Access control software - Expert commentary

Wireless technology is transforming motion detection
Wireless technology is transforming motion detection

Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localisation. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymised and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.

4 ways to keep your workplace protected from COVID-19
4 ways to keep your workplace protected from COVID-19

The unprecedented global impact of COVID-19 has taken its toll on all of us, but as cases of the virus thankfully recede, employers are now forced to confront how they can enable a safe return to work for employees. For many employers, this means they will have to carry out a COVID-19 risk assessment, redesign workspaces to maintain social distances, carry out more frequent cleaning, manage the transmission risk and find alternatives to touch-based security devices. Protecting workplace occupants in any emergency requires preparation and clear communication. This is especially critical in a health crisis involving an infectious disease. These are some of the essential best practices that could help organisations reduce the impact on their employees and operations during this pandemic. 1. Use a visitor management system With a visitor management system, organisations have a single source of real-time and historical insights into who is, or was recently, in the workplace. This is especially important because of the need to perform contact tracing should anyone in the organisation show symptoms of COVID-19, meaning everyone they have been in contact with needs to be contacted and asked to isolate. Yet still, first impressions are made at the front desk or lobby, where the visitor experience needs to be a positive one. At the same time, though, any emergency event requires that there be strict control over who is entering the workplace. This policy also needs to be clearly communicated to visitors. Doing this minimises risk to visitors as well as the workforce. In addition to delivering a high-quality visitor experience, the ideal visitor management system must: Enable organisations to meet regulatory compliance mandates and facilitate check-in at a self-service kiosk to minimise wait times. Customise the visitor experience to support specific security needs, such as accelerating and simplifying check-in or requiring additional security pre-checks. Automate compliance as it relates to visitor access rules with historical visit reports. 2. Pre-check questions at visitor registration kiosks Organisations can strengthen security at the registration kiosk using a flexible, enterprise-grade visitor management system to add visitor sign-in steps. This has proven successful in the past when used to control the spread of infectious disease during an outbreak. An example of this is a U.S. children's hospital which managed to reduce facility infection rates by 25 percent over a two-year period using a commercial, off-the-shelf physical identity and access management (PIAM) solution from HID Global. The solution provides two particularly important capabilities that can be used by organisations to protect their workplace from the uncontrolled spread of an infectious disease: Enhance visitor registration policy with additional mandatory questions to help identify any visitors who may need other screenings. Extend the visitor registration kiosk with a mandatory pop-up asking further questions during visitor check-in. 3. Understand who has visited your workplace Successful controlling the spread of infection throughout a facility requires the ability to automatically maintain an auditable trail of activity. This can be done using an enterprise-grade visitor management system that makes it easy to retrieve historical visit reports. This provides a timeline of who was in the workplace, and when they were there. Key features include: A single dashboard providing useful visitor insights at your fingertips. Historical reports that provide visitor details including location and contact information, all in compliance with General Data Protection Regulation (GDPR) and other privacy regulations. 4. Clearly communicate how infection risks can be reduced Global organisations must actively communicate with visitors and employees on the outbreak of infectious diseases and follow best practices outlined by the World Health Organization (WHO). Here are several things organisations can do in this area to help maintain a safe and healthy workplace: Re-enforce and communicate WHO best practices with guideline posters in the front lobby and throughout the workplace. Add posters that also encourage regular and thorough washing of hands. Encourage everyone to cough or sneese into their shirt sleeve in their flexed elbow or cover their mouth and nose with a tissue. Encourage everyone to keep a relatively safe distance from each other and use alternatives to handshakes when saying hello. Organisations must contend with a variety of workplace challenges during the outbreak of an infectious disease. These challenges can be solved with best practices that include a comprehensive visitor management system that automates critical check-in policies and maintains an auditable trail of visitor activity.  

The role of building systems to ensure safety as employees return to work
The role of building systems to ensure safety as employees return to work

Returning to work after the global pandemic will not be business as usual, and security systems are an important asset when it comes to helping to keep occupants and buildings safe. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. These foot-traffic patterns can inform settings for a variety of devices – like ventilation and temperature controls – and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. “While the ‘new normal’ is still being defined, we believe there will be a greater focus on creating healthier environments while also complying with new regulations,” says Marcus Logan, Global Offering Leader, Honeywell Commercial Security. “Temperature, humidity, energy efficiency, security, safety, comfort, productivity, and demonstrating compliance with regulations are all a part of a healthy building.” For example, social distancing is a new concept for the workplace. How do you make that happen in an open work setting, in breakrooms, elevator lobbies and meeting spaces? Optimised systems create healthier environments Anxious employees will need reassurance about returning to the workplace Building owners will need to look at how they can optimise their systems – or deploy new ones – to create a healthier environment. Building technologies, like those provided by Honeywell's Healthy Buildings solutions, provide building owners with more control over critical factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations, and a company's risk management policies. These solutions also provide transparency for occupants into a building's status, says Logan. Hygiene will be a critical issue: People will want to know that the spaces are ready for their return. Increased cleaning procedures and schedules will evolve, and a way will be needed to demonstrate the procedures are effective and that they have been strictly adhered to. Identifying ways to measure effectiveness of sanitisation and track compliance to the procedures will be a key challenge to solve. This is a space that will evolve significantly in the coming months and years, says Logan. Access control and video analytics Contact tracing is a new requirement in some businesses, and security technology – like access control and video analytics with advanced reporting – can help. Access control technology integrated with video analytics can be used to trace occupant movements within a facility. These technologies capture data that can be used with advanced reporting to provide a digital footprint of where a person has been within a facility and if they may have been exposed to someone identified as being infected with a contagious virus. Building owners can then proactively notify exposed individuals evolve to self-quarantine and minimise further spread of an infection. Video analytics can help to predict where and when occupants encounter each other Anxious employees will need reassurance about returning to the workplace. They will not only seek confidence that the building is optimised for a healthier environment but also that processes are in place to quickly identify and respond to potential issues. Transparency and visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace. “One way to do this is to share building analytics with occupants – to help them understand factors about the indoor air quality or occupancy density,” says Logan. Controlled health, safety and security Honeywell’s solutions provide building owners with more control over critical health, safety and security factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations and a company’s risk management policies, Logan adds. Visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace Every day there is new information coming from the medical and scientific community about COVID-19, and the building industry is just starting to learn what it all means. Logan warns that there is no single solution that will keep every environment healthy and safe. A good strategy features deploying a combination of solutions, optimising systems and being vigilant to make sure that companies are sustaining compliance to new and changing regulations, says Logan. “Today more than ever we must be mindful of the changing culture of how buildings are managed by making apparent the need to be mindful of health and well-being in all aspects of our lives,” says Logan. Honeywell has developed outcome-based solutions that allow building owners to transparently address building quality factors while supporting their business continuity needs in the uncertain environment. “We’re giving them the data they need to confidently reassure their employees to accelerate their business operations,” he adds.

Latest HID Global news

HID Global announces Aero Controller Platform with encrypted communication and threat detection
HID Global announces Aero Controller Platform with encrypted communication and threat detection

Building on the success of HID’s Mercury, HID Global, a worldwide provider in trusted identity solutions, has announced the HID Aero platform featuring its next generation of open-architecture intelligent controllers that increase choices for a wide range of businesses while future-proofing access control investments as requirements change. “HID Aero is providing a broader market with features that were generally available only in solutions for larger organisations, while eliminating the ongoing cost and complexity of designing, manufacturing and maintaining panel hardware at the same time,” said Jaroslav Barton, Director of Product Marketing at HID Global. “It also brings end-to-end security to everyday applications with encrypted communication and threat detection, and robust features to meet corporate compliance.” Access control software with low maintenance Based on HID’s Mercury hardware used in more than four million panels shipped globally, the HID Aero platform speeds development time for access control solution providers by including all required hardware, firmware, software and development tools. Benefits for users include: Easily adaptable to evolving requirements: Users can choose from a large variety of access control software providers when deploying solutions. Systems are also easy to migrate to new software and highly configurable to dynamically enhance situational awareness. Lower installation and maintenance costs: HID Aero enables remote management capabilities with HID readers supporting Open Supervised Device Protocol (OSDP), including its recently announced Signo readers with built-in support. This minimises the need for field inspection and reconfiguration. Key encryption and backward compatibilty End-to-end security from credential to host: HID Aero brings to smaller businesses many features generally available only in enterprise-class solutions, including host and controller authentication, encryption to protect keys and sophisticated threat detection. Trusted reliability, proven technology: Based on HID Mercury panel hardware and system technology, the durable controllers fit in the same footprint as earlier HID VertX® controllers and are backward compatible with HID VertX modules to simplify upgrades.

HID Global helps banks to protect data and transactions and provide seamless customer experience
HID Global helps banks to protect data and transactions and provide seamless customer experience

As consumers embrace the convenience of online and mobile banking at traditional and the latest all-digital financial institutions, it has become an increasingly difficult challenge to combat cybersecurity threats while complying with regulatory data-protection mandates. HID Global, a provider of trusted identity solutions, has solved those challenges for numerous banks as part of their digital transformations. “Our solutions protect data and transactions while delivering a seamless experience for the consumer and maximum flexibility for banks,” said Brad Jarvis, Vice President and Managing Director of Identity & Access Management Solutions (IAMS) with HID Global. Cloud-based authentication services “This includes the option of cloud-based authentication services that remove the complexity of providing multifactor authentication to a growing and diverse user population while also offering the convenience and efficiency of centralised regulatory compliance audits.” Here are a few examples of how HID is helping address some of the most challenging mobile banking issues: A retail bank in Egypt has improved compliance and reduced fraud and operational costs with an HID® Trusted Transactions® solution that is pre-integrated with Temenos digital front office and core banking products. A Swiss wealth management group is using the solution, along with HID ActivID® Authentication Server, to optimise flexibility while protecting mobile banking transactions and securing corporate data, applications and systems. In addition to many others, two banks in Eastern Europe and the UK are using the solution for quick and easy compliance with Second Payment Services Directive (PSD2) regulations. Ensuring business continuity The use of digital channels has grown in Europe by up to 20 percent during the COVID-19 pandemic Even with financial institutions returning to normal operating hours, many believe digital banking will grow in importance as part of ensuring business continuity and supporting customers who prefer not to visit their local branch during the health crisis. According to a McKinsey & Company, the use of digital channels has grown in Europe by up to 20 percent during the COVID-19 pandemic. “In just a couple of months, customers’ adoption of digital banking has leapt forward by a couple of years,” the article’s authors wrote. Threat and fraud detection “Our most recent customer survey showed a 10 to 20 percent rise in digital banking use across Europe in April. Many Italian banks are striving to enable every single one of their customers to use digital banking. Such a jump in adoption opens the door for banks to turn digital channels into real sales channels, not just convenient self-service tools.” HID Global’s complete HID Trusted Transactions offering includes the HID Authentication platform delivered either as a server or service, plus a choice of hardware tokens or the HID Approve multi-factor authentication solution with mobile push notification capabilities, and HID Risk Management Solution (RMS) – Threat and Fraud Detection. The comprehensive offering delivers risk-based adaptive authentication, threat detection and transaction signing.

HID Global expands biometric identity verification to police forces and military installations around the globe
HID Global expands biometric identity verification to police forces and military installations around the globe

HID Global, a worldwide provider of trusted identity solutions, announced the expansion of its biometrics identification management solutions to police departments and military installations around the globe. A large police force that covers a major capital city in Europe is using its HID NOMAD 30 Pocket Reader for rapid suspect identification in the field. Initially launched for Android platforms, the solution’s SDK is now available for iOS devices. This extends Bring-Your-Own-Device (BYOD) benefits to a wider scope of clients who seek a truly flexible and mobile single-fingerprint verification solution. Mobile biometric solutions “The expansion of our offering to include iOS platforms broadens the adaptability and application of our mobile biometric solutions and equips our customers - from law enforcement to military officials - with the confidence to achieve rapid identification anywhere,” said Jessica Westerouen van Meeteren, VP and Managing Director, Citizen Identity with HID Global. “Ensuring that our portfolio of proven solutions is optimised with the latest, best-in-class capabilities to create safer societies is key to our mission as a global leader in trusted identities.” Biometric reader hardware The HID NOMAD 30 Pocket Reader’s rapid identification capabilities offer improved operational efficiency The HID NOMAD 30 Pocket Reader’s PIV-certified sensor enables end-users, such as law enforcement officers, to quickly capture and verify single fingerprints against databases and eliminates the need to transport suspects to a central booking station. With Android and iOS availability driving wider adoption, officers can simply pair their own mobile devices with the biometric reader hardware and perform watchlist matching within minutes while in the field, leaving custody space open for confirmed offenders. The HID NOMAD 30 Pocket Reader’s rapid identification capabilities offer improved operational efficiency and reduce time and booking costs associated with processing a suspect in a police station. During the first year of deployment, one city saw a six-fold increase in the number of suspects identified and more than $600,000 in savings. Extending biometrics to military bases As a provider of mobile biometrics, HID Global also provides a broad range of biometric identity management solutions to customers beyond law enforcement. One of the company’s many offerings include the HID SEEK Avenger rugged handheld biometric reader that is used by military bases around the world to accurately identify individuals and provide access to their premises. The solution captures high-quality fingerprints and IAP-40 compliant iris images for verification against as many as 250,000 records and offers offline functionality in harsh environments where connectivity is compromised. HID recently extended the HID SEEK Avenger biometric reader with several features, such as support for Windows 10, an upgraded camera, double the memory and hard drive capacity for enhanced speed and performance, which expands upon its powerful watchlist matching capabilities.

Related white papers

Automatic vehicle identification: State of the industry 2020

How analytics engines mitigate risk, ensure compliance and reduce cost

11 considerations for embedded system RFID readers