SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Deep learning solves nuisance alarms and tailgating in access control

Deep learning solves nuisance alarms and tailgating in access control
Larry Anderson
Larry Anderson
Contact company
Contact Hakimo
icon Add as a preferred source Download PDF version
Related Links
  • ACaaS — The future of access control systems
  • Which security systems are more proactive than reactive?
  • Why people will power business security in 2022
  • Choosing new security products versus the tried-and-true

Access control systems are plagued by problems, such as false alarms and tailgating. Hakimo is a new company that applies concepts of deep learning to reduce false alarms and tailgating, and to make access control more accurate.

False or nuisance alarms from access control systems take a lot of time and attention for operators in global security operations centres (GSOCs). It’s wasted time they could use to perform more high-level duties. Hiring enough GSOC operators to monitor and resolve hundreds of nuisance alarms is prohibitively expensive. Fortunately, technology can perform the job.

Eliminating nuisance alarms

Eliminating nuisance alarms also makes operators more attentive to legitimate alarms

Eliminating nuisance alarms also makes operators more attentive to legitimate alarms, rather than disregarding them as background noise. There is much less chance that an actual alarm would get lost among the nuisance alarms.

“In many cases, users ignore alarms and become conditioned to think that every alarm is a false alarm,” said Samuel Joseph, the Co-Founder and Chief Executive Officer (CEO) of Hakimo, adding “It’s like the boy who cried wolf.”

Video and data analysis using deep learning

To address the problem, Hakimo analyses video and other data using deep learning, a form of artificial intelligence (AI) that employs a deep neural network, in order to emulate the operation of the human brain. Data passes through multiple non-linear layers for faster processing.

In the case of Hakimo, video of a door entrance or exit provides the data, and the system analyses quickly to verify an alarm and/or to ensure that only one person passes through a door, after a card swipe or other form of authorisation.

There are many ways that an access control system can generate a nuisance alarm.
In an access control system with 300 doors, a GSOC might receive 100 nuisance alarms per day

Multiple ways to generate nuisance alarms

There are many ways that an access control system can generate a nuisance alarm. For example, when a door closes, it sometimes ‘bounces’ on impact, because the magnetic lock has not yet engaged.

That bounce is mistakenly interpreted as a ‘door forced open’ alarm, by the access control system. Another example is if a faulty motion sensor on the inside of a door fails to detect a person exiting the building. Again, the result is a false ‘door forced open’ alarm. In an access control system with 300 doors, a GSOC might receive 100 nuisance alarms per day. The problem is multiplied even more, in the case of enterprise users with larger systems.

Hakimo’s approach fits well in vertical markets

Hakimo’s approach fits well in vertical markets, such as critical infrastructure (airports, utilities, etc.)

Hakimo’s approach fits well in vertical markets, such as critical infrastructure (airports, utilities, etc.), and technology and manufacturing firms. A typical user would likely have 200 or more doors, and 5,000 or so employees.

To address tailgating, Hakimo leverages deep learning to determine if a second person has followed closely behind someone, who has been correctly authorised to enter a facility.

Previously, many users ignored this possibly serious security flaw. In other cases, laser beam hardware was installed on the door frame to detect tailgating, integrated with the backend system. These systems are also prone to false alarms.

Deep learning algorithms detect tailgating

Hakimo’s deep learning algorithms detect tailgating and alert GSOC operators, when it occurs. In effect, it allows the access control system to keep the right people in and the wrong people out. Recent advances in artificial intelligence (AI) and deep learning enable the system, which performs tasks that were impossible just a few years ago.

Avoiding nuisance alarms has a straightforward return on investment (ROI). GSOC operators can be more efficient and have more available time to perform other important duties to secure an enterprise.

Minimising nuisance alarms and preventing tailgating

The deep learning system can also be applied to analyse stored access control data

Although more difficult to quantify, the possible costs and serious consequences of a security breach (tailgating) also make a strong case for embracing the technology. Most purchasers buy the system because of the combination of its benefits, both to minimise nuisance alarms and to prevent tailgating.

The deep learning system can also be applied to analyse stored access control data and to recognise anomalies that might suggest a security breach. For example, if a badge holder comes to work at an unusual time, the system can recognise the anomaly and call it to an operator’s attention. Although not a core feature of the system, it is one that some users leverage.

Bi-directional integrations with security systems

Hakimo, which was founded in 2020, has initially sold its system directly to end users, but is in the process of developing an integrator channel. They have on-boarded many integrators and continue to do so. They have also developed partnerships with major manufacturers for bi-directional integrations with access control and video systems. The list is growing.

Samuel Joseph adds, “A common misconception among users is that AI system algorithms take time to ‘learn’ how to function optimally in an application. However, in the case of Hakimo, the system works right out of the box.”

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Digital video surveillance
  • IP video surveillance
  • Electronic security systems
  • Office security systems
  • Office security
  • Physical security
  • Commercial security
  • Perimeter security
  • Private sector security
  • Public sector security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security cameras
  • Security camera systems
  • Security monitoring system
  • Security access systems
  • Network monitoring
  • Electronic access control
  • Building security
  • Public security
  • Network cameras
  • Door access control
  • Security software
  • IP Surveillance
  • Security service
  • Outdoor video surveillance
  • Physical Security Information Management (PSIM)
  • IP security solutions
  • Security communication
  • Integration software
  • Perimeter protection
  • Cyber security
  • Mobile communications
  • Internet of Things (IoT)
  • Corporate Security
  • Central Monitoring
  • Data Security
  • Warning Devices
  • Incident Management
  • Cloud security
  • Artificial intelligence (AI)
  • Mobile access
  • Video surveillance
  • Machine Learning
  • Related links
  • Access Control Software Access control software
  • Standalone / Networked Access control systems & kits
  • Indoor/Outdoor IP Dome cameras
  • Proximity Access control systems & kits
  • Standalone/Networkable Access control controllers
  • Network IP cameras
  • Proximity Access control software
  • Central Monitoring Option Access control software
  • Door Monitoring Option Access control software
  • ID Badging Software License Access control software
  • Issuance and identification system Access control software
  • Related categories
  • Access control controllers
  • Access control systems & kits
  • Access control software
  • IP cameras
  • IP Dome cameras
Related white papers
Elevating security through multi-sensing solutions and large-scale AI

Elevating security through multi-sensing solutions and large-scale AI

Download
The 4 pillars of AI in managing high-stakes critical events

The 4 pillars of AI in managing high-stakes critical events

Download
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Related articles
Suprema BioStation 3 sets global sales record

Suprema BioStation 3 sets global sales record

A landmark gathering shaping the future of real estate, investment, sustainability & design

A landmark gathering shaping the future of real estate, investment, sustainability & design

Leuze AI elevates optical sensor precision

Leuze AI elevates optical sensor precision

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Security beat
About this page

Explore deep learning solutions for minimising nuisance alarms and preventing tailgating in access control systems, enhancing overall security.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec