Radio frequency Identification
Johnson Controls announces the release of CEM Systems AC2000 v10.1, which contains a number of new features that improve functionality and the user experience and help to mitigate health and safety risks. Support for a range of new third-party products that increase the performance and scope of the CEM Systems AC2000 access control system has also been added. The Health and Safety (H&S) Induction Check application for CEM Systems emerald intelligent access terminals allows cardholders to se...
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to...
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our...
For over a century, IEEE's mission has been to advance technology for the benefit of humanity. As the world’s largest technical professional organization, IEEE’s global community includes over 420,000 members in engineering, computing and technology, collaborating on communications, consumer electronics, robotics, sustainable energy, aerospace, life sciences, and many other critical initiatives. Dave George Felicitated With IEEE Life Membership Dave George has been an active IEEE me...
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese Camera Manufacturers Reality check: The government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use camer...
AES Corporation, global manufacturer of long-range wireless private mesh radio alarm communication products and services, is pleased to announce the appointment of Tim Lyon as the new Regional Sales Manager covering all of the New England, New York, New Jersey, and Pennsylvania territory. AES Corp. New Regional Sales Manager Lyon brings over 16 years of successful sales operations and security experience to AES. In his new role, he is responsible for engaging new business development efforts,...
HID Global, global provider of trusted identity solutions, announced that it has won the 2018 RFID Journal Live! Best New Product award for its new Mini Tamper-Evident Beacon, the industry’s first Bluetooth beacon to provide anti-theft protection for IoT-based location services and conditioning monitoring applications. “The latest addition to our IoT services for asset management addresses the escalating need to protect sensitive assets and equipment in more connected and intelligent environments,” said Marc Bielmann, Vice President and Managing Director for Identification Technologies at HID Global. “This accolade validates HID’s evolution in our identification and sensing technologies portfolio, which is focused on driving more secure, intuitive and efficient operations.” HID Mini Tamper-Evident Beacon HID’s Mini Tamper-Evident Beacon can be fully integrated into HID Location Services and HID Condition Monitoring Enabled by Bluvision, HID’s Mini Tamper-Evident Beacon can be fully integrated into HID Location Services (for item management) and HID Condition Monitoring (for managing the operational performance and health of equipment). Once integrated, real-time alerts and notifications can be sent when a beacon has been damaged or removed from an asset. John Sailer, Chief Operating Officer of Bluvision added, “The beacon packs a cost-effective solution into a small form factor to reduce risks and increase security using innovative conductive technology that enables the revolutionary deployment of tamper-evident IoT ecosystems. The combination of its size and security capabilities is what makes the beacon highly desirable to customers.” Inventory And Asset Tracking HID’s Mini Tamper-Evident Beacon is ideal for managing critical, proprietary and high value assets across three primary use cases: HID Location Services to track assets, inventory and equipment with 1-2-meter accuracy using real-time location services. HID Location Services to monitor gateways or portals, and to know when assets are near specified areas using proximity-based location services. HID Condition Monitoring to track the temperature, motion and vibration of vending machines, HVAC systems, equipment and motorized machinery to help determine the health and performance for more data-driven maintenance. The new Bluetooth beacon was selected by a panel of independent judges who recognized the most groundbreaking solutions that deliver business value, reduce cost and improve efficiencies.
Hytera Communications Corp. Ltd., Hytera America, Inc., and Hytera Communications America (West), Inc. (collectively, "Hytera") has filed a petition at the US International Trade Commission (ITC) requesting review of a Final Initial Determination issued on July 3, 2018 by ITC Administrative Law (ALJ) Judge MaryJoan McNamara that features in Hytera's Digital Mobile Radio (DMR) products sold in the US infringe patents of Motorola Solutions, Inc. (MSI). Hytera Files Petition at US ITC Hytera's position remains that its products sold in the US do not infringe MSI's patents, and that the initial determination is incorrect. MSI originally asserted seven patents in its complaint but later withdrew three. ALJ McNamara ruled that a limited number of claims in the four remaining patents at issue are infringed, but also determined that MSI did not satisfy the technical industry prong of the domestic industry requirement as to another of its patents and did not find Hytera to have violated the statute with respect to that patent. During proceedings in this case, before the period for factual discovery ended, Hytera had produced for the ALJ's consideration documents and source code related to several new designs. In addition to asking the ITC to reverse the ALJ's initial determination, Hytera has also petitioned the Commission to affirm that these latest products are not infringing. Hytera is confident that our designs for our next-generation DMR product portfolio do not infringe any of the asserted patents of MSI" Digital Mobile Radio Products "Hytera is confident that our designs for our next-generation DMR product portfolio do not infringe any of the asserted patents of MSI," said Tom Wineland, Vice President of Hytera Communications America (West), Inc. "MSI did not oppose our new designs based on six of the asserted patents." In June of 2018, Hytera announced a new range of features for its digital mobile radio (DMR) portfolio, including its mobile radios, portable radios, and repeaters. These new features include extending full-duplex calling into repeater-mode operation (RMO) and direct-mode operation (DMO), enlarging full-duplex coverage beyond trunking mode without requiring extra hardware. Hytera also extended its over-the-air programming capability to conventional repeater operation, allowing individual radios to be reprogrammed remotely. Furthermore, optimized push-to-talk (PTT) functionality allows users to talk instantly after PTT even before a call is established. Hytera Portable Radios and Repeaters Hytera's new features for digital mobile and portable radios and repeaters promote higher productivity "Hytera's new features for digital mobile and portable radios and repeaters promote higher productivity, help improve the safety of users, and offer a better user experience," added Hytera's Wineland. "They boost Hytera’s leading position in providing innovative, versatile, high-quality DMR solutions that also present a compelling value to our dealers and customers." Hytera's petition before the ITC remains confidential by terms established by the Commission, which typically completes reviews within 120 days. Since the Commission has not issued its final decision, there is presently no constraint on the import or sale of any of Hytera’s products. Hytera also learned in May of 2018 that the US Patent and Trademark Office's Patent Trial and Appeal Board has accepted three Hytera petitions to invalidate MSI's patents based on prior art. "Hytera looks forward to the disposition of this case at the ITC and to resolving the series of nuisance litigations our competitor has filed against us," adds Wineland. "Hytera is focused on innovation and prefers to compete fairly in the marketplace rather than in the courtroom. Hytera is confident that our products do not infringe."
Siklu Inc., the global supplier of mmWave wireless solutions, has awarded Convergint Technologies, worldwide service-based systems integrator, as their Top Security Systems Integrator Partner in North America in 2017-2018. This decision was based upon the successful partnership between the companies over the past 2 years. Siklu Wireless Fiber Solutions Siklu’s wireless fiber solutions were chosen by Convergint in a number of video surveillance projects across North America, including University Village in Seattle, the cities of Gardena, Lakewood, Bakersfield and many more. Recent projects include the Columbus International Airport, where Convergint upgraded local area network connectivity by installing Siklu’s multi-gigabit radios in two days. This solution provided interference-free connectivity as a fiber extension throughout inclement weather conditions. A broad selection of Siklu mmWave wireless products with a range of frequencies and distances are supported in the partnership, including P2P as well as P2MP, leveraging narrow beams in the uncongested frequency bands of 60-70/80 GHz, which are immune to heavy Wi-Fi signals. Transmitting high bandwidth information across security networks, the mmWave solutions are ideal for mission critical and smart cities deployments that demand secured always-on connectivity. We are extremely pleased with the overall performance of Siklu’s solutions" mmWave Wireless Products “We are extremely pleased with the overall performance of Siklu’s solutions,” said Tony Varco, VP Security Division at Convergint. “Our customers increasingly demand advanced solutions that perform at a high level combined with a low cost of ownership, and Siklu’s technology delivers in both areas. They offer a scalable, high-capacity wireless solution without compromising reliability and enables Convergint to continue to deliver high-quality service.” “We’re pleased to work with Convergint as one of our leading security partners,” said Eyal Assa, CEO of Siklu. “Siklu expands the infrastructure offering for Convergint customers, enabling them to benefit from industry-leading performance to create a network which is ready for the next generation of IoT.”
Over 3,800 Sony network security cameras contribute to a greater sense of public safety – and lower crime rates – in the Republic of Honduras’ two biggest cities of San Pedro Sula and Tegucigalpa. In order to combat high crime levels, the Honduran government Ministry of Security established the country’s 911 National Emergency System in 2015. Uniting police, fire and ambulance departments, Red Cross and other public bodies, the system improves the handling speed and efficient resolution of 911 emergency calls. At the system’s heart is a powerful situational management platform that collates all incidents reported by phone, radio or detected by the network of cameras. Allowing a swifter response to reported incidents, the cutting-edge system offers further benefits. The cameras’ excellent Full HD imaging performance made them ideal for this challenging large-scale application An Effective Tool Round-the-clock monitoring of many different locations gives Honduran authorities a deep understanding of crime or emergency patterns. In addition, the platform is an effective tool in auditing each agency’s performance while handling incidents, thus helping to improve processes. The ‘eyes’ of this extensive security system are over 3,800 Sony video security cameras. The cameras’ excellent Full HD imaging performance made them ideal for this challenging large-scale application. Sony’s unique XDNR, Wide Dynamic Range and Visibility Enhancer technologies optimize picture quality in all lighting conditions, from sun-drenched city streets and backlit entrances to dim low-light conditions. Ideal For City Surveillance “We determined that Sony was a very reliable company with a strong reputation in the security industry,” notes Otoniel Martinez, regional business director at security integration specialist Grupo Visión. “In addition, the directors of this national project love the quality and resolution of the Sony cameras.” “The weather- and vandal-resistant SNC WR632C rapid dome camera combines powerful 30x optical zoom with gyro stabilisation. This ensures stable close-ups of suspicious activity, even when cameras are subject to strong winds and mechanical vibration on tall mounting poles. The solution has delivered excellent quality and performance"“Before making our decision, we carefully compared the performance of several security brands,” confirms Oscar Alcerro, Director of Operations at Dynamic Corporation that worked with Grupo Visión to deliver the major project. “With valuable features like high-power zoom and fast autofocus, these Sony cameras are ideal for city surveillance. We had already used Sony on previous projects, and were convinced they are excellent in every respect.” Improves Citizens' Security SNC-VB630 and SNC-VB640 box cameras feature Sony’s highly sensitive Exmor CMOS sensor technology for clear low-noise Full HD images, even in high-contrast scenes with areas of intense sunlight and dark shadow. Based on careful analysis of ‘hotspot’ areas, the cameras’ visible location – at bus stops, streets, retail centres, parks and residential areas – improves citizens’ sense of security. “Our expectations have been 100 percent met,” confirms Juan Carlos Degrandez, Deputy Director of the 911 National Emergency System. “The solution has delivered excellent quality and performance, with very few failures”. Since launching the 911 project, both Honduran cities have experienced a significant drop in crime rates.
AMAG Technology, a security solution provider specializing in access control, video management, policy-based identity solutions, visitor management and incident and case management, welcomes TagMaster as its newest member of the Symmetry Preferred Partner Program. TagMaster’s XT 1 and XT Mini long-range readers integrate with AMAG’s Symmetry™ Access Control software. AMAG Technology and TagMaster cooperatively tested and approved this integration. The quick and easy configuration of our TagMaster long distance RFID readers enables safe and secure access to AMAG Technology’s Symmetry Access Control Long-Range Reader Integration “We welcome TagMaster into the Symmetry Preferred Partner Program and look forward to a long, mutually beneficial partnership,” said AMAG Technology Vice President, Products and Partner Programs, Jason Schimpf. “Joint customers will benefit from the Symmetry Access Control and TagMaster Long-Range reader integration when controlling vehicle access is critical to having a secure environment.” “We are very happy that TagMaster has become part of the Symmetry Preferred Partner program and to be AMAG certified for our RFID long distance readers,” said Peter Grøntved - International Sales Director EMEA, Traffic, TagMaster. “The quick and easy configuration of our TagMaster long distance RFID readers enables safe and secure access to AMAG Technology’s Symmetry Access Control. Partners and security professionals now have an outstanding opportunity to connect TagMaster RFID long range readers to their local Symmetry Access Control when needing long range identification for automatic vehicle detection.” The readers communicate with Symmetry to secure locations like hospitals, schools, gated communities and airports Vehicle Tracking TagMaster’s XT 1 and XT Mini RFID long-range readers integrate with Symmetry to provide flexible long-range access to secure areas from 10-26 feet, and are perfect for tracking vehicle entry into parking lots or large scale systems. The readers communicate with Symmetry to secure locations like hospitals, schools, gated communities and airports. About TagMaster TagMaster designs and provides advanced identification systems based on radio and vision technologies; RFID, ANPR and Infomobility, for use in demanding environments. TagMaster’s innovative solutions use RFID (Radio Frequency Identification), ANPR (Automatic Number Plate Recognition) and Traffic Monitoring technologies to optimize mobility and communication – thus creating safer societies with smoother traffic flows and more sustainable urban environments.
As physical stores look to push the boundaries of retail design, demand for non-intrusive security systems at the store entrance/exit is growing. Checkpoint Systems, a supplier of source to shopper solutions for the global retail industry, has responded with the launch of an underfloor RFID antenna, UF-1. Delivering the same market-leading quality as Checkpoint’s more traditional EAS antennas, but using unique, patented RFID reader technology, the UF-1 system offers a large read range, with the added benefit of harnessing the power of RFID data to improve inventory management within a completely invisible solution. Checkpoint Wirama RadarTM technology UF-1 is suited to a wide array of projects; from those wanting aesthetically pleasing, open entrances to malls that restrict the use of traditional EAS antennas across their openings, and retailers that need wide, obstruction free store doorways. Using patented Checkpoint Wirama RadarTM technology, the underfloor RFID-enabled solution can identify the direction of a tag passing over the antenna, whether into the store, out of the store, or along the door. It is also able to determine if an item is simply located nearby the exit or potentially being stolen – minimizing false alarms. Simon Edgar, Senior Director - Product Management at Checkpoint Systems, commented: “We’re hugely excited to be launching this new underfloor RFID solution that will enable retailers to become even more creative with their store designs and help them improve their customers’ in-store experience. UF-1 is advanced floor-based solution and we expect it to be extremely popular among RFID early adopters.”
The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirely new security risk for businesses and governments. Drone Security Risks Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations within our borders to create terror and panic is very possible. Security professionals and technologists are working furiously to address the gaps in drone defense. Currently, the most common technologies in use for drone detection are video, acoustic sensors, radio, and air surveillance radar. Each of these has advantages, but they also have flaws that make it difficult to detect drones in all conditions. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow. And while radio and air surveillance radar cover a wide area of detection, they suffer from high installation costs and limiting technical challenges, such as being unable to detect low flying drones on autopilot. Compact Surveillance Radar (CSR) Compact Surveillance Radar (CSR) is a security technology addressing the problems with other types of detection. CSR, like traditional radar, has the benefit of being able to detect and track foreign objects in all weather conditions, but at a fraction of the size and cost. The compact size allows the radar to be mounted on existing structures or even trees, providing extensive perimeter defense almost anywhere that you can imagine. CSR can also filter out clutter such as birds by using an advanced algorithm reducing the number of false alarms. While the use of CSR and the other detection technologies are legal in the US and in most locations throughout the world, the response mechanisms are generally not. Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies Regulations Limiting Drones Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies. This makes it difficult to stop the damage that drones can cause. The FAA has put into place new regulations that limit some uses of drones. However, in most cases it is still illegal for even state or local governments to stop or interfere with drones other than to locate the operator and have them land the drone. In 2016 the first law to neutralize a drone in the United States was passed in Utah to respond to drones in wildfire areas because of their interference with airborne firefighting. This law may very well provide a model for other states dealing with drones in situations where people’s lives are being put at risk by drones. At the federal level, much effort is being put into evaluating the regulations and technology surrounding the misuse of drones. In the 2016 reauthorization bill for the FAA, Section 2135 included a pilot program for the investigation of methods to mitigate the threat of unmanned aircraft around airports and other critical infrastructure. There are many federal agencies that are evaluating the use of a variety of technologies to respond to this threat. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow Effective Countermeasure Technologies The most effective countermeasure for drones is jamming, currently off-limits to the private sector. This includes stadiums, convention centers, and other large gathering areas. A number of companies are developing new response technologies that do not require the use of jammers or hacking. Several companies have developed net guns that shoot a net at an approaching drone. These are only effective at less than 100m and frequently miss the target, especially when the drone is approaching at high speed. Several other companies have taken this method a step further, with drones that capture other drones. Once a radar detects a drone, another defense drone is launched and flies to the point of detection. Then, using video analytics it homes in on the drone and fires a net to disable the drone and take it to a safe location. While this drone capturing technique is still in its infancy, it shows a great deal of promise and will not be restricted in the same fashion as jamming. However, even this solution is difficult under current regulations, as all commercial drones in the US must be under direct control of a human operator within their line of sight. This effectively means that a drone operator is required to be on-site at all times to protect a facility, event, or persons. One thing is for certain, technology will continue to adapt and security companies will continue to invent new methods to protect their facilities and the people they are sworn to protect.
Since the introduction of smartphones with downloadable applications, vendors have been trying to replace the traditional plastic identification (ID) card with a mobile phone application. People might lose or misplace an ID card, but most people immediately recognize if they are without their mobile phone. Mobile ID badges for access control Bluetooth Low Energy iBeacon technology Technical challenges The logical extension is to replace or augment the traditional corporate ID and access control card with a smartphone ID application. There are numerous benefits associated with using a smartphone as an ID badge. Fundamentally, they are more secure because smartphones can be locked, data encrypted and access restricted. Secure ID access can also be remotely installed and activated or deactivated on a smartphone with little effort from the IT or security department. In addition, there is no need to physically visit the security office to get a replacement badge. Mobile ID Badges And Open Systems The industry-wide adoption of mobile ID badges has been hindered by the evolution of existing and available technology and the vendor/partner ecosystems that have controlled the technology and markets. For a general application to achieve significant market adoption, it must have the required open systems and technology infrastructure in place and enabled to achieve scalable and secure deployments. Simply put, a mobile ID badge application needs support from the major phone manufacturers and interoperability with existing industry standard security models and protocols established in the market today. It was not until the promise of near field communication (NFC) that the idea of a mobile ID badge for access control started to take hold as a realistic possibility. After all, if you can replace your credit cards by waving your phone with a digital wallet over a point of sale (POS) device in a retail store, why can’t you replace your corporate ID card for physical access by waving it in front of a door reader? One major issue that hindered the broad adoption of NFC was the lack of support by major phone manufacturers – specifically Apple with the iPhone - which limited the growth of phone-based mobile IDs for door readers that control physical access. To create a practical smartphone-based mobile ID badge app, there are several technical challenges which must be addressed BLE Beacons Development Apple eventually announced a new Bluetooth Low Energy (BLE) iBeacon technology and Google followed suit with its Android-based Eddystone BLE beacon in 2015. BLE beacons are small, low-cost hardware devices that transmit a unique identifier over Bluetooth low energy to nearby electronic devices such as mobile phones. The initial use of BLE beacons were centered around determining location for mobile marketing applications. For example, if a customer is passing a merchandise display, it could notify them of a coupon or sale while they are in the store. Because BLE is universally available on all smartphones, the use of BLE beacons has enabled new experiential smartphone apps based on physical location presence. In the corporate environment, vendors have quickly determined that there are many ways to leverage BLE to simplify workplace-related functions. These include asset tracking, logging into networks and cloud resources, access to print jobs, meeting room usage, attendance systems, and even employee location tracking. PACS Two-way Communication And Universal Access Physical Access Control System (PACS) vendors and security organizations find BLE technology attractive as an access control application because of the two-way communication capability and universal access in smartphones. This is important because the smartphone acts as a reader and can determine presence or location next to a BLE beacon or communicate to a door reader access control device. For this reason, they have quickly determined ways to leverage BLE to enable access control and ID badges for both existing and new PACS solutions. For example, smartphones can be installed with a mobile ID badge application that can communicate with BLE-enabled door readers. One behavioral challenge associated with this solution is that people today are accustomed to using RFID-enabled access control cards as part of their daily lifespans vendors leverage the technology limits of an access control card read distance (1-3 cm) to the door reader to administer physical access. For example, the location of the reader next to the door or the timing of the read and door access strike opening the door, can all be orchestrated behind the scenes to provide a seamless door entry experience. This is the current user expectation and ensures the proper level of security while reducing tailgating, enforcing badge reads and preventing backups or entry queues. All of this happens transparently to ensure the frictionless access control users enjoy today. The “door open” event needs to occur just as a person approaches a door to avoid potential security breaches Mobile ID Badge App Challenges BLE beacons by design broadcast a unique adjustable signal over a wide range of up to 150 feet. While this is ideal for creating mobile ID apps for shopping or presenting location-based notifications and alerts, there are some concerns about when it should be used to provide access control and open a door. The “door open” event needs to occur just as a person approaches a door to avoid potential security breaches. Other key considerations include how to account for multiple doors within close proximity, avoiding a door detection from someone walking behind or away from a door and tailgating events. To create a practical smartphone-based mobile ID badge app, these technical challenges must be addressed. Some concepts being tested and used today include having a door open acknowledgment response via a notification, or waving the phone or using another gesture to acknowledge that you are in front of a door to request accessible still has some challenges to overcome before becoming the de facto industry standard for mobile ID badge access. Once the challenges are addressed, it has the potential to drive the next wave of innovation in access control and enable the next generation of ubiquitous mobile ID badge applications that will provide the seamless and secure access control that we enjoy today with traditional ID cards.
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centers, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrollment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labor. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrollment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity Authentication In common access control systems, access is authorized either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organizations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customization of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
ADT is looking to "bring the voice of the customer" into the continuing development and expansion of Z-Wave, the radio frequency (RF) communication and product-level interoperability technology that enables wireless networking of battery-powered devices in the home. ADT is the newest Principal Member of the Z-Wave Alliance consortium. Z-Wave is one of the enabling technologies of ADT’s Pulse security and home automation system, which enables a home's electronics to communicate with each other and with the user. Z-Wave unifies devices like door locks and lighting controls into an integrated network. ADT is the Z-Wave Alliance’s seventh and newest Principal Member, and also the first service-based company represented on the Z-Wave Board of Directors. The other Principal Members are original equipment manufacturers GE/Jasco, Ingersoll-Rand, Linear, Evolve, FAKRO and Sigma Designs. “As a service provider who touches the end user directly, we bring a different perspective that rounds out the Z-Wave board,”says Steve Shapiro, ADT’s Vice President of Industry Relations. ADT was previously a full-level member and has been active in the Z-Wave Alliance since implementing Z-Wave as part of ADT Pulse. Becoming a Principal Member “reaffirms [ADT’s] commitment to the technology going forward,” he adds. The Z-Wave Alliance oversees development and implementation of the technology. The Alliance is made up of member companies participating at various tiers in technology working groups and accessing the technology to develop products. The Z-Wave Alliance includes 160 full-level members involved in developing products and about 110 Affiliate members (mostly resellers and installers). At the top level of the Z-Wave Alliance are the companies that guide development and implementation of the technology, the Principal Members whose representatives make up the Alliance Board of Directors. Shapiro is joining the Z-Wave Alliance Board. Z-Wave technology is used throughout the security and home automation markets, enabling radio frequency (RF)communication and product-levelinteroperability among battery-powereddevices in the home Z-Wave technology is used throughout the security and home automation markets, enabling radio frequency (RF) communication and product-level interoperability among battery-powered devices in the home, including climate controls, door locks, security sensors, appliances and remote control. There are 1,000 or so products from 100 companies that are Z-Wave certified, which means they communicate within a 50-foot range using low power consumption that allows one- or two-year battery life. Mesh networks of these devices, each communicating and also relaying signals from other devices, can extend the operable range to cover an entire house or small commercial facility. Z-Wave enables greater wireless networking in the home and realization of home automation systems with more capabilities. “ADT adds a complementary view to the board based on their knowledge of customer needs,” says Mark Walters, Z-Wave Alliance chairman. “Having North America’s leader in residential security advising the Z-Wave Alliance at the Board level brings a focus to that market segment in terms of guiding the alliance in both marketing and technical development. Security companies now have someone representing them who understands and directly participates in their business.” Principal Members must be nominated by an existing Principal Member and then approved by the Board of Directors. “We are not just a security company, but a service provider for home and business automation,” Shapiro says. “Security is a great platform for automation, and it’s a natural combination.” He notes that 44 percent of ADT customers opt for the ADT Pulse service, and the number has been climbing quarter over quarter since 2010. “It confirms how the different kinds of systems make sense together,” he says.
The Eurofighter will be equipped with a new generation of radar which will enhance the aircraft’s capabilities and survivability. In the Euroradar consortium, the sensor solutions provider HENSOLDT is pressing ahead with the development of the Eurofighter’s new Captor-E radar system. Following the successful acceptance test, HENSOLDT has now delivered the second antenna ready for series production to Leonardo UK in Edinburgh. This means that the production of the so-called e-scan antenna can commence at the HENSOLDT site in Ulm/Germany according to plan. This paves the way for the delivery of the first radar systems as of mid-2019. Resource Management As early as spring 2018, the radar has successfully completed two flight campaigns at British Aerospace Systems (BAES) in Warton and at Airbus Defense and Space in Manching and met the requirements of the Critical Design Review (CDR) exactly on schedule. The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter. Electronic beam scanning combined with flexible radar resource management provide outstanding detection performance and ensure simultaneous multi-target tracking, missile guidance and perception of the situation. The Eurofighter’s nose is larger than that of all the comparable fighters, which means that the antenna is much larger and consequently more powerful than that of competing aircraft. Radio-Frequency Components This, together with the ability to mechanically rotate the antenna with a larger angle of view, increases both the detection area and the field of regard in comparison with the AESA radar systems used by the competitors. The further development of radar technology is one of the main focal points of the sensor specialist HENSOLDT. For this reason, HENSOLDT operates one of the largest cleanroom production lines for radio-frequency components in Europe. HENSOLDT’s radar systems are deployed worldwide by armed forces, including the US and German Navy, as well as at the bases of the Canadian, Australian and German Air Force. The Eurofighter radar is being developed by the Euroradar consortium comprising Leonardo (Great Britain, Italy), Indra (Spain) and HENSOLDT (Germany). The consortium has already developed and produced more than 400 Captor radars.
The Polizei Bayern successfully opened its first operations centre in mid-September at its Police Headquarters in Central Franconia in Nuremberg. At the heart of the communication system was the Frequentis 3020 LifeX platform including digital radio connections and the newly developed AudioHub. The headquarters in Nuremberg is the second largest operations centre in the German state of Bavaria. It comprises 21 operator working positions that receive and process between 800 and 1,200 police calls per day. In the event of an emergency, an additional 13 operator working positions can be activated. Dispatch Calls Successfully Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours. The system proved its stability and operators were able to dispatch calls successfully without issue. "The professionalism of Frequentis during the preparation, implementation and follow-up commissioning of the system gave us confidence in their abilities. All of the aspects important to us as customers were immediately considered and processed by the Frequentis team. Above all, the usability of the system was well received by the operators.", said Anton Beierweck, Head of State-wide IT Procedures at the Police Headquarters Upper Bavaria South. Provides Highest Protection LifeX was first deployed for Bavarian Police Force in 2015, ahead of the G7 summit. The system was adapted to the needs of the event which required 18,000 emergency services personal to protect government leaders and control demonstrations. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020 "What has been clear from the start of the project is the willingness of the Polizei Bayern to innovate. We are very proud to have met their high requirements in terms of technology and services and appreciate the professional cooperation with the organization who provides the highest protection and security in Bavaria.", Robert Nitsch, Frequentis Vice President Public Safety. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020. Two more operational centres are planned to be brought on line before the end of 2018.
In the booming workspace market, a professional welcome is crucial to success. At Barcelona’s Gran Vía Business Centre, 2,500m2 of offices and shared collaborative workspaces in the heart of the city, managers chose SMARTair wireless access control system — because it protects and manages their premises, and also projects the right image for a contemporary co-working environment. Gran Vía is a flexible and well-equipped home for companies from international corporates to local start-ups. Fiber optic broadband, LED lighting, an on-site restaurant and adjacent rental apartments are also part of Gran Vía’s high-end service. This is why, they sought an upgrade and replacement for an existing, out-of-date access control system. SMARTair Access Control Locks SMARTair access control locks now control access to Gran Vía’s six floors of offices, meeting spaces and communal areasGran Vía needed more flexibility and control over access to their premises; a system to seamlessly manage diverse access needs of permanent versus temporary users, and that would cope with rapid personnel turnover. Locking devices must complement the professional, modern image of the workspace, which attracts high-profile, design-savvy business clients. On top of these demands, any new system would have to be fitted without disrupting day-to-day business. SMARTair access control locks now control access to Gran Vía’s six floors of offices, meeting spaces and communal areas. Access requirements change all the time at the business center, and security managers now have a system where programming and reprogramming access rights is fast and easy. Thanks to the slick, flexible management software behind SMARTair, everything works in the background — keeping site users safe almost without anyone noticing. "SMARTair is an effective solution that is easy to use,” says Esther Portillo, Marketing Director at Gran Vía Business Centre. RFID Operated Wireless Escutcheons SMARTair wireless door and wall devices complement Gran Vía’s contemporary aestheticOver 50 new SMARTair wireless escutcheons are operated with RFID smart-cards, so security is not compromised if an office user loses their credential. Security administrators simply cancel the lost credential’s access rights — much quicker, cheaper and more professional than replacing a traditional mechanical lock. The user gets their new smart-card validated at one of five SMARTair wall updaters: it is the perfect combination of contemporary image and efficient user experience for Gran Vía’s clients. Importantly, SMARTair wireless door and wall devices complement Gran Vía’s contemporary aesthetic. “SMARTair has a modern design and suits our installations perfectly,” confirms Esther Portillo. Bringing more doors into any installed SMARTair system is straightforward, because SMARTair escutcheons fit wood, glass, emergency exit and fire-resistant doors. Gran Vía now has an access control system they can reconfigure and expand to suit both their needs and their clients’.
Hytera, a global provider of innovative Professional Mobile Radio (PMR) communications solutions, announces that it has signed contracts with Secretariat of Public Security of the State of Alagoas, Brazil to provide TETRA communications infrastructure as the expansion of the statewide mission critical communications network and four-year maintenance service. The total contracts value is around 6.5 million US dollars with the infrastructure contract around 1.3 million and the service contract around 5.2 million. “We are excited being chosen as the equipment and service provider of Alagoas’s statewide TETRA system. The state authority shows confidence in Hytera’s ability to deliver advanced and reliable public safety communications networks. For the expansion, we presented the latest development of TETRA technologies,” said John Zhou, the General Manager of Hytera Brazil. “The new contracts as a milestone for Hytera Brazil recognize us not only as a leading TETRA solution provider, but also a trusted service provider, and it is the embodiment of Hytera transformation globally.” In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas TETRA Communications Network In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas, who were modernising its communications systems to better serve the communities and prepare for the global soccer fiesta, the World Cup 2014. The newly signed equipment contract includes 31 sites with Hytera’s latest TETRA innovation, DIB R5 base station. It adopts a maintenance-free, space-saving design and can be installed on walls, antenna masts or in tunnels. Thanks to its low power consumption and passive cooling, it is ideal for use in areas where power supply is critical or where there is a need for battery-based, portable base station solutions. With the expansion of the TETRA network, different public safety forces such as police, firefighters and emergency response in the State of Alagoas will share the network to facilitate optimal cooperation when the situation requires, which is another big step forward by the local authorities to improve the security of the state.
Communication makes the world much, much smaller - but it also becomes critical to everyone. Once life-enriching communication technologies are embraced, not only do we like and enjoy the benefits, but we also become hooked on it day and night. "There is no doubt that the transportation industry is benefiting from always available communications, making sure drivers, mechanics, dispatchers are always connected and can exchange information when necessary," says Sagi Subocki, Vice President of Products and Marketing for MCC technology leader Softil. "However, for the most part until now, the transportation industry has had to rely on the traditional radio or simply standard mobile phones to perform all communications tasks. That's about to change with the advent of Mission Critical Communications over LTE and 5G as defined in the 3GPP Release 13-15 standard," adds Subocki. Mission Critical Communication Over LTE MCC over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications Mission critical communication (MCC) over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications. Think about a driver who can push a button and instantly talk to all drivers within a 50-mile radius, for example, to inform them of road conditions, accidents, road works and other incidents. In the event of a breakdown, the truck driver can quickly obtain help from experts using video chat, which makes a driver's life a lot easier. Using the same MCC over LTE capabilities, the driver can see the location of all other drivers using the same radios, can engage in chat sessions with nearby garages and much, much more. And let's not forget that MCC over LTE communications can be prioritized over regular public mobile voice and data traffic, which can help in the case of accidents and natural disasters. Advanced Communication Solutions In Mining While different from the transportation industry, mining's reliance on advanced communication technologies might be even greater than the needs of the transportation market. Subocki explains: "Mission critical push to talk and push to video with guaranteed, prioritized delivery might well make the difference for mining workers. The ability to ask for urgent assistance simply at the push of a button is crucial in the day-to-day operations of an oil rig and a diamond mine." But the benefits of MCC over LTE don't stop there. As MCC over LTE communication is delivered over modern, very capable, rugged smartphones, these devices can be used to interface and collect data from all available sensors - air quality, temperature, radiation, presence of dangerous gases - all this information can be obtained automatically via MCC over LTE integration with IoT and can be used to increase safety. Drones In MCC Over LTE In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary - and the 3GPP MCPTT Release 16 standard will extend mission critical communication to include robots, which might be priceless. "Think about the implications of sending an MCC enabled robot to investigate a mine explosion and you'll see the future of MCC over LTE and 5G communications in the mining industry," adds Subocki. Market Value And Outlook A report from ABI Research found the total mission-critical communications market for base stations, repeaters, handsets and infrastructure in 2022 will be US$10 billion. The North American market continues to account for more than half of this world market with the rapidly growing Asia-Pacific region in second place with a 20 percent market share. Public-safety radio was the ancestor of critical communications providing mission-critical voice services and continues to represent over half of this market, followed by the industrial, transportation and utility segments. However, the need for mobile broadband data has also entered the equation driving critical communications systems to evolve to digital radio for data handling and spectrum efficiency. As a result, critical communications systems are slowly evolving from the current TETRA, Digital Mobile Radio (DMR) and Project 25 (P25) to coexist and interoperate with Long Term Evolution (LTE)-based systems. Softil's MCC Over LTE Leadership Softil is a leader in Mission Critical Communication over LTE solutions for developers. Historically, Softil always focused on the full embrace of open communication standards - starting from close participation in the work of the appropriate SDOs, then developing best-of-breed APIs and implementation of the relevant standards, and most importantly, paying utmost attention to the interoperability of the offered solution by active participation and leading all relevant industry-wide interoperability testing events. Softil actively participates in development of the MCC over LTE standards in 3GPP, as well as interoperability testing at the ETSI Plugtest Events. Most importantly, Softil 3GPP Release 13-15 compliant client SDK implementation had been already commercially deployed on the market - in Korea, Softil powers latest and greatest implementation of the MCC over LTE-R communication devices installed on the newest high-speed train line, such as one connecting Incheon airport to PyongChang during the Olympic games.
March Networks, a pioneer in the delivery of video surveillance and video-based business intelligence solutions to the cannabis industry, is pleased to announce that one of Canada’s largest cannabis producers has selected its complete cannabis video solution to provide security, loss prevention and operational insights for its retail dispensaries. The publicly-traded producer, with multiple brands and a global presence, chose the March Networks solution based on its proven reliability, ability to support thousands of locations, and its Searchlight business intelligence software. March Networks Searchlight provides organizations with valuable information on customer service, risk mitigation, corporate compliance and other operations through the integration of surveillance video, point-of-sale (POS) transaction data and customer data analytics. The solution delivers an enhanced level of tracking and compliance by correlating video with the RFID data in the Searchlight softwareEnhanced Level Of Tracking “Early on, we recognized the security and operational requirements of the tightly-regulated cannabis market and evolved our offering to uniquely address those needs,” said Peter Strom, President and CEO, March Networks. “Today, we are proud to be the solution of choice for cannabis operators, including this leading Canadian-based producer in advance of the legalisation of the country’s recreational marijuana market in October.” Just last week, the government of Ontario – Canada’s largest province by population – opened up the sale of marijuana to private retailers, reversing a previous decision that would have seen sales limited to government-run outlets only. Across the United States, March Networks currently works with multiple cannabis operators, providing intelligent video solutions for dispensaries and cultivation facilities. In states like Colorado, where radio frequency identification (RFID) tagging from seed to sale is mandated by law, the solution delivers an enhanced level of tracking and compliance by correlating video with the RFID data in the Searchlight software. The producer will be able to centrally manage the entire system and easily schedule software updates using March Networks Command Enterprise Server software Deploying NVRs And 3D Analytics Sensors In addition to March Networks Searchlight, the Canadian cannabis producer will deploy the company’s hybrid network video recorders (NVRs) in each retail store, as well as integrated 3D analytics sensors to gather valuable metrics on customer traffic and wait times. The producer will be able to centrally manage the entire system and easily schedule software updates using March Networks Command Enterprise Server software. The powerful video management software is an ideal solution for organizations with multiple distributed locations, providing capabilities such as mass device management and LDAP integration to enable secure multi-level user access and authentication. It also delivers remote system health monitoring to ensure video is always there when needed – a critical feature to help ensure cannabis operators remain compliant with video surveillance requirements at all times.