Powercast Corporation, the globally renowned company in radio-frequency (RF)-based, over-the-air wireless power technology and solutions, has announced the launch of a new wirelessly-powered RFID Temperature Scanning System that enables businesses to easily and safely monitor employees' temperatures, as they work to re-open offices and get back to normal. RFID Temperature Scanning System The new system is comprised of a wirelessly-powered temperature-scanning fob for each employee, an RFID rea...
Safetrust, a globally renowned virtual credential solutions provider, has announced bringing Touchless Mobile Access and WiFi options to the millions of HID iCLASS SE and multiCLASS SE readers deployed currently with their new SABRE MODULE. Touchless Mobile Access The 30-second plug-in makes the SABRE MODULE the fastest way to enable touchless mobile access at the door, turnstile or elevator, while using existing readers. SABRE MODULE enables hands-free access authentication from a configurab...
The use of Mobile IDs in access control grows more frequent every week. That is why Idesco’s display reader, 8 CD 2.0 Pin D, will also soon accept a mobile ID from one’s smartphone. Interactive routines that require identification, like payment, are easily and securely managed with an RFID keypad/display reader providing a menu and displaying user-specific responses. That is why 8 CD 2.0 Pin D’s keypad is designed to flexibly support users’ need to select options and inp...
Access Touch integrates a modular RFID reader, touch screen display and PC processor into a powerfully versatile solution for time & attendance, payment and many other purposes. Its touch screen is a versatile platform able to support attractive, customized graphical user interfaces and menus. Additionally, Access Touch can integrate nearly any of the major RFID technologies from 125 kHz to MIFARE DESFire. As a fully functional computer, it can also interface with the Internet if needed. Li...
Hikvision, an IoT solution provider with video as its core competency, has announced its new generation of wireless alarm systems – the AX PRO – delivering comprehensive alarm solutions for both residential and commercial applications. The newly launched AX PRO product family includes a compact panel hub for a wide range of detectors and peripherals, covering intrusion detection, video verification, smoke detection, flood detection and home automation. Developed with both the instal...
The Security Industry Association (SIA) has announced the 2020 winners of the SIA New Product Showcase Awards, the flagship awards program in partnership with ISC West recognizing innovative security products, services and solutions. Top among the winners – who were recognized July 9 during a virtual awards show – was Leica Geosystems, part of Hexagon, receiving the 2020 Best New Product Award. Since its inception in 1979, the SIA New Product Showcase has been the security industry&...
CertiPath, an innovator in high-assurance identity, credential and access management services for highly regulated environments, launches an advanced visitor management solution within its TrustVisitor™ platform. The first of its kind to seamlessly and securely manage the complete lifecycle of a visit, TrustVisitor, which both secures and expedites visitor processing, meets the demands of all organizations that use high-assurance credentials (i.e. smart cards) including government, energy, banking, healthcare, critical infrastructure and Fortune 1000 companies. And, now, the need for sophisticated visitor pre-screening is at an all-time high with COVID-19 disrupting most aspects of everyday life. Maximum amount of intelligence TrustVisitor’s two-factor authentication process utilizes pre-registration to ensure expedited lobby experiences, and obtains the maximum amount of intelligence about visitors prior to arrival on site. It distinguishes between visitor types and visit categories, validating credentials, establishing visitors’ wellness and automatically provisions access. Employees create meetings and events via their email calendaring tool Employees create meetings and events via their email calendaring tool, inviting visitors – internal or external – to the organization. When a visitor registers for an event, providing all required information, event approvers receive emails with all details, and decisions can be made immediately regarding who is permitted to enter the facility. Visitor management solutions “CertiPath has been developing visitor management solutions for the past five years. From the very beginning, we emphasized the importance of vetting visitors before they arrive, as the only way to successfully achieve a faster and more secure lobby experience,” said Jeff Nigriny, President and Founder of CertiPath. “COVID-19 illustrates this point perfectly. In the past, we were concerned with establishing the identity of a visitor to ensure they were who they said they were and to be confident in that identity while they were onsite,” continued Nigriny. “So, suitability of visitors, up until now, has been focused on who they claim to be. Now, COVID-19 adds another aspect to suitability – wellness --which needs to be enforced for every visitor on a daily basis for the foreseeable future.” Adopting CDC guidelines With CertiPath’s TrustVisitor solution, visitor pre-registration is accomplished by using a valid smart card “The majority of organizations with which we are familiar have adopted CDC guidelines to ask a set of questions to anyone wishing to come back to a facility. This is the best practice we have, and it can be effective if people do not fatigue of it. However, far fewer organizations have conceived of a means to ask these same questions before they arrive,” states Nigriny. With CertiPath’s TrustVisitor solution, visitor pre-registration is accomplished by using a valid smart card (e.g., Personal Identity Verification [PIV], Common Access Card [CAC] Personal Identity Verification – Interoperable [PIV-I] or Commercial Identity Verification [CIV]). Validating electronic credentials Alternatively, visitors can pre-register with valid government-issued identification and receive a temporary CIV upon arrival. TrustVisitor then continuously validates electronic credentials and automatically facilitates access to the appropriate locations – for the duration of the visit. CertiPath’s TrustVisitor is the only fully US Federal compliant visitor management system available, originally developed for and used by federal agencies for high assurance credentialing needs. It is the only visitor management platform to implement the NIST SP 800-116-1.
Identiv, Inc. announced the launch of its frictionless, battery-less uTrust UHF Credentials that work with identification applications that require long-distance reading. Ultra high-frequency (UHF) technology is ideal for parking lot access and gate control, door entry in hospitals or gated communities, logistics, object and people tracking in emergency situations, real-time locationing, cafeteria access, and any hands-free environment, including medical or care facilities, club and resort membership, sport facilities, and universities. Long-read applications The credentials can be read through badge holders, handbags, pockets, and backpacks, supporting touch-free, highly hygienic physical access control. “For today’s most critical pandemic-era environments, Identiv is focused on providing solutions that support the safest, most hygienic physical access control,” said Stephane Ardiley, Director, Product Management. “Our new uTrust UHF Credentials harness ultra high-frequency technology for long-read applications - meaning your access card never has to leave your pocket as you enter gates, buildings, or controlled areas in schools, hospitals, or other hands-free locations. Beyond access control, uTrust UHF Credentials can be utilized in emergency situations or in the medical field for real-time people and object tracking.” Radio frequency identification cards uTrust UHF Credentials can keep track of people to increase personal safety and facility security Identiv’s uTrust UHF Credentials provide multiple options for durable, interoperable radio frequency identification (RFID) cards. UHF technology (operating in the 860 - 960 MHz frequency range) delivers outstanding performance for long-distance, multiple, reliable readings of credentials, including cards and tags. Leveraging the short wavelength of UHF technology, they are the ideal solution for reading people or items from a significant distance (i.e., more than 18 – 21 feet). uTrust UHF Credentials can keep track of people to increase personal safety and facility security, capture guest/visitor data, and can support 125 KHz low frequency (LF) and/or 13.56 MHz high frequency (HF) interfaces. The credentials are EPC Class-1 Generation-2, ISO/IEC 18000-63:2013, and RAIN UHF RFID-compliant and are compatible with a huge selection of second-generation UHF readers available on the market today, including handheld, stationary, or desktop readers. Time and attendance Offered in regular credit card plastic format (CR80) for corporate or government personnel, uTrust UHF Credentials are available in two models: ISO PVC UHF LF Card and ISO PVC UHF DESFire EV2 2K Card. Identiv’s cohesive collection of touchless solutions are focused on reopening public venues and workplaces as safely as possible. Identiv’s portfolio of credentials, ID cards, and smart cards are available in a variety of form factors for physical and logical access control, converged access solutions for building and computer access, transit payment, brand protection, time and attendance, cashless vending, and Internet of Things (IoT) applications. Solutions are available as single-technology, multi-technology, or credentials with a contact chip.
essensys plc, the global provider of mission-critical software-as-a-service ("SaaS") platforms and on-demand technology to the flexible workspace industry, announces the launch of Smart Access. Simpler flex-space access In a flexible office portfolio, space access is a common pain point for operators and their members. Administering entry for hundreds, even thousands of end-users, across multiple locations, private offices and meeting rooms can be complex and challenging, making the management of workplace access time-consuming and frustrating for occupiers and staff. Smart Access is designed to deliver frictionless experiences for flex-space users with a simple tap of their smartphones. Using essensys software, flex-space providers can create and manage an extensive set of rules that support dynamic and contactless workspace access in real-time. Time can also be saved in managing lost and forgotten cards by providing members with flexible access options over and above RFID cards, such as smartphones and integrated QR codes. Centralized management James Shannon, Chief Product Officer at essensys, commented, "Access control is a major challenge for the flexible workspace industry. The number of resident and non-resident occupiers across an office portfolio changes constantly. Traditional door access systems do not easily scale and can cause delays and security risks.” "With essensys Smart Access, space providers gain real-time control and simplified, centralized management while streamlining the customer journey. And, because it's powered by our private network and cloud infrastructure, it's highly secure and cost-effective to deploy.” "Smart Access enables space providers to deliver friction-free movements across their entire portfolio. Functionality is integrated into the operator's member app, removing the need for additional apps and login credentials and making member access as easy as swiping a phone. Door access is just the beginning. With this release we have laid the foundations for future opportunities to allow occupiers to have immediate access to a wide range of services with a simple tap of their smartphone." Security at offices Mark Furness, CEO of essensys, noted: "As demand increases for more flexible real estate products and competition for tenants intensifies, workspace providers need to find ways to make offices more secure, productive and efficient. Smart Access is a further example of how technology can help the flexible workspace industry meet these needs, improving the occupier experience and reducing operational overhead."
Suprema, a global provider of access control, time & attendance, and biometric solutions, has announced that the company’s Airfob Patch won the Judges’ Choice Award from SIA (Security Industry Association) New Product Showcase Awards. SIA New Product Showcase Awards Since its inception in 1979, SIA New Product Showcase Awards has been the security industry’s premier product awards program recognizing innovative security products, services and solutions. The awards program, in partnership with ISC West, presented this year’s winners in virtual format. The Judges’ Choice Award, which recognizes the most innovative product within the physical security category, was given to Suprema for its Airfob Patch. Airfob Patch Airfob Patch harvests power from the RF field signals transmitted from the reader and stores it until needed Airfob Patch is a retrofit adhesive-backed device that attaches to existing RF card readers to make them compatible with mobile credentials. When attached to existing card readers, Airfob Patch acquires credential compatibility, power, and OSDP or Wiegand communication with the reader and adds Suprema's Mobile Access credential capability. Airfob Patch harvests power from the RF field signals transmitted from the reader and stores it until needed. The wireless method of power and data transfer eliminates the need to splice a reader’s pigtail for installation. Bluetooth-based wireless communication “Airfob Patch is the world’s first mobile-to-RF-card signal translator, enabling mobile phones to communicate with the existing RF card readers via Bluetooth,” said Young S. Moon, the CEO of Suprema Inc, adding “Installation is as easy as adding a sticker. No wire, batteries or construction is required.” Suprema Mobile Access and Airfob Patch were developed by MOCA system, a Suprema affiliate company that began in 2019 to focus on mobile access card solution. MOCA system has developed solutions that use stable Bluetooth-based wireless communication method that are being evaluated for patents. “SIA congratulates Suprema Inc. for being selected as the recipient of the Judges’ Choice Award in SIA’s 2020 New Product Showcase,” said Don Erickson, the Chief Executive Officer (CEO) of SIA, adding “It’s this type of continual innovation and drive to succeed that advances the security industry and which contributes to the safety and security of our world.”
HID Global, a globally renowned company in trusted identity solutions, has announced the launch of its smallest embedded reader module, the OMNIKEY 5127CK Reader Core. The latest addition to the proven OMNIKEY family makes it possible for systems integrators, Original Equipment Manufacturers (OEMs) and other partners to embed RFID into devices with limited physical space to accurately authenticate people, reduce fraud and protect sensitive data in a contactless way. OMNIKEY 5127CK Reader Core OMNIKEY 5127CK Reader Core uses standard interfaces that make it ideal for embedding into constrained spaces and battery-powered devices. It enables everything from handheld devices, tablets, PCs and notebooks to keyboards, displays, monitors, and kiosks to be used across a range of applications in numerous vertical markets. “The OMNIKEY 5127CK Reader Core opens new market opportunities for partners seeking to incorporate a host of new physical and digital use cases that were previously difficult to add due to space restrictions on the devices,” said Steve Currie, Vice President and Managing Director, Extended Access Technologies with HID Global. Steve adds, “At the same time, we are also making it possible to further simplify development and integration of readers with our comprehensive reader core software development kit (SDK).” Easy integration and flexible connectivity The OMNIKEY 5127CK Reader Core accelerates time-to-market with numerous features for ease of integration The OMNIKEY 5127CK Reader Core accelerates time-to-market with numerous features for ease of integration, streamlined configuration and flexible connectivity. It includes modular approval certification for wireless devices, efficient power management (USB suspend/resume and remote wake up modes) and external off-board HF/LF and Bluetooth Low Energy (BLE) antennas or the option to design custom antennas that meet specific embedded requirements. Support for multiple frequency credential technologies For ultimate interoperability, the OMNIKEY 5127CK Reader Core supports multiple low and high frequency credential technologies within a single device and includes Apple’s Enhanced Contactless Polling (ECP) application to support credentials in Apple Wallet. It also supports the latest mobile access solutions via NFC or BLE technology, as well as iCLASS Seos, iCLASS SE, HID Prox, MIFARE Classic and MIFARE DESFire EV1/EV2 credential technologies.
Suprema, a global provider of access control, time & attendance and biometric solutions, recognized the trend towards contactless, biometric and cellphone credentialing long before the onset of the COVID-19 pandemic. The company's premier biometrics solution, FaceStation 2 Smart Face Recognition Terminal, employs intelligent facial recognition ensuring highly accurate personal identification and authentication for improved overall security with contactless operation. MobileAccess, Suprema's contactless credentialing solution, eliminates the need for costly access cards and proximity devices by utilizing iOS and Android smartphones as a secure personal access credential. Face Recognition "Suprema has been pioneering contactless access control solutions long before the COVID-19 pandemic and heightened market demand for safer and more secure access control solutions," said Young S. Moon, CEO of Suprema Inc. "Our FaceStation 2 Smart Face Recognition Terminal and Mobile Access contactless solutions seamlessly integrate with our BioStar integrated security platform to deliver comprehensive functionality for the most demanding security and workforce management applications." Suprema FaceStation 2 Smart Face Recognition Terminal delivers outstanding performance including: up to 3,000 matches per second; a memory capacity capable of accommodating up to 30,000 users, 50,000 image logs and 5 million text logs; live face detection with IR-based fake face blocking (anti-spoofing) technology; and multi-band RF reading technology to support the latest RFID standards for multi-modal credentialing when required. Suprema Mobile Access contactless solution The ergonomically designed and highly aesthetic device features an Android-based intuitive touchscreen LCD providing ease of use that requires little to no training for both users and system administrators. Suprema Mobile Access turns virtually any iOS or Android smartphone into a highly secure contactless access credentialing device, eliminating the cost associated with issuing access cards and proximity devices. FaceStation 2 will soon become compatible with Suprema Mobile Access, providing a seamlessly convenient and fast operation. Users can simply tap their smartphone on an RFID reader to gain access from distances within 10cm without the need to wake the host smartphone.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organization's security, while enhancing user convenience.Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics Challenges For Biometric Authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal among older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realize the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimizing performance through a combination of new technology and algorithms, while ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimizing Capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data.The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness Detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimizes performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimizes performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted Performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template Matching Modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical Access Control Integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy Considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance To Stop Secret Surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating Facial Recognition Technology Although the facial recognition aspects of the ordinance have been the most publicized, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilizing an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes Biometrics, RFID Scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport Security Not Part Of Ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding Privacy Of Citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance Technology Policy Banning use of facial recognition just when its capability is being realized is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realized is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
The Headquarters Business Park developed by Adeem Al-Watania is a 52 story office building located on the coast site of Jeddah, Saudi Arabia. When completed in 2012, it became the tallest building in Jeddah and is served by a large 11-story parking garage. Nedap’s Long-Range Identification solutions provide seamless vehicle access to employees and long-term tenants. The devices were successful installed and integrated with Lenel access control system OnGuard by Idex Services. The Headquarters Business Park Tower This tallest skyscraper, towering above Jeddah’s North Corniche and with a unique “Sail of a dhow” design, is an iconic structure in the commercial hub of Saudi Arabia. The iconic business park consists of offices, clinics, restaurants, entertainment facilities and a luxurious hotel. It has three main sections, the West tower housing 52 floors, East tower housing a luxurious hotel with 16 floors and a mid-section with 11 story parking facility comprising of 2.000 parking spots which connects the West and East towers. Need for hands-free vehicle access Multiple entry and exit points to the vehicle parking facility had to be provided with an automated system With the exemplary design of the tower, there was a need for an all-in-one innovative vehicle and driver access control solution which can provide seamless integration with best performance which is in line with the state-of-art services to tenants in one of the most sophisticated buildings in Jeddah. Multiple entry and exit points to the vehicle parking facility had to be provided with an automated system, for convenient, hands-free access to authorized vehicles of office employees and long-term tenants. An efficient solution was identified, with a combination of Automatic Number Plate Recognition and Long-Range RFID (Radiofrequency Identification for Automatic Vehicle Identification). Touchless vehicle access to employees Nedap’s uPASS Reach, based on passive UHF technology read-range up to 5 meters in combination with UHF Windshield tags Nedap’s uPASS Reach, based on passive UHF technology read-range up to 5 meters in combination with UHF Windshield tags is used to provide convenient vehicle access to employees. UHF Tags, which are thin, flexible, tamper resistant and maintenance free are assigned to vehicles of employees who work in the 256 office units. When the registered vehicle with UHF tag installed approaches the long-range UHF RFID reader installed near the barrier, the vehicle is automatically identified and access is granted for authorized vehicles to the parking facility. Parking access to tenants based on LPR Nedap’s ANPR series – License plate recognition camera with an accurate read-range at several metres The iconic tower with sea-view includes a luxurious hotel and it is observed that tenants stay for a longer duration or prefer coming back on regular basis. To provide a seamless experience to tenants and ensure smooth flow of vehicles and drivers into the parking facility, there was a need for a solution which could grant tenant vehicles access temporarily or incidentally. Nedap’s ANPR series – License plate recognition camera with an accurate read-range at several metres – ensures tenant number plates are registered and required access rights can be easily granted in the backend application. Securing the 11 floor parking facility With the parking facility being the main entry point to both the West and East tower, it was very necessary to meet high-security standards and control the flow of vehicles. The proposed solution required to have seamless integration with the existing Lenel access control system OnGuard. The open architecture of Lenel and Nedap supporting variety of industry-standard communication interfaces, enabled seamless integration and successful implementation of the products by Idex services. Customized reports with the required log were easily accessible after the successful integration.
At the Inholland University of Applied Sciences, a rolling project to upgrade access control at all locations has been ongoing for several years. Typical of any large educational setting, the tension between remaining open and accessible on the one hand — and securing people, equipment and data on the other — is a critical factor. More than 500 Aperio wireless door locking devices have now been deployed at 7 separate Inholland campus sites. These battery-powered locks provide tested and trusted protection for the university’s most important areas and rooms, including offices and exam storage spaces. Aperio devices fit all kinds of interior openings, including wooden and glass doors, as well as fire doors. Aperio cylinders, escutcheons, handles and security locks have in-built RFID readers for installer and user convenience. Integration with Nedap AEOS access control system All Inholland’s new Aperio devices are fully and seamlessly integrated with the university’s Nedap AEOS access control system. A single credential allows users to unlock all authorized openings managed by the AEOS system — whether wired or Aperio-protected doors. Because Aperio locking devices are wireless, they were installed and initiated quickly — without disruption to Inholland buildings or their students’ working day. And choosing Aperio saved more than just time. A recent ASSA ABLOY benchmarking study finds installer labor costs are over 80% lower for wireless versus wired locks. The ongoing cost of running battery-operated wireless locks is also much lower than for equivalent wired electronic locks, which require an “always on” connection to mains electricity to maintain secure status. In addition, choosing Aperio gives Inholland the ability to roll out enhancements over time, as needs, budgets and priorities evolved. Aperio devices can be added and integrated gradually, with no need to replace existing systems. Inholland’s investment remains totally future-proofed. Programmable RFID credential Fitting Aperio wireless escutcheons and locks to critical doors ensures university staff, students, visitors and confidential information are safe without impacting site accessibility. Authorized users open relevant secure doors conveniently with a programmable RFID credential. Aperio’s inherent flexibility makes it easy to adjust any space’s level of protection at any time. So, locking status is regularly reconfigured as needs and usage evolves around the multi-site campus and university facilities. Smart building systems Based on their experience to date with Aperio, Inholland are already planning for the future. A new university in Amsterdam will become a smart building and will require access control able to integrate with smart building systems. Aperio is built on an open platform, designed for interoperability, so this is a natural fit. Inholland will enter pilot stage for their new smart building soon. “I am very satisfied with the implementation and operation of the Aperio solution and I have every confidence in ASSA ABLOY as a manufacturer,” concludes Frans Bruggeman, Facility Services Consultant at Inholland.
Slovakian integrator, RYS, has recently deployed a system that provides a textbook example of how RFID access control can concretely improve people’s lives every day. Before automatic access control was introduced there, a Bratislava apartment building, known as ‘The Pentagon’, had suffered a reputation as a place to avoid. RFID access control system Drug dealers, vandals, and a similar criminal element were a chronic presence, leaving residents constantly feeling unsafe in their own homes. Idesco customer RYS was contracted to design and deploy an RFID access control system to better guarantee safety and enhance the residents’ quality of life. With over 30 years specialized experience in residential building access control, RYS designed a solution and chose Idesco to supply the over 100 RFID readers to be deployed. Currently, those readers control both ground floor access and section/hallway entrances on each floor. Elevator readers restrict residents’ access to their own floors. Access to only RFID tag-holding residents The system even restricts access to the building’s waste bins, ensuring their use only by its RFID tag-holding residents. Simultaneously, the entire system collects real time data about access events, including unclosed doors or unauthorized access attempts, to help strengthen prevention and control. Due to the building’s history of vandalism, RYS recognized the importance of choosing readers capable of withstanding malicious impacts, moisture and dust. Idesco optical tamper Idesco’s optical tamper proved better than many other readers whose manufacturers rely on mechanical tampers" Marcela Benuskova, RYS Assistant Project Manager, commented “Idesco’s optical tamper proved better than many other readers whose manufacturers rely on mechanical tampers. Whereas alarms should be sent whenever a reader is intentionally mishandled, mechanical tampers trigger false alarms more often than those cued optically.” Marcela continues, “The technical solutions Idesco and RYS implemented, combined with the efforts of an excellent crisis management team, triggered almost unbelievable changes inside that apartment building. Our access control not only strengthened crime prevention immediately, but also empowered law enforcement in discouraging unwanted or illegal activity.” Enhanced building security He adds, “As that building’s security increased, the market value of individual flats began trending upward. Today, the building’s residents feel safer and they have actually started thinking positively about their community’s future.” Marcela Benuskova with RYS closed by stating, “Idesco’s team is so nice to work with; they always respond fast, with a friendly, professional and positive attitude. Any technical question or problem gets looked at, given proper thought and action. They have always been open to, and repeatedly implemented, product changes we asked for.”
Slovakian integrator RYS, recently deployed a system that provides a textbook example of how RFID access control can concretely improve people’s lives every day. Before automatic access control was introduced there, a Bratislava apartment building, known as ‘The Pentagon’, had suffered a reputation as a place to avoid. Drug dealers, vandals, and a similar criminal element were a chronic presence, leaving residents constantly feeling unsafe in their own homes. Idesco customer RYS was contracted to design and deploy an RFID access control system to better guarantee safety and enhance the residents quality of life. Access control readers The system even restricts access to the building’s waste bins, ensuring their use only by its RFID tag-holding residents With over 30 years specialized experience in residential building access control, Rys designed a solution and chose Idesco to supply the over 100 readers to be deployed. Today, those 7 C 2.0 and 8 CD 2.0 readers control both first floor access and section/hallway entrances on each floor. Elevator readers restrict residents’ access to their own floors. The system even restricts access to the building’s waste bins, ensuring their used only by its RFID tag-holding residents. Simultaneously, the entire system collects real time data about access events, including unclosed doors or unauthorized access attempts, to help strengthen prevention and control. Due to the building’s history of vandalism, Rys recognized the importance of choosing readers capable of withstanding malicious impacts, not merely high IP67 protection from moisture, dust and dirt, but Idesco’s high, IK-09/10 impact durability (10-20 joules). Better tampering protection Marcela Benuskova, RYS assistant project manager, comments that Idesco’s optical tamper proved better than many other readers whose manufacturers rely on mechanical tampers. Whereas alarms should be sent whenever a reader is intentionally mishandled, mechanical tampers trigger false alarms more often than those cued optically. Marcela continues, “Idesco’s team is so nice to work with; they always respond fast, with a friendly, professional and positive attitude. Any technical question or problem gets looked at, given proper thought and action. They have always been open to, and repeatedly implemented, product changes we asked for. For example, they provided a special 8 CD 2.0 Compact reader module for our door phone, and customized orange lenses for our Basic readers. Product deliveries have always been timely and in proper condition. In short, Idesco has been a very reliable supplier for us, with great customer support. Additionally, their high quality, modern readers offer unique features such as RS232 connections, optical tampers, great security, all in addition to their high IK and IP ratings”, maintains Rys’ Marcela Benuskova. Engineering for future needs “They not only use the most modern technology but engineer for future needs. This lets us design new features in our access control systems. Despite their readers’ durability and reliability, they still look fresh and modern while still having the latest security features. This is exactly what we want from readers upon which we will build our systems. Even better, their stable pricing policy and frame order option greatly supports our own planning and product marketing cycles”, Marcela explains. She closes, “The technical solutions Idesco and Rys implemented, combined with the efforts of an excellent crisis management team, triggered almost unbelievable changes inside that apartment building. Our access control not only strengthened crime prevention immediately, but also empowered law enforcement in discouraging unwanted or illegal activity. As that building’s security increased, the market value of individual flats began trending upward. Today, the building’s residents feel more safe; they have actually started thinking positively about their community’s future.”
Marassi harbors, known as upcoming gateway to Egypt, is a community with a picturesque surrounding overlooking the turquoise Mediterranean Sea along the Alamein coastline. At this community one will find lavish residences that includes chalets, apartments, townhouses, villas, large marinas and signature hotels creating a lifestyle of sheer pleasure and luxury vacation destination. Secured access points to such an extravagant, lavish community is fundamental as the community is occupied by highly influential people, including high-ranking Egypt government officials. Streamlined access Until recently, manual security checks of vehicles and people were carried out at the community access to comply with the security requirements. As manual security checks were not only time consuming, but also resulted in queuing, the need for a secure and convenient access experience arose. Deluxe communities, like Marassi, strive for an automated frictionless, streamlined vehicle and people access process. Identifying tenant vehicles To automate vehicle access at the gates, Nedap’s UHF RFID uPass Reach readers, with a read range up to 5 meters, are implemented. Combined with Nedap’s UHF windshield-mounted tags, these readers are used for automatic vehicle access. The UHF tags are issued to registered tenant vehicles and when the vehicle comes within the read-range, the tag is identified and granted access. The UHF windshield tag is battery-free and maintenance-free, making it the most effective solution provide secure and seamless vehicle access. E-gate entry to residents Marassi residents manage their digital access card through the community app developed by EMAAR. Digital access cards are used as identifiers and are stored in user’s smartphones. Nedap’s multi-technology reader makes use of smartphones to identify people utilizing Bluetooth Low Energy (BLE) and NearField Communication (NFC) technologies. The solution has provided Marassi tenants with easy and secure access to the community and beach. Residents manage visitor access Visitor access to the community and beach is further simplified by enabling the residents to generate guest requests through the app. Besides supporting BLE and NFC technology, Nedap’s multi-technology reader includes a QR reader that enables scanning QR-codes displayed on a smartphone. Residents can share the QR code with guests. The guest presents the QR-code to the reader and access to the property is granted frictionless. Implementation of such an integrated solution has provided a high level of convenience to all users at Marassi. The reliable solution has also reduced the congestion at the entry gate, securing the flow of vehicles and reducing the waiting period for guests.
Co-op, a large consumer co-operative in the UK and one of the largest retailers in the country, is rolling out an integrated body-worn video solution from Motorola Solutions to front-line colleagues, with a focus on further increasing safety in-store against a background of rising retail crime in the industry. The Co-op has seen in-store crime increase by more than 140% year-on-year, despite communities recognizing the critical role played by retail workers in society - true frontline workers in the days of a global pandemic. The number of violent incidents also hit record levels with 1,350 attacks having been experienced by Co-op shop workers in the first six months of 2020. Keeping colleagues safe The retailer warns of a crime and violence epidemic and its targeted deployment of a body-worn video solution forms part of an ongoing commitment to invest a further £70M over the next three years in innovative technology to keep colleagues safe. Co-op will equip front-line staff with more than 1,000 Motorola Solutions VT100 body-worn cameras in around 250 stores initially, with the ability to stream video in real-time to the Security Operations Center of Co-op security partner, Mitie. The footage is used to identify criminals and provide evidence to secure prosecution. The VT100 body-worn camera from Motorola Solutions can be worn in standby mode for up to six months, preserving battery for instances when Co-op store colleagues feel threatened by aggressive or violent behavior. The cameras are operated by a simple one-push activation, instantly recording footage to the camera itself, and streaming live video to the security operations center, allowing for a quick response from security personnel or police. Cloud-based software The cameras are supported by cloud-hosted VideoManager software The cameras are supported by cloud-hosted VideoManager software, which enables secure and efficient camera allocation, user administration and incident management. With security features such as comprehensive audit-trails, encryption, configurable retention policies and RFID camera allocation, this integrated solution ensures footage and incidents are dealt with efficiently and securely. As part of its Safer Colleagues, Safer Communities campaign, Co-op is also building awareness and support for MP Alex Norris’ “Assault on Shop Workers Bill” which has now seen its second reading in Parliament postponed until September. The Bill states that because shop workers have responsibilities to uphold the law on age-restricted products they should be afforded greater protection in carrying out those public duties. Retail crime A knife was the most commonly used weapon (43%) with axes, hammers and syringes also used to attack In its 2020 Crime Report, the Association of Convenience Stores (ACS) found that a quarter of violent incidents resulted in injury, with a weapon used in almost 20% of occurrences. A knife was the most commonly used weapon (43%) with axes, hammers and syringes also used to attack or threaten shop workers. In 2019, Co-op funded research into retail crime, with the hard-hitting findings reporting that shop workers were showing signs of Post-Traumatic Stress Disorder (PTSD). Co-op has committed a further £70M over the next three years in innovative technology to keep colleagues safer, it has introduced SmartWater Fog Cannons, the latest remote monitored iCCTV, body cameras and, communication headsets for all frontline colleagues. Protection for shop workers Cheryl Houghton, Co-op Retail Security Manager, said, “Shop workers play an essential role serving communities, yet they have to contend with unprecedented levels of violence and abuse on a daily basis. As a community retailer we see the impact of social issues in our stores. I have never seen such high levels of violence and abuse, it’s a societal issue that all retailers are concerned about and it’s having lasting effects on the lives of shop workers - both mentally and physically. It is not part of the job to be verbally abused, threatened or attacked and we’re determined to make sure it isn’t. Calling for greater protection for shop workers carrying out public duties and for the root causes of crime in communities to be addressed.” Body-worn videos in commercial organizations Richie McBride, Director of Business Operations, Video & Analytics at Motorola Solutions UK, said, “Body-worn video is becoming a critical element in commercial organizations’ strategy to keep their employees safe. As a company focused on mission-critical solutions, we provide our commercial customers with the right tools to help them enhance their operational efficiency, responsiveness and safety. We are proud to partner with one of the UK’s largest retailers in its work to further improve the shopping experience and enhance safety for both shoppers and staff,”
Round table discussion
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?