Access Control is always a very critical aspect of an organisation's overall security strategy. Regardless of its size, it is inevitable for any organisation to have a flexible and comprehensive access control solution. To connect separate areas in the single location requires a standalone access control. For small and medium organisation, Matrix has designed a standalone Access Control solution for small organisations, while keeping security and simplicity in mind. This innovative solution work...
Meesons, UK’s entry control innovator, will be unveiling its innovative EasyGate Superb at this year’s International Security Expo (ISE19), Olympia London, 3-4 December, stand K40. At 99mm the EasyGate Superb cabinets are the slimmest of any Speed Gate on the market, accentuating the sleek, minimalistic aesthetics created by the glass wings. EasyGate Superb is an ultra-slim, fully customised Speed Gate that is an ideal solution for controlling access to offices, schools, universities...
Suprema ID., global provider of biometrics and ID solutions, has announced that the company would showcase a wide range of global partner's solutions integrating its World's slimmest FAP20/FAP30 fingerprint authentication scanners at TRUSTECH 2019 in Cannes, France on 26-28 November 2019. Live Finger Detection The partner's solutions include Sleek Android Tablet/POS, Rugged Windows 10 Capturing Terminal, and Programmable Fingerprint Keyboard. All products have adopted Suprema ID's latest techn...
Matrix is gearing up for participation in the 13th edition of The International Fire & Security Exhibition and Conference (IFSEC) India. The company will be demonstrating their latest Time-Attendance and Access Control device COSEC ARGO along with People Mobility Management and Video Surveillance solutions. At the event, Matrix will be showcasing COSEC ARGO, their performance, design and engineering wonder, equipped with an enhanced IPS LCD touchscreen for a visually splendid experience. Th...
Honeywell is expanding its OmniAssure access control reader product line with the launch of the OmniAssure Touch access control solution. OmniAssure Touch provides advanced security against credential cloning and reader tampering, increases operator productivity when deploying mobile credentials, and is interoperable with a range of credential technologies and panel communication protocols. The passive intent access control readers help people get into an area faster – just with the touch...
Fujitsu launches sales of the "FUJITSU Security Solution AuthConductor V2" which uses various authentication methods, including palm vein authentication, to deliver comprehensive biometric authentication support for customers. In addition to providing a unified palm vein authentication office environment, this product features facial authentication, fingerprint authentication and IC card authentication for PC logons, and is fully scalable to support use by anywhere from several people to organis...
HID Global®, a pioneer in trusted identity solutions, will exhibit a host of new products, including biometrics at the door and new integrations, at HID booth #1503 during this week’s GSX 2019 in Chicago. As a sponsor member of the recently launched FiRa™ Consortium, HID Global will feature a demonstration of Ultra-Wideband (UWB) technology. The company will also showcase its award-winning HID Mobile Access® solution and Seos® credential technology. Visit the HID booth at McCormick Place from Sept. 10-12 for live demonstrations of the company’s latest solutions for issuing, authenticating, managing and monitoring trusted identities. Multispectral imaging technology HID Global’s new fingerprint reader merges credential excellence with HID’s globally-patented multispectral imaging technology to fuel broad adoption of biometrics at the door. The high-performance iCLASS SE® RB25F fingerprint reader provides an unrivalled experience by dramatically increasing image capture performance and fingerprint matching in under a second. The new integration of HID® SAFE™ Enterprise, a centralised platform for identity management, with the revolutionary cloud-based card issuance solution HID® FARGO® Connect™ takes seamless on-boarding and credential issuance to a new level. HID SAFE’s award-winning physical identity and access management solution allows identity information to be captured from physical access control systems, active directory, HR, and other external systems so that it can be pre-loaded prior to printing a credential. HID FARGO Connect enables organisations to easily design cards, capture data and securely print cards Demonstrations will highlight how the integration of HID FARGO Connect further streamlines the onboarding process. HID FARGO Connect enables organisations to easily design cards, capture data and securely print cards—all with a single click from any device and from anywhere across multiple printers or locations. HID Global will be showcasing its latest physical access control tool, HID® Reader Manager™, which allows security professionals to govern authorisation keys, change reader configurations, update firmware, and inspect the status of enabled readers within Bluetooth proximity through a mobile app. HID Reader Manager complies with the latest industry-standard, Open Supervised Device Protocol (ODSP). The FiRa Consortium kiosk will demonstrate UWB for mobile access control based on IEEE 802.15.4 secured fine ranging technologies. The recently launched consortium endeavours to grow the UWB ecosystem so new use cases for fine ranging capabilities can thrive, setting a new standard in seamless user experiences.
Suprema ID, a global provider of biometrics and ID solutions, announced that the company's BioMini Slim 3, the world's slimmest FAP30 optical fingerprint authentication scanner, received FBI PIV (Personal Identity Verification) and Mobile ID FAP30 certification, tested under the FBI's Next Generation Identification (NGI) Image Quality Specifications (IQS). BioMini Slim 3 features an array of cutting-edge technologies including 15mm ultra-slim FAP30 optical sensor with wider platen, Suprema ID's proprietary Multi-dynamic Range (MDR) technology and IP65-rated dust and waterproof structure ensuring robust operation over time under harsh environments. BioMini Slim 3 provides state-of-the-art Live Finger Detection (LFD) technology by applying machine learning based AI (Artificial Intelligence) which can be upgradeable by BioMini Slim 3 SDK. "BioMini Slim 3 is designed to provide the best reliable performance over dynamic conditions such as outdoor and mobile environments. In addition, we have responded to the increased market demand for FAP30 fingerprint scanners," said Bogun Park, CEO of Suprema ID. "With the range-leading performance and usability, BioMini Slim will lead the emerging FAP30 scanner segment. We will keep focus on providing the best product beyond market expectation with the highest convenience and security," Park added.
Suprema ID, global provider of biometrics and ID solutions, has announced that it will launch the new FAP30-compliant BioMini Slim 3 fingerprint scanner, at ID4Africa 2019 in South Africa on 18 - 20 June 2019. BioMini Slim 3 fingerprint scanner The new BioMini Slim 3 comes with the world's slimmest optical sensor. With the FAP30 compliant wider platen, the scanner now captures wider area of fingerprints which leads to better accuracy. The sensor's slim form factor also allows extra flexibility in design when loaded in the mobile devices. Featuring Suprema's latest deep-learning based LFD (live fingerprint detection) technology, the new BioMini Slim 3 effectively prevents spoofing with fake fingerprints with various materials including rubber, silicon, film and paper. Furthermore, BioMini Slim 3 is also equipped with Multi-Dynamic-Range technology that enables users to capture high-quality fingerprints under harsh environments and under direct sunlight up to 100,000 LUX. BioMini Slim 3 is designed to offer the best fingerprint authentication performance over dynamic environments" Fingerprint authentication technology "The new BioMini Slim 3 has been designed to provide the best reliable fingerprint authentication performance over dynamic environments such as outdoor and mobile situations. At Suprema ID, our commitment is to provide the best product beyond market expectation with the highest user's convenience and security," said Bogun Park, CEO at Suprema ID. At the show, Suprema ID will present full demonstrations of its BioMini series FBI-certified fingerprint authentication scanner as well as Suprema ID's new Android-compatible RealScan-G10 and RealScan-D scanners.
Suprema ID, global provider of biometrics and ID solutions, has announced that it will showcase the new FAP30-compliant BioMini Slim 3 fingerprint scanner, at SDW2019 in London, UK on 11 - 13 June 2019. BioMini Slim 3 fingerprint scanner Suprema ID's new BioMini Slim 3 fingerprint scanner comes in a robust IP65-rated dust and waterproof structure with the ultra-slim optical sensor featuring its proprietary advanced LFD (Live Fingerprint Detection) technology to prevent spoofing frauds. Moreover, Suprema ID's new FAP30-compliant fingerprint scanner will maintain the highest standards of FBI PIV/FIPS201 and mobile ID FAP30 certifications, and enable users to capture high quality fingerprints under harsh environments and under direct sunlight up to 100,000 LUX. "The new Suprema ID's FAP30-compliant fingerprint scanner has been designed to provide the best reliable fingerprint authentication performance over dynamic environments such as outdoor and mobile situations. At Suprema ID, our commitment is to provide the best product beyond market expectation with the highest user's convenience and security," said Bogun Park, CEO at Suprema ID. Fingerprint recognition and authentication At the show, Suprema ID will present full demonstrations of its BioMini series FBI-certified fingerprint authentication scanner as well as Suprema ID's new Android-compatible RealScan-G10 and RealScan-D scanners.
Globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has announced that it has now shipped 1 billion fingerprint sensors worldwide. The Swedish-based biometrics specialist company has played a central role in bringing smartphone fingerprint sensors to the mass-market. Having led major advancements to the technology, Fingerprints was responsible for driving the first integration of fingerprint touch sensors into an Android handset back in 2014, with its high-tech fingerprint sensors now integrated into more than 330 smartphone models globally.Fingerprint biometricsFingerprint biometrics has already replaced the PINs and passwords on smartphonesFingerprint biometrics has already replaced the PINs and passwords on smartphones and as devices diversify, Fingerprints’ expertise is also bringing trust to a range of new, next-generation form factors, cutting across a variety of applications, including access control, smartcards and IoT.“This represents a major milestone for the company and the industry, demonstrating rapid consumer adoption of biometrics in recent years,” comments Phil Sealy, Principal Analyst at ABI Research. “We see sustained growth for the biometrics market in the coming years, driven by existing use cases like smartphones, and the rise of new applications like payment cards and connected cars. Fingerprints will continue to play a significant role in enabling innovation in these areas, taking its significant biometric expertise and reapplying to new emerging use cases.”Optical fingerprint sensors for mobileEarlier this year, Fingerprints secured the world’s first volume order of fingerprint sensors for dual-interface payment cards. To complement these existing capacitive sensors, Fingerprints recently announced optical ‘in-display’ fingerprint sensors for mobile, enabling consumers to authenticate on the smartphone screen and offering OEMs greater design freedom. Its full portfolio of biometric solutions also includes ‘touchless’ biometrics solution, with iris and facial recognition combined for a convenient and secure user experience.“This is a proud moment for us and the global biometrics industry; proof of how far we’ve come in simplifying the lives of consumers every day, all over the world. But this is just the beginning,” comments Christian Fredrikson, CEO at Fingerprints. “With huge investment into hardware, software and algorithms, we are continuing to drive new innovative solutions to market while increasing performance and enhancing the user experience. As applications continue to arise and new technologies emerge, we’re committed to realising our vision of truly seamless ‘all-in’ security, where you are the key to everything.”
NatWest has rolled out the UK’s first biometric payment card trial. The card is provided by Gemalto and is using Fingerprints’ T-shape sensor module and newly-announced software platform for payments. Its ultra-low power consumption means that the card does not need to feature a battery, as it borrows power from the contactless POS terminals, and superior biometric performance ensures both security and convenience for its user. This is the first trial in the UK, a leading and pioneering market for contactless payments. As part of the trial, NatWest customers will be able to verify transactions above the £30 payment cap using their fingerprint instead of PIN code, using an easy and secure interface.
Recent research shows most access control technology currently in use is not as secure or convenient as many security managers believe, according to day-to-day users of the system. In this HID Global white paper, you will discover what different companies look for in an access control system, why certain legacy access control systems may be vulnerable to attack, and why upgrading to a new access control system can result in huge benefit for enterprises and end users. Find out more about: Access control new opportunities Main objections to access control systems Is your system as secure as you think? Ineffective access control policies Why upgrading can benefit enterprises Conclusion
Time and attendance has proven to be a successful use of biometric technology traditionally used for controlling access to highly sensitive areas Security technology is increasingly being used to help organisations tackle challenges going far beyond controlling access to office buildings and monitoring parking lot activity. Video, in particular, has become the darling of many markets. Retailers use live and recorded video to assess promotional sales efforts. Manufacturers confirm employees are following mandated safety regulations. Transit officials debunk false liability claims with a review of recorded mobile video. But here’s a relatively new one – biometrics. Long thought perfect for controlling access to highly sensitive public and private research and military facilities, they are showing up in offices, hotels — even in remote fruit fields and sugar processing plants — for employee time and attendance. It’s proven to be a successful use of the broad technology. Risks of mechanical and electronic clocks The process of keeping track of employees’ hours has long been open to fraud and other issues. Mechanical time clocks — in use since the 1800s — and even more modern electronic clocks using magnetic stripe or proximity cards are open to a process known as ‘buddy punching.’ That’s a scheme in which an employee clocks in and/or out for a friend who may be late or not even at work. Mechanical systems are also slow, potentially leading to long queues during shift changes resulting in wasted time and lost productivity. Mechanical cards also need to be keystroked into the payroll system, requiring significant back office time for data entry. Electronic cards can be shared. They may also be lost or stolen, costing additional time and money in back office expense. Even small errors in collecting and processing employee time and attendance can add substantially to the cost of payroll, already a major expense for any organisation. Studies by a leading international human resources consulting firm have shown even small payroll errors and fraud can boost operating costs by up to 10 percent. Biometric time and attendance solution But fraud, delays and lost credentials can be largely eliminated by a biometric solution. Common biometric systems involve hand or fingerprint readers, facial identification or iris recognition. Each technology records and then compares physical characteristics unique to every individual. However, changes in weight, hairstyle, finger or hand size, cuts or even the effects of manual labour can trigger the need for re-enrolment – in all except iris-based solutions. Fraud, delays and lost credentials can be largely eliminated by a biometric solution Iris recognition advantages The structural formation of the human iris (the visible coloured ring around the pupil), is fixed from the first year of life and remains constant. And few people can’t use the technology, as most individuals have at least one eye. Even blind people have successfully used iris recognition. At employee enrolment, iris systems utilise an industry-standard camera to capture an image of the iris. Software converts that to a small template stored in a terminal database. Authentication requires employees to stand roughly 18 inches from an iris reader and the process takes about two seconds. With multiple readers installed, long lines are eliminated. Also eliminated is fraud. Since every user’s iris is unique and required to be present at the reader, time fraud schemes are virtually impossible. The system can also prevent another type of back-office time fraud known as “ghost employees” – non-existent people added to the payroll. Security is also enhanced. The digital templates can’t be used to produce any sort of visual image, affording a high-level of defence against employee identity theft. An iris recognition system can also grant facility access as employee’s clock in for work. Iris recognition case study Here’s an example of how an iris recognition system has benefitted a major Turkish fruit and vegetable grower and one of Europe’s largest providers of juice. The nature of the local work force created a major time-and-attendance challenge. "Fingerprint and facial recognition systems were tried briefly. Facial recognition suffered from workers’ changes in hairstyle, facial hair, glasses and protective gear" New labourers arrive daily seeking work. Once hired, they might work a few days and then leave before returning a week later. Unreliable schedules made standard time cards virtually impossible to manage. The company’s security integrator suggested smart cards as an option. But that wasn’t much of an improvement as authorising, printing, distributing and tracking cards for thousands of on-and-off workers continued the human resources nightmare. Also, improper use of the cards threatened to cut into the company’s profits. Both fingerprint and facial recognition systems were tried briefly. The constant cuts and scars workers get from the manual labour impaired the accuracy of readers. Facial recognition suffered from workers’ changes in hairstyle, facial hair, glasses and protective gear. Daily payroll reports are transmitted to the company’s Istanbul headquarters using wide area networks in the fields and satellite communication. Software links the received data to a payroll module which automatically calculates employee hours and produces paychecks. The system currently has more than 10,000 enrolled workers. More are being added on an almost daily basis. Once a worker is in the system, it doesn’t matter how often he may leave. When he returns, the iris system immediately recognises him. Also, the contactless iris-based technology inhibits the transfer of virus or bacteria as there is no direct employee contact with the biometric readers. If these systems can work in remote areas of Turkey, they can certainly work in downtown Boston. And they do. There, a boutique hotel uses iris-based identity authentication to keep the hours of its employees. The same system also allows VIP guests to enter their suites without a key card. Reductions in cost Recent reductions in both product and deployment costs have made using biometrics, including iris recognition, a practical time and attendance investment for organisations of almost any size and in any location. Of course, biometrics still remains the go-to choice for protecting sensitive locations and international borders, as well as national identity and voter registration programmes.
Part 4 of our Security in Healthcare series Secure visitor management integrated with physical access control systems (PACS) is increasingly popular Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. For instance, one children’s hospital recently chose HID Global’s EasyLobby Secure Visitor Management solution to streamline screening/badging using driver’s licenses or other government-issued IDs. Integration with hospital databases enables benefits like accessing real-time patient feeds using Health Level-7 (HL7) standards. All visitor information Is seamlessly passed to the hospital’s access control system to optimise efficiency at nine stations badging more than 160,000 visitors annually. The example shows what technology can do in the area of visitor management. Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or “after hours” An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during “after hours” periods, according to HID Global. Systems should support real-time patient feeds using HL7 integration, which ensures that no visitor is sent to the wrong location or to see a patient who is no longer checked in. Systems should also pre-register approved vendors and temporary employees through Status Blue integration, and support integration with access control systems for the most efficient badging. Barriers to visitor management "Due to financial limitations, many hospitals are trying to make do with older desktop technology, and have not been able to benefit from some of the newer efficient options, such as mobile tablet-based visitor management, "says Paul Terschuren, CEO, STOPware Inc. "And, some hospitals have the mistaken belief that the multiple entrances and complexity of a modern hospital facility pose a barrier to implement visitor management, or that managing visitors more closely will create an unwelcoming culture or environment," says Terschuren. "As a result, some hospitals only implement visitor management after hours, when the number of entrances and visitors is reduced." "However, neither of these ideas should be barriers", says Terschuren –" visitor management can be implemented at multiple entrances, including unstaffed entrances, and managed easily by the software. And, many hospitals have found that visible security improvements, when they are not overly burdensome, actually improve the feeling of safety and security with patients, visitors and families alike. Some hospitals with limited implementations are already realising this and changing their plans to implement systems hospital-wide." Visitor management can be implemented at multiple entrances, including unstaffed entrances, and managed easily by the software STOPware PassagePoint visitor registration STOPware specialises in visitor management, a critical element in physical security for hospitals and healthcare facilities. STOPware’s flagship software product, PassagePoint, provides visitor registration and pre-registration, visit approvals, identity confirmation, visit logging, and integration with access systems. STOPware also provides related hardware including self-registration kiosk, mobile registration tablets, credential scanners, and badge printers. As announced in March, PassagePoint software now integrates with HL7 to allow real-time patient location tracking for hospitals and healthcare facilities, as well as integration with more than 20 access control systems to help make the healthcare environment more secure. STOPware takes Health Insurance Portability and Accountability Act (HIPAA) and all privacy regulations very seriously. The PassagePoint HL7 module only uses patient location data, and functions as a “listener;” that is, the data used by the module is not “stored” in PassagePoint. The HL7 integration only makes use of patient location data and does not collect or use any diagnosis information. PassagePoint is also designed to protect visitors’ Personal Identifiable Information – either by not capturing certain data or by encrypting information that is stored. By treating sensitive information of both patients and visitors in this way, STOPware Visitor Management system is designed to help healthcare facilities protect privacy in alignment with the letter and the spirit of their required regulations. Pre-booking and advance approval Tighter control of visitor and contractor management in non-public areas through pre-booking and advance approval are developing areas, says Dave Ella, Vice President of Product Marketing, AMAG Technology. AMAG has developed a new visitor management solution called Symmetry GUEST that allows visitors to be vetted to provide a safer and more secure environment for patients and staff, as well as the use of smartphones as identification and access credentials. "Guards, and general staff for that matter, need training on how to properly deal with unruly or inappropriate patients and visitors in such a way as to secure the situation" Staff training and turnaround processes are an often-overlooked element of a security plan in general, and a Visitor Management plan in particular, says Terschuren of STOPware. “It is well and good to put guards and checkpoints in place, but what should those guards do when they find someone that should be denied entry? Guards, and general staff for that matter, need training on how to properly deal with unruly or inappropriate patients and visitors in such a way as to secure the situation while minimising the chances of negative impact on the facility. “ STOPware expects that remote reception desk management, which makes use of an operator from another location and/or country who can greet and process visitors efficiently, will continue to grow and improve. Integration of Visitor Management systems with access control and other security-related systems provides for safety and an audit trail in such implementations. “We are also seeing a groundswell of interest in Mobile Visitor Registration and Kiosk Self-Registration and Sign-ins,” says Terschuren. “These systems increase efficiency, empower visitors, and provide for a better visit experience that many facilities find compelling.” Combining identity verification and visitor management “We are also seeing the growing importance of identity verification; and, in particular, the use of biometric methods to verify identity, ranging from fingerprints and facial recognition all the way to higher security iris readers,” Terschuren adds. “Identity verification can tie in with Visitor Management, both in terms of identifying visitors, but also in terms of verifying the authority of hosts and approvers, to improve the security of sensitive areas and facilities in general.” One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Read Part 5 of our Security in Healthcare series here
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organisation (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
“These are children. There is no reason to scan a kid. Just because the government can do this is no reason the government should be doing this.” The impassioned argument, quoted by The Florida Current, comes from a Florida state legislator who introduced a bill aimed at stopping public school systems from collecting biometric data on children. The ominous-sounding practice actually has a practical side – use of a fingerprint or palm scan can enable a school system to get thousands of students through a lunch line in a short period of time. The schools have found a quick fingerprint scan is faster, and more secure, than use of an identity card or PIN number. The system has been used in 83 schools for several years in one district and reflects an investment of $300,000, according to the newspaper. The system could also be used to identify parents, employees and volunteers, which could help to prevent strangers from sneaking into a school function. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns The proposed bill, which is “pending reference review,” would provide for parental notification of data collected on students by schools. (It also would require the school to phase out Social Security numbers, replaced by a unique ID number developed by the state Department of Education.) I'm not sure exactly what the problem is with “scanning a kid,” as long as there are no adverse health effects, a concern I am sure has been addressed (and in any case was not an argument presented in Florida against the technology). I don't have a problem with parental notification; it's the underlying attitude toward technology implied in the bill that I find troubling. As I understand it, the intent of biometric systems is to confirm an identity. A student enrols in the system with a fingerprint or palm print scan, and the system stores only data points from that scan, which are compared with data points when the individual uses the system again. The system doesn't actually store a complete fingerprint, and there is no massive centralized database of children's fingerprints that could be stolen or otherwise compromised. If I'm wrong, someone correct me – please. Too often, negative responses to technology are based on misunderstanding. Emotions can get in the way of information. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns. UPDATE: Florida’s Senate Bill 188, which imposes a blanket prohibition on the use of biometric identification technology within the Florida public school system, was signed into law by Gov. Rick Scott on May 12, 2014. This despite a letter from the Security Industry Association opposing the bill. SIA’s letter read in part: “While SIA understands the legislature’s concern for protecting the privacy of Florida students, we are troubled that widespread misperceptions about the nature and use of biometrics technology has enabled passage of the bill without a thorough debate examining the student safety and local economic implications — and despite any reported cases of identity theft or misuse of information collected by such systems.”
HID Global, global provider of trusted identity solutions, has enabled BigWise, a global provider of wise solutions worldwide, to bring the security and convenience of biometrics to its retail and restaurant customers. BigWise went from concept to a pilot of its new biometric-enabled Stellar POS platform at a major customer within 30 days using the HID DigitalPersona fingerprint biometric solution. HID DigitalPersona fingerprint biometric solution HID’s fingerprint biometric solution significantly shortened our path for secure fingerprint biometric authentication" “HID’s fingerprint biometric solution significantly shortened our path for adding secure fingerprint biometric authentication services to our Stellar POS platform,” said Jose Rivas, founder and CEO, BigWise Corporation. He adds, “We were able to move very quickly to give our customers valuable new capabilities for stopping internal theft and fraud while simplifying employee access to the Point of Sale (POS) terminal. We expect our lead customer to roll out this new biometric-enabled Stellar POS solution in their operations in the very near future and are excited about the product’s broader market opportunities for us.” EikonTouch fingerprint biometric readers Taking advantage of DigitalPersona’s intuitive biometric software development tools, BigWise added fingerprint biometrics to their POS offering in a matter of weeks. The new solution allows customers the flexibility of choosing the HID Fingerprint biometric reader that meets their requirements, including the DigitalPersona 4500 and EikonTouch fingerprint readers. With the addition of fingerprint biometrics, Stellar POS gives organisations not only a more convenient way to login to their POS terminals but also allows them an effective way to stop labor hour fraud as well as POS theft due to unauthorised manager overrides and approvals. Stellar POS end-to-end solution “We are pleased to have helped BigWise complete this biometric authentication pilot and shorten time to market for its exciting new offering,” said Wladimir Alvarez, senior director of Sales LAM, Extended Access Technology Business Unit with HID Global. “In addition to securing their POS systems DigitalPersona fingerprint biometrics finally allows Bigwise customers to eliminate their dependence on insecure and costly passwords and swipe cards.” Stellar POS provides an end-to-end solution from the store floor or restaurant counter Stellar POS provides an end-to-end solution from the store floor or restaurant counterStellar POS provides an end-to-end solution from the store floor or restaurant counter through the full range of inventory, logistics and production processes and makes it easier to manage offers and promotions, loyalty programs, and accounting and treasury operations. BigWise sells the Stellar POS solution primarily in Colombia, Chile, Argentina and Peru. Identity management HID DigitalPersona biometric readers along with the DigitalPersona software development kit (SDK) solves security and identity management challenges for hundreds of millions of users around the world. To get developers off to a quick start, HID’s DigitalPersona developer kit includes hardware samples, downloadable royalty-free SDKs, sample code, documentation and membership in HID Global’s Crossmatch Developer WebPortal.
Kings Secure Technologies has provided high-level security and protection to one of its leading clients since 2011. Due to this successful long-term relationship, Kings was commissioned to begin a project, which started in 2019, to update the existing access control system with the latest high security card and card reader technology. With facilities working 24/7 the challenge faced was to find an easy-to-install edge technology card reader that could be configured onsite to read multiple card technologies where required and be field upgradable with any new advances in security. With these complex requirements in mind, Kings turned to Third Millennium to provide the most advanced technical solution available in the market. RX range of card readers The project also required the implementation of biometric dual authentication for the more secure areas Kings utilised Third Millennium’s RX range of card readers which incorporates the second evolution of NXP industry-leading MIFARE® DESFire® EV2 open architecture platform. Third Millennium’s PC09 Mifare DESFire EV2 cards offer superior performance, state-of- the-art security, privacy and enhanced multi-application support such as follow me printing and vending, to name just two. In addition to the RX4 and RX1K readers, the project also required the implementation of biometric dual authentication for the more secure areas. Third Millennium’s RX6 biometric reader uses a template on card application which means that there is no requirement to maintain a separate database of biometric information. The RX6 compares the finger template on the card with the finger being scanned and releases the card data if the two match. Because of the high security requirement, a custom encrypted key ties the readers to the cards thereby preventing card cloning or data bugging.
Ahli United Bank (AUB) is a leading financial institution providing banking, investment, and wealth management services from 147 branches in eight countries. Utilising Gallagher’s business and security solutions in Bahrain since 2008, Ahli United Bank decided in 2017 to undertake a full upgrade of the systems at its headquarters. Installing controlled doors As part of upgrading the full product suite at its Bahrain Headquarters – which included all controlled doors and software – Ahli United Bank (AUB) also took the opportunity for a complete re-design of the set-up and locations of its security system. The bank was committed to finding a product that was cost effective and had a long life expectancy. While researching their options, AUB management saw a demonstration of Gallagher’s Mobile Connect technology and were immediately convinced that this was the ideal product for the bank’s upgrade. Gallagher Mobile Connect uses Bluetooth wireless technology to enable users to badge at a reader using a smartphone Gallagher Mobile Connect In late 2018, AUB began testing the new mobile solution on site then to be rolled out to most of its staff at headquarters. Gallagher Mobile Connect uses Bluetooth wireless technology to enable users to badge at a reader using a smartphone instead of an access card. A huge benefit for AUB is the solution’s capability to add additional layers of security where needed. Gallagher’s Mobile Connect solution provides the option to apply two-factor authentication via the smartphone – either fingerprint, PIN, or facial recognition – delivering heightened security over access to restricted areas. According to AUB’s management, the two-factor capability was very appealing to them. “Using mobile with facial recognition is far more secure than card and PIN, and it’s immensely more cost-effective than buying biometric readers,” they said. Temporary remote access control From an administrative and site management perspective, Gallagher Mobile Connect provides AUB with significant flexibility. Easy provisioning means that authorised staff can remotely allocate temporary access in advance and can also schedule when a user’s access can begin and end – ideal for visitors and contractors who come to the bank’s headquarters. Beyond Mobile Connect, readers and controllers, AUB uses Gallagher’s security software platform, Command Centre, to manage alarms and access for its headquarters and all branches, all from a centralised location. “The power of Command Centre is enormous,” said AUB’s Management. “It integrates with our CCTV equipment and gives excellent oversight of our operations.”
Police forces recognise biometrics as a potentially critical tool to improving the quality and efficiency of policing across the globe. As part of a diverse Digital Authentication strategy, automated facial recognition surveillance is becoming an integral part of our digital policing, with the UK Home Office planning to invest a huge £97 million into a broader biometric technology approach to safeguard our streets. Automated facial recognition surveillance Digital fingerprint-based authentication is still widely regarded as having a higher level of maturity However, the latest court case against the South Wales Police as well as the Amazon backlash over the sale of its technology to the US police has highlighted that acceptance of the use of biometric technology as much as the maturing of the technology is important to achieve the expected benefits for the police. Digital fingerprint-based authentication is still widely regarded as having a higher level of maturity, has an implicit acceptance linked to the identity of the individual and delivers a lower false positive result. Facial recognition, when used as a stand-alone biometric, suffers from the risk of challenge or refusal to accept as in the case of the challenge to the South Wales Police pilot program. In addition, gender and racial bias as well as scenarios such as poor lighting and individuals wearing accessories impacts on reliability. Advancements in biometrics There is clearly a need to focus on how biometrics, as technology matures, can support identity verification at scale and to gain widespread public acceptance as part of a wider digital policing initiative according to Jason Tooley, Chief Revenue Officer at Veridium. Jason comments: “Police forces around the world are looking to integrate the latest advancements in technology to enhance public security and cut costs, and biometric solutions are integral to this movement. With the maturing of biometrics techniques and many different scenarios to address, it’s imperative to use the right biometrics for the right requirements and to create a strategy that facilitates the use of multiple biometrics. We would advocate an approach that abstracts the identity verification and digital authentication processes from the services and creates a biometric platform to match the specific requirements of the police and the public.” Fingerprint recognition Fingerprint, being the most mature and widely used biometrics, has high levels of acceptance today" He adds, “There are current barriers to the acceptance of biometrics which will be overcome as trust in the technology becomes the norm. Fingerprint, being the most mature and widely used has high levels of acceptance today and is easily adopted by police and public. It requires public acceptance and doesn’t work for wider surveillance techniques but for individual verification, police moving to a digital fingerprint capture mechanism rather than physical has great benefits and the public are more likely to be accepting of enrolment. Facial recognition would be a surveillance at scale solution but the challenges of maturity and external factors as well as public acceptance are challenges to be overcome in the future.” Jason continues, “It is imperative for police forces to take a strategic approach as they trial biometric technologies, and not solely focus on a single biometric approach. With the rapid rate of innovation in the field, an open biometric strategy that delivers the ability for the police to use the right biometric techniques for the right requirements will accelerate the benefits associated with digital policing and achieve public acceptance by linking the strategy to ease of adoption.”
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition this week in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organisations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric high-throughput system The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility entry control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless iris authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
Kredi Kayıt Bürosu (KKB) was founded by the then nine leading banks of Turkey on 11th April, 1995. KKB is a highly regarded financial institution in turkey and has a total of 156 members. The KKB Anadolu Data Center is located in the capital city of Ankara across 43,000 square meters of land, consists of three main sections. The facility is equipped with protection systems against lightning and earthquake. Center authorities to provide the supervisors with an additional option of authentication through RFID cards Need of cost effective solution The data center has cabinet system in place while access to data racks require biometric authentication. The center is equipped with numerous data racks for which they required a display device at the entrance. Each rack was locked with physical locks as a result of which the center required a cost effective solution that did not include a device for each rack. Moreover, they required devices that supported both smart card authentication as well as door locks. The center authorities were looking forward to provide the supervisors with an additional option of authentication through RFID cards. With respect to gaining access, they wanted a solution that would grant access through two steps, biometric authentication and physically opening the locking system. Finally, the center wanted a solution that could alert them in case of situations such as a door being left open. Data Center solution Matrix, in association with SouthCo, provided the KKB Anadolu Data Center with the following solution. The data center required a display device at the entrance, integrated with the biometric device installed by Matrix. So, we integrated our Data Center solution with a touch screen display. Whenever any user tried to access the data center with their biometric credentials, the touch screen would display a list of racks the respective user is authorized to access. From the display, the user would be allowed to choose the racks he/she would like to access. Once the user is granted access into the chosen racks, they will be allowed to access the same for a pre-defined period of time. COSEC ARC provides the admin personnel with real-time notifications such as SMS or email notifications in case of any mishaps Gather customized reports User based access makes ensures security of sensitive company data. We also installed 200 COSEC ARCs, at the entry/exit of racks between 400 SouthCo locks, one between two door locks, making it a cost-effective solution for the center. Additionally, the COSEC ARC also provides the admin personnel with real-time notifications such as SMS or email notifications in case of any mishaps such as an open door, a door forced open, door being left open, etc. The personnel can also gather customized reports on events like who, when and which rack was accessed. Results Maintenance of Diverse Data Foolproof Security with Biometric User-wise Rack Access Accurate Records of Who Accessed Data Center at What Time