Near Field Communication
PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end us...
Identiv, Inc. announces that it will present its recently expanded Internet of Things (IoT) product portfolio at ISC West 2019, encompassing a wide range of physical and logical access control, video and data analytics, door readers, identity cards, visitor management, mobile security, telephone entry, and radio-frequency identification (RFID) and near-field communication (NFC) solutions for physical and IT-secured businesses. Identiv will be showcasing demos of its complete portfolio of high-p...
Turnstile manufacturers increasingly recognize the value of integrating mobile devices into their lobby security strategy to create more convenient, connected and secure experiences for building occupants and visitors. HID Global, a global provider of trusted identity solutions, announced that it has teamed up with six of the world’s top turnstile manufacturers who have tested and certified HID’s Mobile Access as part of their commitment to a mobile future. Major turnstile manufactu...
Maxxess Systems, the innovator in security solutions that empower total situational awareness for security enterprises, is showcasing the company’s newly designed Ambit Event Management Communications Software here at ISC West 2019 (booth #6065). Ambit’s powerful communications capabilities provides security management and first responders with real-time ‘human intelligence’ via users’ smartphone and tablets, along with a host of remote access control and geo-track...
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple color and infrared cameras that can detect facial features and confirm an identity. Real-time 3-D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a r...
Identiv, Inc. has announced that it will demonstrate its complete radio-frequency identification (RFID), near-field communication (NFC), and inlay portfolio to secure the Internet of Things (IoT) during RFID Journal LIVE! on April 2 – 4, 2019 in Phoenix, Arizona, United States. RFID Journal LIVE! RFID Journal LIVE! is an event focused on RFID and related technologies. Now in its 17th year, the event features more than 200 exhibitors from 26 countries showcasing the best selection of RFID...
User authentication deficiencies, endpoint data leakage and excessive user permissions are the three most common cybersecurity risks facing health systems and hospitals, according to new data from Clearwater CyberIntelligence Institute. At the HIMSS19 Global Conference and Exhibition, February 11-15, 2019 in Orlando, Florida, ELATEC will be demonstrating its uniquely flexible radio frequency identification (RFID) reader, which mitigates these issues by strengthening user authentication for access control applications. With RFID, medical personnel simply swipe the same badges they use to gain entry to the building for fast and easy access to the records Access control is critical for healthcare institutions in order to protect patient safety and meet stringent HIPAA requirements for medical information privacy. Radio frequency identification (RFID) readers are an effective and efficient means of user authentication to ensure that only authorized personnel can access patient health records, change settings on medical devices or gain access to restricted medications, equipment or supplies. Better Security Than Passwords RFID readers are more secure and easier to manage than passwords, which are easy to share and often forgotten, creating both security risks and an unnecessary IT burden. Password systems also slow down medical personnel, requiring them to remember and enter passwords into different devices, often under emergency conditions or extreme time pressure. With RFID, medical personnel simply swipe the same badges they use to gain entry to the building for fast and easy access to the records, supplies and equipment they need to perform their jobs. ELATEC readers are already widely used for secure print management and other healthcare ecosystem applications such as time and attendance, computer single sign-on, room scheduling, pharmaceutical and high-value supplies dispensing, and medical equipment access control. Recognize 60+ RFID Proximity Card Transponders ELATEC RFID readers can recognize and decode more than 60 RFID proximity card transponder types as well as smartphone BLE and NFCThere are dozens of RFID card technologies in use globally, creating challenges for hospital systems and device manufacturers wishing to implement RFID for access control beyond the front door. While other systems only recognize a few proprietary technologies, ELATEC RFID readers are universal. They can recognize and decode more than 60 RFID proximity card transponder types as well as smartphone Bluetooth Low Energy (BLE) and Near-field Communication. They are also certified for use in 110 countries. This means that large hospital systems that may be using multiple card technologies across different locations due to mergers and acquisitions can rely on a single reader type for access control and user authentication for all the other devices and systems they use. For medical device manufacturers and software developers, ELATEC readers provide a ‘single part number solution’ that allows them to sell their RFID-enabled devices into practically any hospital system throughout the world without worrying about what kind of card technologies their clients may be using. Cost-Efficient And Longer Durability "We describe ELATEC’s readers as being future proof,” explained John Tepley, President of ELATEC USA, Inc. "There are numerous technologies used for various applications throughout the region and the world, which means companies that want to integrate RFID into their solutions must be prepared to handle many different RFID transponder technologies. ELATEC is uniquely positioned to meet these challenges." ELATEC readers can be easily and remotely reconfigured to address emerging technologies, security threats and end-user requirements ELATEC readers can be easily and remotely reconfigured to address emerging technologies, security threats and end-user requirements, so they are inexpensive to maintain and will remain usable longer than competing reader technologies. As the healthcare ecosystem becomes more connected and complex, and the FDA puts increasing emphasis on cybersecurity risks for medical devices and software applications, developers need smart, easy solutions to close security vulnerabilities around user access and authentication. RFID provides fast, easy and secure authentication for all kinds of medical devices and applications. ELATEC readers can help developers meet emerging security challenges and address the needs of their healthcare clients.
For over a century, IEEE's mission has been to advance technology for the benefit of humanity. As the world’s largest technical professional organization, IEEE’s global community includes over 420,000 members in engineering, computing and technology, collaborating on communications, consumer electronics, robotics, sustainable energy, aerospace, life sciences, and many other critical initiatives. Dave George Felicitated With IEEE Life Membership Dave George has been an active IEEE member for over 40 years As the Chief Technologist behind Pryme Radio’s communications innovations, Dave George has been an active IEEE member for over 40 years. Recently, Mr. George was honored with IEEE Life Membership, a top echelon designation reserved only for those individuals demonstrating long-standing leadership, dedication, and who have made a significant impact on the development of technology. “I’m grateful for IEEE’s recognition, but it’s my job to find ways to better the lives and professions of Pryme’s customers through communications,” said George. “The fact that technologies have become ever more exotic and exciting is a bonus.” Never comfortable tooting his own horn, George’s demure demeanor belies the important role he’s played in moving the communication industry forward. In fact, George credits IEEE as being his primary source for leading edge electronic science data, which often help lead him to develop ground-breaking new products at Pryme. Pryme's Future Product Line In Sync With IoT George is a regional member of the IEEE Communications Society (ComSoc), Robotics & Automation Society (RAS), Intelligent Transportation Systems Society (ITS), and the Vehicular Technology Society (VTS.) His involvement has given rise to future product developments at Pryme that support emerging networks such as IoT, mesh, 5G, soon to be 6G, as well as intelligent vehicle to vehicle communications. George may shy away from the spotlight, but he is fearless when it comes to entering unexplored technological territories. The reward Dave George reveres most is creating products that make a difference. George’s philosophy mirrors the IEEE’s mission and is also reflected in Pryme’s guiding principle — Invent communications technologies that benefit public safety, security, government, education, transit, utilities, construction, manufacturing, retail, hospitality, field services, facilities, healthcare, professionals and humanity as a whole.
The next level in hotel lock engineering for hospitality, Ælement Fusion, is packed with innovative features including a JustIN Mobile application for mobile access with NFC and BLE engine, SALTO BLUEnet wireless technology for real-time access control management and the SALTO Virtual Network (SVN) data-on-card technology. RFID-Compatible Electronic Lock SALTO’s new Ælement Fusion is an electronic lock with a sleek round reader that eliminates lock hardware on the door by encasing all electronic components inside the door itself, making security virtually invisible. The Ælement Fusion is SALTO’s latest evolution in hotel lock engineering that increases security, improves operations and enhances décor. The Ælement Fusion is compatible with RFID and BLE (Bluetooth) technologies that integrate seamlessly with mobile applications including SALTO Systems’ JustIN Mobile. Providing a minimalistic design that blends in with any hotel décor, the Ælement Fusion’s small, customizable light ring reader (available in black or white) offers a discreet electronic lock for hotels looking to deploy electronic access control with a stylish, yet technologically-advanced solution. SALTO offers a variety of door handles and finishes to complement any door style.Ælement Fusion is the future of the hospitality industry’s electronic locking technology" Advanced Wireless Technology “For more than a decade, our intention has been to create an invisible electronic hotel lock. The Ælement Fusion is the realization of that vision,” said Marc Handels, SALTO Systems CMSO. “With the introduction of Ælement nine years ago, we revolutionized the hotel electronic lock market. AElement Fusion marks a new era for SALTO Hospitality — one in which the electronic lock disappears into the guest experience.” Security, efficiency and design are all essential aspects of access control in the highly competitive hospitality sector. Ælement Fusion incorporates SALTO’s stand-alone, battery-powered electronic lock and technology, SVN data-on-card and advanced wireless technology, with online, real-time capabilities — all without using wires. JustIN Mobile Powered Door Security “Ælement Fusion is the future of the hospitality industry’s electronic locking technology,” said Handels. “It is packed with incredible new technologies, like the innovative JustIN Mobile application that allows guests and staff to use their smartphone as a key, beautiful design light ring contactless reader, and SALTO BLUEnet wireless engine for real-time access control.” To help architects, designers and engineers decide which is the best Ælement Fusion model, SALTO has developed an innovative tool that allows complete visualization and customization of the locking solutions chosen by the user. By accessing the web page, the user is able to select the door lock model online to configure and create their customized door by personalizing everything. This smart tool will help visitors select different designs and lock models, giving them an idea of how the solutions will look on different types of doors and with different finishes.
Identiv, Inc. announced the company has entered into a distribution partnership with Development Trading Company (DTC), the first and leading security printing and services company in Saudi Arabia. In partnership with DTC, Identiv will bring its portfolio of highly secure smart card reader technology and credentials to the Middle East for the first time. This global expansion reflects Identiv’s goal to make affordable, high-security access and identification solutions universally available. Identiv’s Smart Card-Based Products For Physical And Logical Access Control Utilized around the world, Identiv’s smart card-based products and solutions enable security and identification applications, transaction systems, e-health and e-government applications. Identiv’s smart card reader portfolio features the broadest variety of contact, contactless, and mobile smart card reader and terminal technology, and digital identity and transaction platforms. Available in varied form factors, Identiv’s comprehensive, end-to-end portfolio of credentials can be used for physical and logical access control, converged access solutions for building and computer access, transit payment, brand protection, time and attendance, cashless vending, and Internet of Things (IoT) applications. Identiv’s cards are available as single-technology credentials, multi-technology, or credentials with a contact chip for high-assurance deployments using digital certificates. DTC joins Identiv’s 400+ distribution partners and customers in over 50 countries worldwide. “Identiv shares DTC’s enthusiasm of forging into the connected future of physical and logical access control,” said Dr. Manfred Mueller, Identiv COO and General Manager, Smart Card Readers and Transponders. “For the first time ever, Identiv will offer its complete portfolio of smart card reader technology and credentials to the Middle East, made possible by this exciting new partnership.” DTC Aims To Bring RFID Technology, Classified Document Protection And High Security Access Control To The Gulf Region “DTC is focused on bringing radio frequency identification (RFID), brand authenticity, document protection, secure credentials, and the highest security access control to the Middle East,” said Sultan M. Al Ammari, DTC Operations Manager. “We are thrilled to partner with Identiv, the most trusted global provider of physical security and secure identification solutions, and provide our partners with Identiv’s cutting-edge smart card reader and credential technology.” Identiv is proud to be connected to a growing number of national distribution partners who support the company’s smart card reader, credential, and radio frequency (RFID), near field communication (NFC), and inlay business units. This expert network of security solution distributors supports the industry by delivering progressive, innovative technology to their customers.
Aiphone Corp., the international manufacturer of intercom and entry security products, announced upgrades to its popular GT Series multi-tenant video intercom featuring hassle-free, quick system programming and staff communication between multiple buildings. Convenience is enhanced as dealers and/or building management can remotely update tenant directories using a logical network. Updating tenant names and dialing numbers can also be accomplished onsite using an NFC-equipped Android phone or tablet. Costs of added security guards or concierge staff can be eliminated as GT Series installations connected over the same logical network enable staff in one office to speak with tenants and personnel in multiple buildings. Demand For Added Convenience And Features Bruce Czerwinski, Aiphone’s U.S. general sales manager, said dealers, building managers and tenants are demanding added convenience and features from their security systems. “We’ve listened and are responding with advances to make the GT Series easier to update, screen visitors and answer tenant calls throughout an entire campus or residential complex,” he said. “The feature-rich GT Series is ideal for high-rise office towers, apartment and condominium buildings, independent senior living facilities and student housing.” Securing Larger Properties The GT Series can now be expanded to handle the needs of larger properties, supporting up to 480 entrance stations, 96 video guard stations and 5,000 tenant stations. Earlier this year, Aiphone introduced three video entrance stations with improved camera quality to make visitor identification more precise. Slim design tenant stations, available in 7- or 3 ½-inch LCD screens, fit in virtually any facility. GT Series Features Integration with CCTV cameras to provide a wider view of the entry area A simple, wired intercom solution, eliminating the need and added expense of a telephone line Direct tenant station calls answerable only in the residence or office, ensuring all visitors are properly screened Keyless tenant entry with an optional card reader or keypad “As we continue to add features and convenience to the GT Series, we haven’t forgotten the role of a video intercom, which is to keep people safe and secure,” Czerwinski said. “Whether mounted at a lobby entrance or a delivery door, the GT Series allows tenants to confidently identify visitors before allowing them into the building.”
NXT-ID's IoT Stamp module employs Nordic's nRF52832 SoC to deliver connectivity solution for space-constrained low power IoT applications Nordic Semiconductor announces that Melbourne, FL-based security technology company, NXT-ID, has selected Nordic's nRF52832 Bluetooth low energy System-on-Chip (SoC) to provide Bluetooth low energy and Near Field Communication (NFC) wireless connectivity for its 'IoT Stamp' module. The module is designed for integration into wearables, portable devices, and Internet of Things (IoT) applications. Drop-In Solution The IoT Stamp is said to have the smallest footprint of any combined Bluetooth low energy and NFC module on the market, suitable for ultra-compact, low energy applications, for example smartcards or smartwatches. The module is designed as a 'drop-in' solution to help manufacturers with little or no RF engineering expertise reduce development time and speed time-to-market for connected products. The module supports a range of personalized services including identity management, multifactor biometric authentication, and payment methods including Bluetooth low energy, NFC, and dynamic magnetic stripe. With a 10mAh battery the IoT Stamp can last for several months prior to recharge, thanks to the ultra-low power operating characteristics of the nRF52832 SoC, as well as other low power techniques including motion activation, a low power touch control user interface, and patent pending ultra-low power 'buttonless' wake-up technology. "Nordic's technical support proved outstanding and the company's engineers were always very responsive" Nordic nRF52832 Features Nordic's nRF52832 Bluetooth low energy SoC, a member of Nordic's sixth generation of ultra-low power (ULP) wireless connectivity solutions, has been engineered to minimize power consumption with features such as the 2.4GHz radio's 5.5mA peak RX/TX currents and a fully-automatic power management system that reduces power consumption by up to 80 percent compared with Nordic's nRF51 Series SoCs. The result is a Bluetooth low energy solution which offers 90 CoreMark/mA, up to twice as power efficient as competing devices. The nRF52832 SoC combines a 64MHz, 32-bit ARM Cortex M4F processor with a 2.4GHz multiprotocol radio (fully compatible with Bluetooth 4.2, ANT and proprietary 2.4GHz RF software) featuring -96dB RX sensitivity, with 512kB Flash memory, 64kB RAM, and an NFC-A tag for "Touch-to-Pair" operations. When launched, the SoC was the world's highest performance single-chip Bluetooth low energy solution, delivering up to 60 percent more generic processing power, offering 10 times the Floating Point performance, and twice the DSP performance compared to competing solutions. Bluetooth Low Energy Solution "We selected Nordic's nRF52832 SoC because it provided us with both a Bluetooth low energy and NFC solution on a single chip, giving us a smaller footprint as well as the low power consumption we required," says David Tunnell, NXT-ID CTO and Executive VP. "Moreover, Nordic's technical support proved outstanding and the company's engineers were always very responsive." NXT-ID has already partnered with travel and lifestyle community membership vendor WorldVentures to develop the flye smartcard which will be one of the first applications of the nRF52832-powered NXT-ID IoT Stamp. The flye smartcard can be used by WorldVentures' 500,000 worldwide members for electronic payment, rewards, and other purposes. Users can load up to ten records-for example credit, debit, ID, and loyalty cards-on the 'all-in-one' smartcard.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
The security marketplace is talking about a lot of different subjects. Our website’s Expert Panel Roundtable discussions in 2018 reflected some of the “hot topics” in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2018 was about privacy issues and GDPR’s impact on physical security systems. Other hot topics that made the Top-10 list of roundtable discussions included obstacles to adoption of mobile credentials, what’s new “on the edge,” and the value of physical security data. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2018, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2018 (including the quotable panelists named and linked below). 1. How do privacy issues and GDPR impact physical security systems? "GDPR specifically restricts the capture and use of EU residents’ personal data and is in direct conflict with the adoption of artificial intelligence (AI) platforms to track individual activities. The challenge for manufacturers will be to design solutions capable of capturing valuable information for security or business intelligence purposes while simultaneously anonymizing retained data.” - Peter Strom, March Networks 2. What are the security challenges of the hospitality market? "The primary challenge the hospitality industry faces is the fine balance between the delivery of exceptional customer service and maintaining a safe and secure environment. The industry sees a range of threats, including theft, terrorism and natural disasters, and more modern risks, such as those related to cybersecurity, liability and compliance." - Jumbi Edulbehram, Oncam 3. Where is it inappropriate to install video cameras? "The most obvious examples would be in bathrooms or bedrooms, but the more interesting cases are those that are not so obvious – such as religious institutions like a church or a mosque. An increase in the boldness of would-be thieves has led to a recent rise in surveillance outside of houses of worship." - Stuart Rawling, Pelco by Schneider Electric 4. What technology will impact security most in the rest of 2018? "The hottest trend we are currently seeing in 2018 is the continued adoption of intelligent devices and automation into the security framework. We have embraced a model where our software and hardware components continually get smarter and easier for security and IT teams to manage and deploy." - Stuart Tucker, AMAG Technology 5. What are the obstacles to adoption of mobile credentials for access control? "Mobile credentials have been slow to take off because legacy readers traditionally did not have Bluetooth or NFC capacity. However, upgrade kits will soon be available from some access control vendors, and customers will be able to easily upgrade their readers." - Derek Arcuri, Genetec 6. What’s new “on the edge” of security and video surveillance systems? "As more powerful in-camera chipsets are developed, edge devices are capable of even more powerful analytics that can inform operators in real-time of events requiring attention. Part of this significant evolution is from a form of artificial intelligence (AI) called deep learning." - Paul Kong, Hanwha Techwin America 7. Are integrators and end users overwhelmed by too many choices? "Being proactive in tracking new developments and networking with like-minded professionals are critical. Find out what your colleagues are using or testing, and get their feedback on what is working well, especially if their organization is similar to yours. Join local groups, attend industry conferences, and connect on social media to compare notes on emerging technologies." - Brandon Reich, Pivot3 8. What role does social media play in promoting security? "Social media can help us reduce false police dispatches by drawing in a personal circle of people that can validate an alarm, whether it be a neighbour looking out their window to see what’s going on, or a family member that knows your travel plans and is taking care of your house." - Wayne Jared, 3xLOGIC 9. How should your security company measure total cost of ownership (TCO)? “When looking at TCO you need to consider the obvious initial capital cost – compared to alternatives – and also the operational costs across the lifespan of the systems, across one, three and five years. On top of this, though, security can add additional value through integration.” - John Davies, TDSi 10. What is the value of physical security data? "While active protection is the primary job of a security system, the data generated by today’s networked solutions can provide a wealth of intelligence to help organisations optimize both their security strategies and their business operations.” - Mark Perkins, Boon Edam
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable Advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorized user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted Part Of Security Network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorized user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorized individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security By Location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal Items Using QR codes seem to be a simple but reliable identity and access control authentication optionMobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost Savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated Technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading Existing Security Systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid Systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organizations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing The Benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
A futuristic alternative to plastic cards for access control and other applications is being considered by some corporate users in Sweden and the United Kingdom. The idea involves using a microchip device implanted into a user’s hand. About the size of a grain of rice and provided by Swedish company Biohax, the tiny device employs passive near field communication (NFC) to interface with a user’s digital environment. Access control is just one application for the device, which can be deployed in lieu of a smart card in numerous uses. Biohax says more than 4,000 individuals have implanted the device. Using The Device For Corporate Employees Every user is given plenty of information to make an informed decision whether they want to use the deviceCurrently Biohax is having dialog with curious corporate customers about using the device for their employees. “It’s a dialog, not Big Brother planning to chip every employee they have,” says Jowan Österlund, CEO at Biohax. Every user is given plenty of information to make an informed decision whether they want to use the device. Data capture form to appear here! “Proof of concept” demonstrations have been conducted at several companies, including Tui, a travel company in Sweden that uses the device for access management, ID management, printing, gym access and self-checkout in the cafeteria. Biohax is also having dialog with some big companies in the United Kingdom, including legal and financial firms. Österlund aims to have a full working system in place in the next year or so. A Swedish rail company accepts the implanted chip in lieu of a paper train ticket. They accept existing implants but are not offering to implant the chips. Österlund says his company currently has no plans to enter the U.S. market. The device is large enough to locate easily and extract if needed, and small enough to be unobtrusive Access Control Credential The device is inserted/injected below the skin between the index finger and the thumb. The circuitry has a 10-year lifespan. The device is large enough to locate easily and extract if needed, and small enough to be unobtrusive. The only risk is the possibility of infection, which is true anytime the skin is pierced, and the risk is mitigated by employing health professionals to inject the chip. Use of the device as an access control credential or any other function is offered as a voluntary option; any requirement by an employer to inject the device would be illegal, says Österlund. It’s a convenient choice that is made “based on a well-informed decision by the customer.” Aversion to needles, for example, would make some users squeamish to implant the device. More education of users helps to allay any concerns: Some 10% of employees typically would agree quickly to the system, but a larger group of 50% to 60% are likely to agree over time as they get more comfortable with the idea and understand the convenience, says Österlund. Protection Of Information The passive device does not actively send out any signals as you walk. It is only powered up by a reader if a user has access rightsIn terms of privacy concerns, information contained on the device is in physical form and is protected. The passive device does not actively send out any signals as you walk. There is no battery. It is only powered up by a reader if a user has access rights. With use of the device being discussed in the United Kingdom, there has been some backlash. For example, Frances O’Grady, general secretary of the Trades Union Congress (TUC), has said: “Microchipping would give bosses even more power and control over their workers.” A big misconception is that the chip is a tracking device, says Österlund. It isn’t. “We love people to get informed,” says Österlund. “If they’re scared or apprehensive, they can just read up. It’s not used to control you – it’s used to give you control.”
Consumer electronics are closely related to physical security. For one thing, electronics consumers increasingly see security as one of the functions they want their smart home systems to perform. We have heard the Internet of Things (IoT) buzzword in our market, and it is also a major force in the changing consumer electronics arena. Because consumer electronics are increasingly tied in with security, many in our industry keep a close eye on developments at the huge Consumer Electronics Show (CES) that kicks off every new year in Las Vegas. There are more security-related announcements than ever at CES, and the show sometimes offers a preview of what’s to come in the world of video. The video technologies our industry uses are generally introduced first in the consumer electronics field, and then are adapted to the more specialized video surveillance market. Over the years, the CES show has provided us the first glimpse of high-profile technologies such as 4K video, and the 2017 show (5-8 January) was no exception. Intelligent Home Automation Systems One of the biggest names in security – ADT – made news at this year’s CES. The provider of automation solutions for homes and businesses welcomed the Amazon Echo and Echo Dot products into its ADT Pulse ecosystem. Homeowners will now be able to arm and disarm their home security system with simple voice commands and a security PIN. It’s just one example of how the “smart home” trend (and IoT) is evolving in lockstep with security. Alarm.com is also promoting a drone that can respond to events around a home or business, providing video from “flying cameras” Vivint, a home security company, announced its new “Sky” smart home assistant product that employs artificial intelligence and manages connected devices. More intelligence was a big emphasis at CES, also including Alarm.com’s “Insights Engine.” It uses intelligence to analyze (and “learn” from) behavior and activity patterns of connected devices in the home. Alarm.com is also promoting a drone that can respond to events around a home or business, providing video from “flying cameras.” Video Wallpapers And 4K Ultra-rich Screens Also at CES 2017, NXT-ID demonstrated a miniature module within a wearable smart band that combines Bluetooth Low Energy (BLE) and Near-Field Communication (NFC) to enable “intelligently-connected” devices. Which of the video introductions at CES 2017 offer hints of what’s ahead for the surveillance industry? How about a “minimalist” TV, essentially a 2.5mm-thick “video wallpaper” that includes an OLED (organic light-emitting diode) display and attaches to the wall using magnets? (How might such a product impact what security control rooms of the future might look like?) Sony and Samsung unveiled “more realistic” displays including 4K “ultra-rich” screens. Futuristic Technology Virtual reality was a big theme at CES, with companies coming out with new headsets and tools for creating better and more immersive experiences. The search is on for business applications – might security uses be among the possibilities? Increasingly sophisticated robots were featured at CES, including robots with realistic facial expressions that hold intelligent conversations. Robots have invaded the security market already, but how will new capabilities expand the ways they are used? (There were even cars that can read your lips – also among the highlights of CES 2017.) Looking ahead to the new year, technologies we use for security will continue to change in new and interesting ways. If CES 2017 offers an early clue, we will have plenty to talk about.
No doubt about it, the ASIS International show is smaller than in years past. And there is (the usual) grumbling about slow attendee traffic (and the also predictable counter-arguments about “the quality of the leads.”) Some of the security and safety technology being featured was introduced earlier at ISC West, but there is still plenty to see in the exhibit hall. Growth Of Mobile Credentials Mobile credentials are a hot topic again, and Lenel has joined the growing number of companies supplying a mobile credentialing system to the market. Lenel’s Blue Diamond mobile credentials are based on technology developed by United Technologies sister company Supra. The use of a cell phone (by Supra) to open a real estate key box has already been adapted to the hospitality industry (with a deployment at Hilton Hotels), and now as an access control credential, part of Lenel’s OnGuard Version 7.3 release for the commercial and industrial security market. The components of the system are a Bluetooth reader, a virtual credential provided through a smart phone app, a cloud-based credentialing portal, and integration with the latest version of OnGuard. Offering a full solution is simpler to implement, and Lenel even has an “in-line” Bluetooth reader that can be used to add Bluetooth capabilities to existing systems. It’s just one aspect of the OnGuard 7.3 release that also is “reinventing the OnGuard experience,” according to Ross McKay, Lenel Systems International’s Director of Project Management. Future Adoption Mobile credentials are big talk at ASIS, but how long before they will be widely used? Estimates are all over the map, but research firm IMS has projected the percentage adoption of mobile credentialing at 19 percent by 2020 (according to McKay of Lenel). "Our industry is slow to adopt, but if you show mobile credentialing to end users, they get it immediately, anything you can give them on a phone, they will use" But Steve Van Till, president and CEO of Brivo, which launched its mobile credentialing system at last year’s ASIS, sees a range of possibilities in terms of adoption. Witnessing the fast adoption of smart phones as alternatives to perform a large number of daily tasks, some say mass adoption could only be a couple of years away. On the other hand, in our market, a lot of people are still using proximity cards (despite introductions of superior alternatives over the years). That legacy argues for slow adoption indeed. “Our industry is slow to adopt, but if you show mobile credentialing to end users, they get it immediately,” says Van Till. “Anything you can give them on a phone, they will use.” Because ASIS is an end user show, exhibitors tend to reflect on the changing dynamic of selling to end users. Changing Purchasing Dynamics How end users buy products may be changing -- obviously the IT department is having a greater influence than ever before. But what hasn’t changed is the importance of creating a system that will keep end users satisfied as they use it day-to-day for years after the installation is complete. IT may be yielding more influence, but at the end of the day, it’s the security customers -- the attendees at ASIS -- who must be satisfied. “While the IT infrastructure and personnel are involved in how decisions are made, security personnel are still heavily involved,” says Sharad Shekhar, CEO of Pelco by Schneider Electric. “On a day-to-day operations level, it’s the security user who either truly benefits or gets truly hurt by the product. We face IT challenges up front, but the day-to-day utility of our products in the market is judged by the security people, not the IT people.” Shekhar says feedback from those day-to-day end users is one factor that makes a show like ASIS so important. “We need to get continuous feedback to guide our future product development,” says Shekhar. “The type of people who do security -- they like stability. They like certainty because it’s the nature of the business. They want to apply solutions that have been vetted, that are proven. Customers can’t afford to make a mistake.” "The type of people who do security - they like stability. They like certainty because it’s the nature of the business" At ASIS, Pelco is showing its VideoXpert open video management system (VMS) platform, integrated with the Optera multi-sensor panoramic camera. The ability of the VMS to display a seamless multi-sensor image is getting good feedback from customers. Pelco’s core strategy is to focus on four major verticals -- gaming, city surveillance, oil and gas, and ports. They devote a range of resources to each of the major verticals, including multi-functional teams including research and development, engineering, product support and marketing personnel. A fifth core vertical in the United States is corrections, and Pelco also sells in secondary verticals such as education, healthcare, etc., although they are focusing more on the core verticals. Education And Training Education is an important aspect of the ASIS show, there are rooms and rooms of educational sessions on a range of topics going on concurrently with the trade show. But education is also happening on the show floor, often in the form of presentations from vendors in theater-like areas of their booths. Promise Technology, a manufacturer of storage systems, is a first-time ASIS exhibitor that is providing educational sessions in their presentation theater in cooperation with VMS partners. “There is a lot of information in education and training,” says John van den Elzen, Managing Director, Worldwide Surveillance Business Unit, Promise Technology. “End users like to know how a solution is working. They don’t want to hassle with it if it doesn’t work. We qualify all the VMS vendors before the product comes to market. We know it works. We have a good relationship with the VMS vendors and work together if there is a problem -- no finger-pointing.” Promise provides RAID storage systems that are specifically targeted to the security market, and promote the products using security terms rather than IT terms. And they listen to feedback, whether at a trade show or at the many education events they have held globally to growing numbers of attendees. “This is very successful,” says van den Elzen. “People have a lack of knowledge and we look to fill in that gap.” There’s more knowledge to be had, and more exhibitors to visit in the second day of ASIS.
Located in the South East of England, Basingstoke and Deane is a local government district and borough in the county of Hampshire. With Basingstoke as its largest town, the area is known for family-friendly living and is home to over 175,000 people. Basingstoke and Deane Borough Council consists of 60 elected members who discuss local politics, municipal budgets and taxes at regular meetings. For full transparency with the members of their constituency, the council streams live video of all its meetings, including public votes, on their YouTube channel. Automatic camera control To ensure a high level of video production, the Borough Council decided to upgrade their conference system. After discussing their requirements with Andover-based system integrator VP Bastion, a fully IP-based DICENTIS Conference System from Bosch was installed. The system meets the council’s key priorities by offering the highest audio quality, full integration of live voting, built-in automatic camera control and direct streaming with speaker-name indication. Council members wanted the freedom to sit anywhere in the council chamber during council sessions Additionally, council members wanted the freedom to sit anywhere in the council chamber during council sessions – while still being automatically identifiable on camera – and the installation needed to accommodate for the limited desk space and cabling voids. The system includes 63 DICENTIS Discussion devices with touchscreens (to support the required voting and identification capabilities for council members), nine DICENTIS discussion-only devices for guest speakers, and automatic camera control software. High directive microphones All the discussion devices are mounted on raised brackets to maximize desk space and are equipped with high directive microphones to deliver crystal-clear audio. Council members have the freedom to sit at any seat in the meeting room, as the system automatically registers their presence at a specific location thanks to the NFC (Near Field Communication) card registration on the discussion devices. When a speaker activates its microphone, the system’s automatic camera control points the camera towards their location, zooming in and displaying their image on the big screen. Additional features were added to the installation thanks to DICENTIS’ compatibility with third-party software. Two companies – Arbor Media, European market leader in conference recording and streaming services, and MVI Engineering, expert in creating conference software solutions – worked together to create a webcasting and conference control software package that was integrated with the DICENTIS system. Integrated conference system The new DICENTIS system has supported a seamless and transparent democratic process This solution helped to fulfill all the Borough Council’s requirements, including report generation via live image feed and identification by name and party affiliation on the council’s YouTube channel. In addition to displaying the DICENTIS-enabled voting results on the council chamber’s big screen, it is now possible to share the voting results on the YouTube Live feed. Since the installation, the new DICENTIS system has supported a seamless and transparent democratic process at Basingstoke and Deane Borough Council. “Having a fully integrated conference system with audio-video feeds from meetings automatically streamed to the council’s YouTube channel was a must,” says Iain Steele, Director of VP Bastion. Behind the scenes, via the third-party MVI Engineering application, the system automatically upgrades to the latest software versions. These centralized updates save time and operating costs. With the potential to increase the system’s functionality and size in the upcoming years, the council has a future-proof and expandable conference solution from Bosch, which already supplies around 50 percent of councils in the United Kingdom and Ireland.
Mobile-device and application-security technology company Trustonic announces that Hyundai Motor America will demonstrate its new Digital Key app, secured by Trustonic Application Protection, at the New York International Auto Show 2019. The Digital Key will launch with the all-new 2020 Hyundai Sonata in the fall. Hyundai’s Digital Key is a downloadable smartphone app that can replace a traditional car key by leveraging Near Field Communication (NFC) to detect an authorized smartphone. An NFC antenna is located in the driver’s door handle for locking and unlocking while a second antenna for starting the engine is located in the wireless charging pad in the center console. Seamless Vehicle Sharing The Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication Once authorized, the Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication. A user can lock and unlock the vehicle, activate panic alert and start the engine within a range of about 30 feet of the car. The new Digital Key can be utilised by up to four authorized users, facilitating seamless vehicle sharing. Users’ preferred settings are also stored in the car, meaning that when a user is recognized, the vehicle automatically adjusts settings for side mirrors, radio presets, sound settings, and seat positioning. Hyundai is using Trustonic Application Protection (TAP) to secure the Digital Key. TAP ensures that Digital Key transfer requests are securely displayed to and approved by a real, authenticated user on a trusted device. Cybersecurity Approach TAP utilizes a multilayered industry-recognized security approach for communication to and from the customer’s phone. “Hyundai has been a leader in connected car technology for a long time now, with new features like Apple CarPlay, Android Auto, Smartwatch and Smart-speaker integration into our vehicles,” said Manish Mehrotra, director of digital business planning and connected operations, Hyundai Motor America. “Digital Key adds convenience for 2020 Sonata owners and allows us to be ready for future shifts in the mobility space, such as car sharing. We chose Trustonic because of their multilayered, industry recognized cybersecurity approach.” Vehicle-Function Permissions Hyundai’s Digital Key will enable easy car sharing and improved user experiences" Car owners have a deeper level of access than other authenticated users, enabling them to set vehicle-function permissions and the duration of access for each shared user. This enables uses beyond car sharing, such as enabling couriers to access the trunk within a pre-agreed window of time to deliver a package. Future uses that the app could enable include car rentals, triggering an alarm when a vehicle travels outside a designated area and remote control of features, such as autonomous parking. Ben Cade, CEO, Trustonic, adds, “Consumers expect to be able to manage their lives on their smartphones, and this includes their vehicles. Hyundai’s Digital Key will enable easy car sharing and improved user experiences for drivers—and as international leaders in app security, it’s up to us to ensure this can happen in a scalable and secure way.”
HID Global, a global provider of trusted identity solutions, announced that Tasmania’s Old Kempton Distillery (OKD) has deployed its Internet of Things (IoT) enablement platform, HID Trusted Tag Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against gray market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. Taking Measures To Prevent Counterfeiting HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience"“Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognized the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery. “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag Services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalized communications that helps the distillery build brand loyalty in a privacy-preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC. “HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” Working Of The System The distillery’s solution incorporates HID Trusted Tag Services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. A HID cryptographically secure Near Field Communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. Combining Cloud Authentication With NFC Tags The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied“HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focused on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global. “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.” HID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
HID Global, a worldwide provider of trusted identity solutions, was selected by Skanska, one of the world’s project development and construction groups with operations in Europe and North America, to incorporate HID’s mobile solution for secure access to its new office complex in Warsaw. Powered by Seos, HID Mobile Access improves the user experience and increases security throughout the entire building – from the parking lot and elevators to areas with limited access to the public. Located at 173 Solidarności Avenue in Warsaw, the new Spark office complex is not only the new headquarters of Skanska, but a large part of the 70,000 square-meter office building has also been set aside for other tenants. Because the building is intended to be a mixed-tenant space, it was crucial to restrict access to secure areas from unauthorized visitors. Using Smartphones For Access The Spark building was designed to enable mobile access so that employees can now use their smartphones to open doors and enter secure areas. Skanska, with help from system integrator Sharry Europe, created a new system for building occupants that integrates numerous building applications, including HID Mobile Access. As a result, all building applications have been incorporated into an integrated mobile app, which marked an advancement in creating a more streamlined and convenient experience for the users. HID Mobile Access enhances the security for accessing our entire building" Both Spark building employees and their guests can now move throughout the building with nothing more than a smartphone, without the risk of them gaining access to restricted areas – unless the proper access rights are granted. When users arrive at the door, they simply tap their iOS and Android devices to an iCLASS SE reader using Near-Field Communications (NFC) or Bluetooth Low Energy (BLE) and HID’s ‘twist and go’ feature to gain access from a distance. Any changes to the user’s access rights are remotely managed by the administrator through a cloud-based portal. Integrating All Building Applications Into One “HID Mobile Access enhances the security for accessing our entire building. In one application, we have integrated all building applications, such as parking, virtual reception and other Internet of Things functionality, bringing the whole user experience to a new level,” said Renata Nowakowska, Innovation Manager at Skanska. “One of the most pressing objectives for facility managers in smart buildings is to crack the code on how to enable as many building applications and services on mobile devices as possible in order to simplify how occupants move through a facility and interact with building services,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control. “Skanska’s integration of HID Mobile Access into their mobile platform is a perfect example of how organizations are leveraging the power of mobile credentials and the cloud to realize the full potential of creating a connected and more intuitive experience for their users, while increasing security at the same time.”
HID Global, a global provider of trusted identity solutions, has announced that HID is the world’s first ticketing solution provider to be certified to deliver more secure, lower cost, faster contactless tickets based on an open standard called Calypso Light Application (CLAP). CLAP-certified SOMA Atlas Public transportation authorities around the world no longer need to accept lower security, incompatibility and slower speeds or be locked into a proprietary low-end ticket system. HID’s CLAP-certified solution, SOMA Atlas, is now recognized by the Calypso Networks Association (CNA) as providing interoperability and greater flexibility to transportation operators. “HID Global is bringing a new level of trust to low-cost contactless tickets for public transportation by supporting an open standard that will overtake the proprietary memory cards commonly used for low-end tickets, such as single trip tickets,” said Cesare Paciello, Vice President, Ticketing & Transport with HID Global. “Being the first ticket provider in the world to achieve Calypso Light Application certification positions HID strongly to lead the way to enable mid-sized and smaller public transportation networks to do next-generation automated fare collection.” Contactless CLAP Ticketing Recognized widely and deployed in many countries for secure, fast and flexible ticketing, Calypso is an open standard of contactless ticketing, suitable for multiple applications, especially public transportation in which Calypso cards and NFC mobile phones are used. To extend the success of the Calypso standard and help solve the incompatibility of low-cost tickets, a worldwide group of transport operators in the Calypso Networks Association, a not-for-profit standards body, ratified a set of specifications for the Calypso Light Application standard. CLAP tickets have the same security as high-end tickets, such as sports season tickets, but at a lower cost CLAP tickets have the same security as high-end tickets, such as sports season tickets, but at a lower cost than typical Calypso tickets. CLAP is also simple to deploy because, unlike proprietary memory cards, the use of CLAP tickets does not require development work to be integrated into an Automated Fare Collection (AFC) System. Automated Fare Collection System To become the first ticketing solution provider to receive the CLAP certification, HID had to pass the technical evaluation that was conducted by Elitt, a CNA-accredited laboratory. HID has been working with Calypso technology since 2014, resulting in the development of the SOMA Atlas, an OS architecture that combines the multi-application capabilities of the KIAT operating system with the Calypso 3.1 standard. HID achieved its first Calypso certification in July 2016 with SOMA Atlas V1, which proved to be one of the fastest products of its kind. RFID, Key Management and Smart Card Tokens As the next logical step in its evolution of an open standards-based approach, HID’s ticketing and transportation team in Italy developed the CLAP-certified SOMA Atlas OS architecture to broaden the customer acceptance of more secure ticketing by small to mid-sized transportation operators. Known as the ticketing solution provider that delivered millions of tickets for the 2018 FIFA World Cup, HID provides end-to-end ticketing solutions, including transportation ticketing terminals, data capturing software, key management capabilities, RFID paper tickets, smart card tokens, smart wristbands, among other components. Its multi-application operating systems can be integrated with existing hardware.
More than seven years after the implementation of the Guangzhou Government shared network phase 1, initially built for the 2010 Asia Games, Airbus has been selected to supply further state-of-the-art secure communications equipment towards a new project called go-for-metro in Guangzhou City. Go-for-metro, featuring two phases, aims in fully securing Guangzhou suburb and rural metro lines. Phase I of this project has undergone work to fully secure nine brand new metro lines with the installation of a DXTA Tetra server and TB3 base stations in 2016. The DXTA is a next-generation, mission-critical communication device and the newest addition to the DXT product family. The ‘A’ in DXTA stands for Advanced Telecommunication Computing Architecture (ATCA), which is widely used in all major global telecom networks. Thanks to the new hardware, the DXTA boasts of improved capacity and provides increased flexibility for both Tetra and hybrid networks. DXTA Airbus Tetra Server To Serve Ten Metro Lines In Phase II Airbus will equally participate in Phase II of this project as they recently won the bid to secure ten existing operational metro lines, and will provide DXTA, and TB3 base stations, and more than 3,000 terminals. The go-for-metro project will make the Guangzhou Government Shared Network the second biggest Tetra network in APAC region, just after Beijing Government Shared Network, also provided by Airbus. The Guangzhou Government network will provide smooth communications in both on-ground and under-ground areas for more than 45,000 subscribers from government authorities. In addition to the government network go-for-metro project, Airbus is also the supplier of Tetra radio communication systems for seven metro lines and provides mission-critical communications for metro users and secures daily operations in Guangzhou. Furthermore, Airbus provided the Tetra radio communications system for the Guangzhou Baiyun International Airport.
Round table discussion
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly play a role in security. We asked this week’s Expert Panel Roundtable: How are smartphones impacting technologies in the physical security market?
How mobile telephones have transformed into “smartphones” is one of the great technology stories of our time. What once was a single-function device now can do almost anything – display video, pay for groceries, monitor our health. The smartphones we carry in our pockets today have more computing power than the “super computers” of yesteryear, and that power has found many uses in a seemingly endless array of “apps.” Some of them are directly related to our physical security systems. We asked this week’s Expert Panel Roundtable: What security applications are best suited to smartphone apps?