RFID Access Control Card Readers(39)
This wireless locking device is easy to install and maintain, and gives small businesses, education, medical and retail premises a simple way to filter access through any door, without the expense or complication of a complete electronic access control system. KeyPad Escutcheon design and installation A slim, modern design and capacitive keypad makes the SMARTair™ Standalone KeyPad Escutcheon well suited to securing collective areas such as common bathrooms, storerooms and maintenance cupboards; staff, changing or copy rooms in schools, colleges and universities; and clinics and other private areas in hospitals or dental surgeries. The Standalone KeyPad Escutcheon is ideal for securing any door or site where a full access control system is unsuitable, unaffordable or unwanted. It’s easy even for non-technical staff or contractors to install the SMARTair™ Standalone KeyPad Escutcheon: there’s no wiring or drilling, and no software to configure. Simply replacing the current mechanical lock with a SMARTair™ Standalone KeyPad Escutcheon adds electronic PIN security to a door equipped with a standard lock. Convenient authentication Keys can be lost, copied or stolen; the SMARTair™ Standalone KeyPad Escutcheon provides a convenient, modern solution. User PINs can be added quickly at the door without the need for software installation, just by using the programming card. It supports up to 100 different 4- to 6-number PINs, and has an audible buzzer to confirm permission. The device also supports standard RFID cards up to 500 cards per device which offers the possibility to choose between the most convenient authentication option. Like every SMARTair™ product, the new Standalone KeyPad Escutcheon is available for Euro, Scandinavian and DIN profiles, and fits wooden, glass and narrow doors. Power is supplied to the keypad by a standard lithium-ion battery — meaning maintenance costs and workload are minimal. Integrated, software-powered system For premises looking to trial the benefits of access control, the Standalone KeyPad Escutcheon can also be a first stepping stone to a more integrated, software-powered system. The new device can be upgraded to work as part of a modular, fully scalable SMARTair™ system which provides real-time access control and audit trails. With an upgraded system, users can open doors with contactless smart cards using a range of standard RFID technologies, or remotely using a secure smartphone app, and administrators can issue or revoke keycards in an instant using a secure online tool. SMARTair™ access control is the affordable, intelligent upgrade to old-fashioned mechanical keys. And with the new Standalone KeyPad Escutcheon, it’s easier than ever to boost security at any small or medium-sized business, medical, education or retail premises with SMARTair™. Because, if what’s most valuable is on the inside, you don’t want just anyone opening the door. For more information visit www.tesa.es/discoverwirelessAdd to Compare
The new Aperio® H100 packs the power and flexibility of wireless access control into one slim, cleverly designed door handle. With easy retrofitting to almost any interior door and comprehensive RFID compatibility, the new Aperio® H100 handle makes extending access control to more doors cost-effective by integrating with a vast range of third-party systems. The Aperio® H100’s stylish design is perfect for indoor office and facility doors. The Aperio® H100 can work within an online access control system or offline as a standalone device. A battery fits inside the handle, ensuring a minimal footprint and a discreet look to gel with any contemporary door style. The Aperio® H100 is easy to retrofit on existing doors, with no drilling and no wiring required. Any existing mechanical cylinder can still be used. The Aperio® H100 is specified with maximum flexibility and designed to fit almost any format of interior door. The Aperio® H100 is compatible with most common European (DIN) and Scandinavian mortise locks, in wooden, steel, tubular frame or glass doors with standard lock cases. It comes in left- and right-hand versions for a door between 35mm and 80mm thickness, with optional U-handle and USB adaptor. The Aperio® H100 is compatible with multiple RFID technologies, including iCLASS®/ISO14443B, iCLASS® SE, Seos®, MIFARE® Classic, Plus and EV1, and DESFire® SE. “Like all Aperio® devices, our new handle can upgrade site security for a very affordable price,” says Matthias Weiß, Product Manager Aperio® at ASSA ABLOY EMEA. “The Aperio® H100 further extends a range which adds access control wirelessly to exterior and interior doors, from fire and safety doors with regulatory requirements to meeting rooms, labs and offices.” The new Aperio® H100 handle completes a comprehensive range of Aperio® wireless access control devices that already includes online and offline Aperio® cylinders (C100/C900) and escutcheons (E100/E900); an online and offline lock (L100/L900); and a wireless lock for bringing server racks and cabinets (KS100) into the same access control system as doors.Add to Compare
SMARTair™ takes wireless locking way beyond doors. New SMARTair™ cabinet locks secure drug and medicine storage with RFID-enabled locks. In spas, swimming pools and sports centres around the world, clients can secure their belongings with credentials stored in water-resistant bands, instead of a cumbersome locker key. Facilities managers using SMARTair™ can control and manage the use of cabinet locks with an easy interface: it takes a few clicks to issue or revoke access credentials, or to generate an audit trail for every secure cabinet in the building. With standalone, offline and update-on-card system management, integrating cabinet locks with your organisation's existing smart cards is simple. SMARTair™ from TESA is compatible with all leading RFID technologies, including iCLASS® by HID, MIFARE™ Classic and DESFire™. More than just convenient, SMARTair™ from TESA is also cost-effective. SMARTair™ wireless locks use standard batteries instead of a 240V mains connection, saving money on running and maintenance costs. At a glance: Wireless lock for cabinets, lockers, drawers and other applications Yes (IP55), Up to 85% humidity without condensation, Temperature (-20°C and +70°C) Battery (up to 20.000 Cycles and max. 3 years), 3 x Standard LR03 AAA 1.5V batteries CE certification Special water resistant bracelet for Health Spa´s and swimming pools which enables users to go running or to swim availableAdd to Compare
Moving to wireless access control, without busting the budget, just got a whole lot easier. SMARTair™ from TESA is a seamless step up from any organisation’s mechanical master key system. The key to secure success? It’s unmatched simplicity. SMARTair™ is easy to install, with no cabling, no wires, and therefore no electricians needed on site. It is easy to run: SMARTair™ takes the labour out of lost keys, enabling facilities managers to change access rights at a moment’s notice. Open doors remotely, from anywhere. Issue or revoke keys instantly. Generate an audit trail for every secure door in the building at the touch of a button. The administrative software is simple, visual, and easy even for non-technical staff to master. Its matrix is intuitive, and based on standard mechanical master key systems for a pain-free transition. SMARTair™ is also cost-effective to run on a daily basis. Using standard batteries, rather than a mains power connection, keeps running and maintenance costs for locks to a minimum. Smart locks alert you when batteries need replacing. For every door, at every level of control, SMARTair™ offers the most efficient and flexible way to update access rights or receive audit trails. “SMARTair™ enables organisations of any size go wireless, without the worry,” says Inaki Ruiz, Director for SMARTair™ at TESA. “Our secure ecosystem is within technical and financial reach of any company looking to extend or upgrade an access control system. SMARTair™ works alongside or replaces a mechanical master key system.” A light footprint doesn’t mean a lightweight security system. SMARTair™ users can carry RFID cards, tags, or bracelets. Encrypted credentials are available in several secure RFID technologies, including iCLASS® by HID, MIFARE™ Classic and DESFire™. One user credential opens several wireless locks within the organisation — keeping access easy for employees as well as facilities managers. The system is modular and fully scalable to meet access control requirements for any size of building, in the healthcare sector, heritage properties, education, multi-residential complexes, public buildings, and anywhere that easy, affordable, and secure access control is a priority. SMARTair™ secures more than just doors. Alongside a full range of battery powered electronic cylinders, escutcheons, and locks, are wall readers, locks for cabinets, lifts, vending machines, and lockers. It is simple to integrate every lock into one single, secure access system, even across multiple sites.Add to Compare
Suprema, Inc., a leading global provider of technology in biometrics and security, recently launched a new version next generation BioEntry W access control terminal, which is embedded with HID Global’s iCLASS SE smart card technologies. In conjunction with the expansion of its RF technology, the enhanced BioEntry W was upgraded with HID iCLASS SE as well as enhancements for FeliCa IC cards which are most widely used in Japan and the region. BioEntry W exquisitely blends benefits of IP access control system with high-level security provided by fingerprint biometrics. Featuring a vandal-resistance and IP65 rated structure, BioEntry W is ideally designed for outdoor installation while offering exceptional durability in harsh environments. With its extensive communication interfaces and PoE (Power over Ethernet) capability, it is the ultimate outdoor fingerprint terminals for access control systems in the global market. With this enhanced version BioEntry W and its robust market presence serving as momentum, Suprema plans to reinforce and expand its business and marketing strategies globally. “Like the new BioEntry W, integration with a global leader like HID is significantly meaningful for biometrics and security markets’ advancement as well as for growth of Suprema.” said Young S. Moon, vice president of Suprema. “Such partnership for integration is essential in establishing milestones from the view of ceaseless provision of state-of-the art technology and products bringing higher value-added benefits to customers and end users.”Add to Compare
The AY-E20 is one of a highly sophisticated line of proximity card readers developed by Rosslare, pioneers and market leaders in the access control field. Ideal for residential and commercial applications, this ultra-slim attractively designed reader compliments any décor.The unit is water resistant but delicate, and is suitable for indoor or outdoor mounting.The AY-E20 is packed with advanced features such as an ultra-bright bi-colour LED indicator, optical back tamper detection, and selectable card transmission formats. The AY-E20 provides a high level of compatibility and connectivity with host controllers.Main features:Ultra-slim flush-mount design on flat surfaceReading distance: 3.5 cm (1.37 in)Built-In 125 KHz ASK EM proximity card readerInternal buzzer provides audible interface feedbackBi-coloured ultra bright LED indicatorFully potted, waterproof construction for outdoor useMounting template for easier installationApplications:Ideal for commercial and residential environmentsThe reader is suited for architects and designers looking for a stylish access control solution within indoor and outdoor environments.Add to Compare
The completely potted RFID reader MCR is developed for easy mounting over a 55mm switchbox or for surface mounting, using the extra supplied mounting frame. A wide selection of software programs and interfaces allows this reader to be used in all kind of applications. Furthermore, the RFID reader MCR is also available with integrated keypad. Optionally, the RFID reader MCR or MCR/K can be supplied with integrated relay. The following technologies are supported by MCR & MCR-K: LEGIC RF (advant & prime), ISO14443A+B (MIFARE, DESFire, Infineon SLE, SmartMX) ISO15693 (EM4035, Tag-It HFI, Infineon SRF55VxxP, ISO18000-3 mode 1) Sony Felica (ISO18092), NFC (passive mode) Inside Secure (UID only), HID iCLASS ISO5693 (UID only)Add to Compare
Idesco's Access Touch, an elegant touch computer and RFID reader, has just been updated to 2.0. Used for a variety of applications including management of wireless systems, as an independent interface for time and attendance, payment, alarm control or as an info screen, Idesco's Access Touch 2.0 now operates on its own enhanced, high-performance Idesco Embedded Linux as well as embedded Windows XP. Crucially, the Access Touch 2.0 also offers vastly improved processor performance over its previous architecture. Processor speeds now range from 1.1 GHz to up to 2.0 GHz depending upon your preferences. Access Touch 2.0 display quality has also been enhanced with the integration of Backlight LED technology. Furthermore, USB port capacity has been increased to a maximum of five and a standard internal UPS has been introduced to augment its ability to interface with an external UPS for protecting against external power failure. Most importantly, the Access Touch 2.0, with its significantly enhanced hardware and operating system options, now readily accommodates an even wider range of customised, secure solutions and applications (including your company's own proprietary software). It still possesses its innovative built-in RFID reader customisable to a wide variety of technologies in the 125 kHz and 13,56 MHz frequencies (including AES). However, the Access Touch 2.0 can now also wirelessly and securely connect and administer wireless UHF readers through intermediary Idesco controller products such as the Idesco Control Unit or Door Control Unit. The new Access Touch 2.0 still comes in a variety of stylish Scandinavian designs lending a refined elegance to complement its sturdily-engineered shock-proof glass display. Naturally, the front panel remains fully customisable to suit the needs of whatever tasks you assign it. In short, Idesco's Access Touch 2.0 has become an even more powerful RFID Touchscreen Terminal solution.Add to Compare
Idesco launches an EPC reader for cost-effective applications. It is a passive UHF reader that enables longer identification distances with cost effective and durable passive identifiers. This innovative passive long range UHF reader makes it possible to create user-friendly identification applications for vehicle identification (AVI), logistic systems and access control. This EPC reader operates according to the European UHF (ultra high frequency) regulations.The reader can work with one external and one internal antenna. The antennas can transmit and receive at the same time or the other antenna can transmit when the other is receiving. The Idesco EPC reader is available with several interfaces for easy integration and it offers a variety of security options. It supports anti-collision. Via the four I/O ports peripherals can be addressed. The wide operation temperature range of the reader and its protection class enable usage in indoor and outdoor environments.Please visit our stand A14:29 at Skydd Exhibition in Stockholm, from September 30th to October 3rd.Add to Compare
Browse Access Control Readers
- Long Range
- Keypad Integrated
Access control reader products updated recently
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access control, video management and intelligent video analytics. Because only then will you have security you can trust, and detection you can depend on. Reliable entry management Access control systems have been developed that guarantee reliable entry management for indoors and outdoors Access control is becoming increasingly important for ensuring the security of office buildings, but as the modern workplace evolves you’re unlikely to find a one-size-fits-all solution. Today, it’s commonplace to control entry to individual rooms or restricted areas and cater to more flexible working hours that extend beyond 9 to 5, so a modern and reliable access control system that exceeds the limitations of standard mechanical locks is indispensable. Access control systems have been developed that guarantee reliable entry management for indoors and outdoors. They use state-of-the-art readers and controllers to restrict access to certain areas, ensuring only authorised individuals can get in. With video cameras located within close proximity you can then monitor and record any unauthorised access attempts. The system can also undertake a people-count to ensure only one person has entered using a single pass. Scalable hardware components As previously mentioned, there is no one-size-fits-all system, but thanks to the scalability of the hardware components, systems can adapt to changing security requirements. For example, you can install Bosch’s Access Professional Edition (APE) software for small to medium-sized offices, then switch to the more comprehensive Access Engine (ACE) of the Building Integration System (BIS) when your security requirements grow. And, because the hardware stays the same, any adaptations are simple. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently The APE software administers up to 512 readers, 10,000 cardholders and 128 cameras, making it suitable for small to medium-sized buildings. With functions like badge enrollment, entrance control monitoring and alarm management with video verification it provides a high level of security and ensures only authorised employees and visitors are able to enter certain rooms and areas. Of course, there will always be situations when, for convenience, you need certain doors to be permanently open, such as events and open days. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently. Growing security needs You switch to the Bosch Building Integration System (BIS), without having to switch hardware (it stays the same, remember?). This is a software solution that manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform. It is designed for offices with multiple sites and for large companies with a global presence. Bosch Building Integration System (BIS) manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform The BIS Access Engine (ACE) administers up to 10,000 readers and 80 concurrent workplace clients per server, and 200,000 cardholders per AMC. An additional benefit to security officers is the ability to oversee cardholders and authorisations through the central cardholder management functionality and monitor all access events and alarms from every connected site. For consistency, multi-site cardholder information and access authorisations can be created on a central server and replicated across all connected site servers, which means the cardholder information is always up to date and available in every location. Intrusion alarm systems Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email Securing all perimeter doors is vital when protecting employees, visitors and intellectual property. Doors are opened and closed countless times during business hours, and when intentionally left open, your office is vulnerable to theft, and the safety of your employees is compromised. For this reason, intrusion control panels have been developed with advanced features to ensure all perimeter doors are properly closed, even when the system is not armed. If a door remains open for a period of time (you can specify anything from one second to 60 minutes), the system can be programmed to automatically take action. For example, it can activate an audible alert at the keypad to give employees time to close the door. Then, if it is still not closed, it will send a report to a monitoring center or a text directly to the office manager, and when integrated with video it can even send an image of the incident to a mobile device. Customised intrusion systems What about people who need to access your building outside of working hours, like cleaning crews? Your intruder system allows you to customise the way it operates with a press of a button or swipe of a card. This level of control enables you to disarm specific areas, bypass points and unlock doors for cleaning crews or after-hours staff, whilst keeping server rooms, stock rooms and executive offices safe and secure. Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email. You can program the panel to send you opening, closing, and other event alerts, which means you don’t have to be on-site to keep track of movements in and around your facility. Video management system A video management system will add a next level of security to your access control system Every office building has different video security requirements depending on the location, size and nature of the business. Some offices may only need basic functions such as recording and playback, whereas others may need full alarm functionalities and access to different sites. A video management system will add a next level of security to your access control system. For example, the video system can provide seamless management of digital video, audio and data across IP networks for small to large office buildings. It is fully integrated and can be scaled according to your specific requirements. The entry-level BVMS Viewer is suitable for small offices that need to access live and archived video from their recording solutions. With forensic search it enables you to access a huge recording database and scan quickly for a specific security event. For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management Full alarm and event management For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management. It’s also resilient enough to remain operative should both Management and Recording Servers fail. Large multi-national companies often need access to video surveillance systems at numerous sites, which is why BVMS Professional allows you to access live and archived video from over 10,000 sites across multiple time zones from a single BVMS server. When integrated with the BVMS Enterprise version multiple BVMS Professional systems can be connected so every office in the network can be viewed from one security center, which provides the opportunity to monitor up to 200,000 cameras, regardless of their location. Essential Video Analytics Video analytics acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture If your strategy is to significantly improve levels of security, video analytics is an essential part of the plan. It acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture. In effect, each video camera in your network becomes smart to the degree that it can understand and interpret what it is seeing. You simply set certain alarm rules, such as when someone approaches a perimeter fence, and video analytics alerts security personnel the moment a rule is breached. Smart analytics have been developed in two formats. Essential Video Analytics is ideal for small and medium-sized commercial buildings and can be used for advanced intrusion detection, such as loitering alarms, and identifying a person or object entering a pre-defined field. It also enables you to instantly retrieve the right footage from hours of stored video, so you can deal with potential threats the moment they happen. Essential Video Analytics also goes beyond security to help you enforce health and safety regulations such as enforcing no parking zones, detecting blocked emergency exits or ensuring no one enters or leaves a building via an emergency exit; all measures that can increase the safety of employees and visitors inside the building. Intelligent Video Analytics Intelligent Video Analytics have the unique capability of analysing video content over large distances Intelligent Video Analytics have the unique capability of analysing video content over large distances, which makes it ideally suited to more expansive office grounds or securing a perimeter fence. It can also differentiate between genuine security events and known false triggers such as snow, rain, hail and moving tree branches that can make video data far more difficult to interpret. The final piece in your security jigsaw is an intelligent camera. The latest range of Bosch ’i’ cameras have the image quality, data security measures, and bitrate reduction of <80%. And, video analytics is standard. Be prepared for what can’t be predicted. Although no-one can fully predict what kind of security-related event is around the corner, experience and expertise will help make sure you’re always fully prepared.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
The role of IT in physical access controlDownload
Powerful video surveillance protects Red Bull RacingDownload
Making your surveillance cyber secureDownload
- Louisa County Public Schools uses Vicon security solutions to prepare for emergency situations
- Genetec and Appriss Retail integration enables instant video correlation with suspicious transactions to detect theft and fraud
- 360 Vision upgrades London Borough’s camera system with Invictus to ensure public safety at a major event
- Matrix develops centralised time-attendance solution for Varsity Management across India