Hikvision Access Control Readers(44)
Browse Access Control Readers
- Keypad Integrated
- Long Range
Access control reader products updated recently
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localisation. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymised and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorised personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognising the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorised person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorised users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.
Traffic continues to grow in every major city. But how do people beat congestion in these restricted urban spaces? In China’s ancient-walled city of Xi’an, they’re adopting an intelligent traffic management system based on Hikvision technology - and boosting traffic flow while reducing journey time. The Chinese city of Xi'an, known as Chang'an in ancient times, was the centre of ancient oriental civilisation. Thirteen dynasties spanning Chinese history have chosen Xi'an as their capital. Today, Xi'an is not simply a part of history: it’s a high-tech hub, renowned across China for its scientific research and education, manufacturing, technology, and transportation. In spite of being a modern hub, Xi’an still retains its ‘checkerboard’ layout from the Tang Dynasty, complete with its border of tall and ancient walls. Urban Traffic Administration Nevertheless, while economic growth has enabled the city to develop, the walls place great restrictions on the city’s daily movement - especially to its burgeoning traffic. Vehicles can only enter and exit through the city gates, but with some three million vehicles in the city, the limited number of entrances was beginning to cause serious congestion. What’s more, there are also many ancient ruins in the city, which were further limiting the development of the urban area. Managing a growing city while protecting its history presented a serious challenge to Xi’an Plus, as of 2018, the city was home to over 10 million people, while the number of construction projects was steadily increasing. Managing a growing city while protecting its history presented a serious challenge to Xi’an. So, to address this, Xi’an Urban Traffic Administration turned to Hikvision and its intelligent cameras. Traffic sensing system “Xi’an’s city walls make it impossible to increase the size of the urban area. So, it was only through technology that we could allow the modern city to grow and develop,” says Lihu Ma, the Project Manager from Hikvision. “A core part of the Hikvision solution involves our AI-powered video technology.” The Xi'an traffic police worked with experts from Hikvision, as well as urban planning experts, internet service providers and other technology companies, to design and implement an intelligent traffic management system. The construction of this system fully utilises Hikvision's core advantages in urban transportation intelligence, employing AI-powered video to create a powerful traffic sensing system. Physical urban transportation network The latest sonar monitoring equipment is being used to detect illegal use of car horns in banned areas “Effectively, we are building a bridge between an intelligent digital world and the physical urban transportation network in Xi’an,” explains Lihu. The intelligent traffic management system analyses comprehensive and detailed data about the movement of traffic through the urban Xi’an area, and uses the insight gathered to make the flow of traffic more smoothly in three key ways. Comprehensive road traffic violation monitoring Xi'an traffic police have installed Hikvision’s Checkpoint Capture Cameras and Intersection Violation Capture Units as part of a monitoring system that can detect illegal vehicle behaviour at intersections. These full view ultra-high zoom cameras record vehicles making illegal maneuvers - such as running red lights, making banned turns and illegal lane changes - in real time. What’s more, the latest sonar monitoring equipment is being used to detect illegal use of car horns in banned areas. Intelligent mobile applications Visual integrated command and dispatching platform Using real-time video streams from Hikvision Traffic Flow Capture Cameras, a number of road condition perception technologies, plus intelligent mobile applications, Xi'an traffic police has created a visual command and control centre, coupled with an intelligent police dispatch system. All data is aggregated and dynamically displayed on a large screen in the command and control centre. In the event of a traffic incident, the system generates dispatch recommendations intelligently, according to the location and distribution of traffic police officers throughout the city. Those closest to an incident receive an automated message to their mobile terminals, enabling them to arrive at the scene quickly. Intelligent traffic management system The Xi’an traffic management team also employs congestion management practices More importantly, the intelligent traffic management system uses advanced machine learning capabilities to gain insight into typical congestion patterns, in order to actively identify potential traffic events before they happen. By analysing large volumes of road condition data and information from Hikvision’s intelligent video cameras, the system can predict which intersections are most prone to congestion and when, enabling traffic police to put evasive measures in place before serious issues arise. Improved vehicle flow capacity with intelligent signal control The Xi’an traffic management team also employs congestion management practices to ease the flow of traffic, largely through the optimisation of signal timing. Using Hikvision intelligent video cameras coupled with augmented reality (AR) technology, the intelligent traffic management system analyses traffic flow data and dynamically alters the timing of signal lights accordingly. Adjusting signal timing It will monitor traffic flow, queue length and average driving speed in all directions of intersections in real-time, automatically adjusting signal timing to optimise the flow of vehicles. The Xi'an traffic management system has now been trained with a wealth of traffic data, including Hikvision video, enabling it to build multiple intelligent algorithms for managing congestion in the city. Driver behaviour is improving, and drivers are becoming more compliant with the rules of the road First of all, map-based congestion reports suggest that Xi'an's congestion rankings have improved significantly. In fact, compared with the test results of pilot roads before the system went live, intelligent signal control alone has increased the throughput of traffic by 10%, while the average vehicle journey time is reduced by about 12%. What’s more, driver behaviour is improving, and drivers are becoming more compliant with the rules of the road. Traffic incident warning function Traffic law enforcement data reveals that traffic offences are generally decreasing, with traffic violations dropping by some 30% in one short-term observation. Additionally, thanks to the proactive traffic incident warning function, the incident detection rate has also increased by more than 30% compared to the traditional model. With the continuous optimisation of the system algorithm, plus ongoing installation of monitoring equipment, the accuracy of this identification will only improve. In the process of urbanisation, tackling congestion is not only about improving the flow of the transportation network: it’s also basic governance for building a smart city.
Paxton Access Ltd. (Paxton) has announced new additions to their renowned Net2 access control product line, helping installers make their customers’ buildings more COVID-secure. The latest version of Net2 – v6.04 has been in rapid development since May 2020 and is now ready for installers to download. Net2 – v6.04 The latest version features Net2 Occupancy Management, which allows enterprises to limit the number of people in any given area, either barring access or sending an email or text to the building manager when a space nears capacity. It works across multiple areas of a site and can be set to operate a one-in, one-out system to support social distancing measures. In addition to this update, installers who want to use thermal scanning to help limit the spread of the virus can do so with three new thermal scan integrations. Making buildings more COVID-secure We understand the important part that access control plays in managing the flow of people around a building" Adam Stroud, Chief Executive Officer (CEO) at Paxton Access Ltd. stated, "We understand the important part that access control plays in managing the flow of people around a building in order to support a hygienic environment. In addition, controlling the density of people in any given area is a valuable tool to help businesses of all types to become 'COVID-secure'." Adam adds, “Net2 is one of the best-selling access control systems and so we have developed the new Occupancy Management feature to meet this specific need. For new and existing Net2 customers we hope that this new functionality helps the efforts that we are all making to observe social distancing and keep people safe." Occupancy Management with Net2 v6.04: Ensure users maintain a safe social distance by setting and controlling the maximum number of people in any given area. Real-time visual reports - see live occupancy levels in a clear, web-based visual report from smartphone, tablet, PC or widescreen wall display. Dynamic control of entry permissions - set alerts and prevent user access when maximum capacity is neared or reached. Simplified area management - set and manage multiple areas simultaneously, with specific occupancy levels per area. Support continuous flow of people movement with one-in-one-out user access when people numbers are high. Thermal scan hardware Paxton has also tested a range of thermal scan hardware and the company’s free 45-minute webinars will take installers through what is available and how to apply it. Paxton references solutions from Hikvision - Face Recognition Terminal (Minmoe), Dahua Technology - Thermal Temperature Station and ZKTeco – SpeedFace to help ensure health and wellbeing in high security areas and identify people that could be at risk, quickly. Net2 integrations with Hikvision, Dahua, and ZKTeco solutions Paxton has validated Net2 integrations with Hikvision, Dahua, and ZKTeco Paxton has validated Net2 integrations with Hikvision, Dahua, and ZKTeco. However, Net2 can work with most thermal devices that utilise a Wiegand output. Paxton has been running their ‘Guide to COVID-secure Buildings’ webinars to help get the U.S. back to work safely. Installers receive a live 45-minute webinar that will take them through the CDC and OSHA guidelines, as well as a free end-user guide to help their customers understand the access control solutions available when updating their buildings. ‘Guide to COVID-secure Buildings’ webinars Gareth O’Hara, the Chief Sales Officer at Paxton Access Ltd. said, “We’ve had a great response from customers so far, with hundreds joining us in the first couple of weeks. The webinar provides installers with practical access control solutions that businesses need now.” He adds, “The new Occupancy Management feature in Net2 has been eagerly anticipated and we are looking forward to getting it out there to help with social distancing on sites around the world. We are continuing to develop Net2 in line with installer feedback to provide even more flexibility for COVID-secure buildings, so watch this space.” Paxton’s latest webinar, the Guide to COVID-secure Buildings with Net2 started on June 30 and runs twice weekly.
Hikvision, an IoT solution provider with video as its core competency, has announced a brand-new addition to its DeepinView camera line: the Dedicated Subseries. This unprecedented new addition loads a batch of AI-powered deep learning algorithms into each unit, boasting stunning performance and cost-effective pricing. Dedicated DeepinView Cameras Over the last few years, Artificial Intelligence (AI) has been applied in many ways in security markets. As technology advances, AI chipset performance has improved to enable massive computing power using various algorithms and contributing to multi-intelligence functionality and higher accuracy. The new Dedicated DeepinView Cameras are an example of these advances, incorporating several AI-powered deep learning algorithms in one unit. What’s more is that these algorithms can be switched, thereby essentially putting 5 or 6 unique cameras in one housing. Integrated with enhanced AI technology Embedding switchable algorithms is a significant step for Hikvision to take in its AI product development" “Embedding switchable algorithms is a significant step for Hikvision to take in its AI product development. In a world of ever-changing technologies and functionalities, this approach creates great value for end users to try new technologies to ensure security, as well as to implement business intelligence and other applications,” said Frank Zhang, President of the International Product and Solution Center at Hikvision. He adds, “The benefits of our new offerings are numerous including reduced costs, improved efficiency, and speedy and effective incident response.” Vehicle analysis capability The Dedicated DeepinView cameras combine two product categories – the first is vehicle analysis where cameras combine automatic number plate recognition (ANPR) with vehicle attribute recognition. Attributes include the vehicle’s make, colour, and direction of movement. Typical uses include installation at checkpoints of city streets and at entrances & exits of buildings or industrial parks. Switchable deep learning algorithms Models in the second category boast six switchable deep learning algorithms in one camera housing, including facial recognition, face counting, hard hat detection, perimeter protection, queue management, and multiple-target-type detection (detecting multiple targets and multiple types of targets at once). Accordingly, users can simply enable an algorithm manually for dedicated use, and then later switch the algorithm as needed. One example of a switchable algorithm is hard hat detection. This algorithm can be used on construction sites to ensure safety and compliance. Face-counting function Specially-equipped DeepinView cameras can precisely distinguish a worker on the site wearing a hard hat from those without one, and automatically deliver alerts when the hard hat violation is detected. Another example is in a retail setting, a face-counting function can be enabled to precisely count customers entering and leaving the store. Repeat customers and store staff can be automatically excluded in the process, helping store managers count new customers with precision. Flexibility among algorithms enables users to also switch among: Perimeter protection – To monitor outdoor areas needing security and deliver accurate alarms upon intrusions. Facial recognition – To grant authorised access to restricted areas in various organisations, such as school laboratories, archive rooms, and hospital pharmacies. Queue management – To better understand customer wait times, optimise staff levels, and enhance customer experience. DarkFighter and LightFighter technologies The Dedicated DeepinView Cameras are available in 2, 4, 8, and 12 MP resolutions Equipped with Hikvision’s DarkFighter and LightFighter technologies, these cameras capture vivid and color images in extremely low-light environments or in scenes with strong backlighting where color and brightness balance is extremely difficult. Smooth Streaming mode further ensures a high-quality live feed. The Dedicated DeepinView Cameras are available in 2, 4, 8, and 12 MP resolutions for customers to choose from. Vibration detection Furthermore, metadata is supported to allow third-party platforms to receive data from Hikvision cameras for real-time video analysis or recorded into footage archives to enable rapid searching forensic evidence. Finally, these camera models also offer Vibration Detection for outdoor use, which detects and notifies users of vandalism.
Related white papers
11 considerations for embedded system RFID readers
RFID and smartphone readers in physical access control
3 reasons to migrate to a new access control system
Building a safe ecosystem for visitors post COVID-19Download
Smart security cameras: excellence in retailDownload
5 reasons to integrate mobile technology into your security solutionDownload
- ASSA CLIQ® Remote system secures plant control rooms at Loughborough University
- Edgeworx secures Manhattan preschool with Darcy AI thermal camera
- HID Global Seos® smart cards and FARGO® Connect help secure access to University of Connecticut student campus
- Vanderbilt installs ACT365 cloud-based access control reader at Denmark’s Vejle marina