. Located at 173 Solidarności Avenue in Warsaw, the new Spark office complex is not only the new headquarters of Skanska, but a large part of the 70,000 square-meter office building has also been set aside for other tenants. Because the building is intended to be a mixed-tenant space, it was crucial to restrict access to secure areas from unauthorized visitors. Using Smartphones For Access The Spark building was designed to enable mobile access so that employees can now use their smartphones to open doors and enter secure areas. Skanska, with help from system integrator Sharry Europe, created a new system for building occupants that integrates numerous building applications, including HID Mobile Access. As a result, all building applications have been incorporated into an integrated mobile app, which marked an advancement in creating a more streamlined and convenient experience for the users. HID Mobile Access enhances the security for accessing our entire building" Both Spark building employees and their guests can now move throughout the building with nothing more than a smartphone, without the risk of them gaining access to restricted areas – unless the proper access rights are granted. When users arrive at the door, they simply tap their iOS and Android devices to an iCLASS SE reader using Near-Field Communications (NFC) or Bluetooth Low Energy (BLE) and HID’s ‘twist and go’ feature to gain access from a distance. Any changes to the user’s access rights are remotely managed by the administrator through a cloud-based portal. Integrating All Building Applications Into One “HID Mobile Access enhances the security for accessing our entire building. In one application, we have integrated all building applications, such as parking, virtual reception and other Internet of Things functionality, bringing the whole user experience to a new level,” said Renata Nowakowska, Innovation Manager at Skanska. “One of the most pressing objectives for facility managers in smart buildings is to crack the code on how to enable as many building applications and services on mobile devices as possible in order to simplify how occupants move through a facility and interact with building services,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control. “Skanska’s integration of HID Mobile Access into their mobile platform is a perfect example of how organizations are leveraging the power of mobile credentials and the cloud to realize the full potential of creating a connected and more intuitive experience for their users, while increasing security at the same time.”
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly play a role in security. We asked this week’s Expert Panel Roundtable: How are smartphones impacting technologies in the physical security market?
Near Field Communication: Manufacturers & Suppliers
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload