Human identification system
BriefCam, the provider of Video Synopsis and Deep Learning solutions, announced that it will demonstrate the BriefCam v5.2.1 video content analytics platform at the Global Security Exchange (GSX) Security Conference & Expo in Las Vegas. BriefCam’s integration technology BriefCam’s breakthrough technology detects, tracks, extracts and identifies people and objects from video, including; men, women, children, clothing, bags, vehicles, animals, size, color, speed, path, direction,...
Rhombus Systems, an enterprise video security startup, is redefining video security for businesses around the world with their AI-powered security camera – the Rhombus R1. This next-generation security camera has the ability to learn and alert users to an unidentified person, making threat detection faster than ever before. Rhombus’s video security system continuously analyses video to help organisations better secure their physical spaces. Today the company announced a $3 million se...
Exabeam, next-gen security information and event management company, and Okta, global provider of identity solutions for the enterprise, have partnered to deliver a robust identity security solution that enables organisations to detect, investigate and respond to credential-based attacks in real time. By joining the Okta Integration Network, Exabeam benefits from Okta’s identity platform, helping security teams to proactively detect and respond to user-based threats before they become crit...
Allegion US, global provider of security products and solutions, announced the latest version of the Keri Systems’ software now supports Schlage locks in no-tour mode. Schlage locks The supported locks, which include Schlage Control, NDE and LE, are ideal for multi-family property managers looking to retrofit their existing properties with electronic access control on individual apartment spaces. This provides more security, eliminates unnecessary expenses around managing traditional key...
CNL Software, a provider of Physical Security Information Management (PSIM) software, is pleased to announce that it has entered a technology partnership with Herta, a developer of facial recognition solutions. The partnership, formed under the CNL Software Technology Alliance Program, has enabled the companies’ technologies to work together to help secure one of the world’s most iconic museums. Herta focuses on the development of user-friendly software solutions that enable the int...
Integrated security manufacturer TDSi is pleased to announce exciting new features for its powerful EXgarde Web security solution. Additional functionality includes approving door entry PIN codes and photo capture, all from any secure Internet-enabled device. Alex Rumsey, Director of UK Sales at TDSi commented, “EXgarde Web was originally launched in 2014 and offers an additional option to interface with TDSi’s powerful EXgarde solution. It allows security operators or authorised st...
The latest-generation of SMB surveillance solutions support enhanced site security for end-users, while providing significant revenue opportunities for Hikvision resellers’ business. Small and medium-sized businesses (SMBs) have many of the same surveillance and security requirements as larger organisations. They need to identify and react to perimeter breaches in real time, and they need to automate footage searches to save time for their security teams. The challenge is, how can resellers provide small and medium-sized customers sophisticated and highly effective surveillance solutions at a price point that is appropriate for their business? And how can resellers grow their revenues and bottom line in the process? Win-win surveillance solutions Hikvision is continuously innovating its product lines to deliver cost-effective surveillance solutions needed by SMBs. As a result, they can enjoy new levels of site security, while resellers can focus on growing their revenues. Hikvision AcuSense makes advanced video content analysis and deep learning capabilities available to SMBs One key technology that can help resellers achieve these goals is Hikvision AcuSense, which makes advanced video content analysis and deep learning capabilities available to SMBs for the first time. This technology gives SMBs a cost-effective way to protect their locations and assets, while helping resellers building a uniquely competitive go-to-market proposition. Maximising SMB security Paired with Hikvision cameras such as ColorVu cameras that provide superior video images even at night, the AcuSense deep learning algorithm helps SMB customers maximise security with efficient human and vehicle detection. This helps them react to security threats in real time, while significantly reducing false alarms and associated personnel costs. Hikvision AcuSense works by disregarding natural movements, such as rain or leaves, triggering alerts when vehicles or humans are detected by a camera or a backend NVR/DVR. With automated sound and light alarm functions available in certain models, AcuSense-enabled cameras also detect would-be intruders before a security breach occurs. With Hikvision AcuSense, SMB customers also get a “quick target search” feature that allows security teams to find footage quickly in the event of a security incident. This saves many hours for teams who would otherwise search for footage manually.AcuSense technology provides significant benefits in a wide range of user scenarios Hikvision AcuSense SMB solutions There are very different requirements in the SMB market and AcuSense technology provides significant benefits in a wide range of user scenarios: Residential estates: Hikvision AcuSense cameras can be deployed at perimeter fences to detect break-ins and support protection of residents and their belongings. AcuSense vehicle detection can also be used to ensure that non-parking areas such as emergency exits and pedestrians are not blocked with illegal parking. Small office buildings and factories: Hikvision AcuSense can help security personnel to detect and prevent perimeter break-ins and to react in real time to minimise the risk of losses. AcuSense cameras and NVRs/DVRs can also be used to monitor and protect warehouses and office areas where valuable assets are located or stored. Retail stores: With human detection, Hikvision AcuSense can help small stores to monitor key areas such as cashier area, staff only area or a stock room, for example. Store owners would also be able to view the footage on their mobile phone and find out if there is any employee theft happening when they’re off the premises. Vehicle detection helps owners to ensure on-site parking within the store territory is allowed.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Rosslare Enterprises Ltd., a worldwide provider of professional security solutions including access control, detectors and guard patrol, announced the launch of the Rosslare BLE-ID app. By installing the app in their smartphones, users can use the smartphone as a credential for access control and automation applications. The ID code generated by the app is unique to the device, and may be transferred easily by email to the system administrator. The main benefit of this technology is that the user is no longer obligated to carry a physical RFID card Cost-effective credential solution Rosslare’s new CSN SMART readers will appear in the app, and the user just needs to tap on the reader name to submit the credential to that particular reader. The main benefit of this technology is that the user is no longer obligated to carry a physical RFID card. In addition, the 10-meter operating range of the app introduces a new set of convenience factors. The CSN SMART readers feature a multi-credential UID read technology for contactless smart cards (13.56 MHz) that can read the Card Serial Number (CSN) of many smart card RFID standards. The readers have the ability to read Rosslare’s BLE credential technology and PIN codes (AY-H6355BT), providing the most cost-effective credential solution for any application. The readers are rated IP65 and feature a modern design that can fit comfortably in any installation environment, indoors or outdoors. The app is available for download from Google Play Store and App Store. The creation of the BLE app evolves from our customers, who needed an alternative credential that can be used together or as a physical credential card" Secure entrances with personal devices With the new release, clients utilising Rosslare technology are able to secure their facility entrances and exits using personal devices as identification. This new app makes access control more cost-effective and easier for Rosslare clients everywhere. "The creation of the BLE app evolves from our customers, who needed an alternative credential that is affordable, reliable, and their users will embrace, and can be used together or as a physical credential card. Step into the future with Rosslare smart solutions," said Ezra Ozer, Director of Marketing of Rosslare’s Security Products division.
Redvision’s X-SERIES, RV30 rugged PTZ dome cameras now fully integrate with the Xtralis ADPRO XOa convergence software platform. The ADPRO XOa delivers revolutionary detection, verification and response services for remote guarding and general security applications. It provides remote, multi-site management of the company’s renowned, FastTrace, Remotely Managed Multi-Service Gateways (RMG) and iFT and iFT-E, NVR+ platforms. RV30 PTZ dome cameras Stephen Lightfoot, technical director at Redvision, explained, “Operators can take full advantage of advanced RV30 washer, wiper, IR and white light illumination switching and scheduling, with multiple pre-sets. Further, RV30 camera functionality includes variable speed PTZ operation, with minimal joy-stick latency; Full HD video stream recording, with lower resolution sub-streams; and efficient, remote control, display and transmission.” “Xtralis ADPRO XOa and iFT NVR+ platforms provide customers with a robust recording and control platform for the X-SERIES. ADPRO XOa platforms are already well established and extensively used in local authority and public space applications, where Redvision’s rugged PTZ cameras are also extremely popular.” Long-range people detection Redvision produces 1080p and 720p resolution models of the RV30 X-SERIES rugged, PTZ camera range. The 1080p model will view events at distances of 120 metres, with operators identifying people at 40m. The 720p model, although lower resolution, has a 150m range, with operators identifying people at an incredible 60 metres.
ASSA ABLOY, the global provider of door opening solutions, has enjoyed another hugely successful year at IFSEC 2018, demonstrating its extensive range of technology-driven security innovations to end users in key markets. Attendees to ASSA ABLOY’s stand at IFSEC 2018 were able to discover the latest innovations from the company to help ‘access smarter thinking’. Solutions from the company’s leading brands, including ASSA ABLOY Access Control, Abloy and Traka, were on display, covering access control, identification technology, entrance automation and integrated security solutions. Those in the education sector were able to see how our Aperio wireless locking technology can help schools and universities cut energy costs Different market-related products ASSA ABLOY demonstrated its expertise and experience across an extensive range of key markets at the event, including commercial, education, critical infrastructure, SMEs and multi-use, emergency services and defence. Nico Delvaux, ASSA ABLOY’s new President and CEO, also made an appearance on the stand and witnessed the company’s doorsets put to the test in the BRE’s dedicated Attack Zone, illustrating the difference between certified and non-approved products. Gareth Ellams, Access Control Managing Director said: “With a constant stream of visitors to our stand, we could not be happier with how this year’s IFSEC went. Footfall was up from previous years and we managed to speak to many end users in the key markets we offer solutions for. Cloud-based locking technology “The event provided a fantastic platform to showcase our innovative, technology-driven solutions and the key markets these serve. For example, those in the education sector were able to see how our Aperio wireless locking technology can help schools and universities cut energy costs, reduce time and money spent on maintenance, and help deliver a flexible access control solution that can be adapted and updated when needed. The new mobile solution OpenowTM enables users to unlock protected doors using their smartphones via an encrypted Bluetooth connection “Meanwhile, those operating in critical infrastructure environments could see how our cloud-based, programmable locking technology can easily integrate with an organisation’s telemetry systems, to help improve efficiencies and protect the nation’s infrastructure. “Meeting the specific needs of some of the most demanding environments, our exhibition stand provided a fantastic platform for us to share the very latest security solutions that can protect against even the most challenging threats.” SMARTair and OpenowTM access control Innovations from ASSA ABLOY Access Control at IFSEC 2018 included SMARTair, a modular and fully scalable access control system. SMARTair ensures organisations remain in control of their site – who enters, where and when – at all times, in real time. The new mobile solution OpenowTM was also presented, enabling users to unlock protected doors using their smartphones, via an encrypted Bluetooth connection. The Aperio H100 was also presented, which packs the power and flexibility of wireless access control into a slim, cleverly designed door handle. The brand’s OEM partners ACS and TDSi were also available on the stand to help demonstrate how easy Aperio is to integrate with a vast range of new and existing access control systems. Traka exhibited its latest key and asset management solutions including Traka Web, an innovative software for centrally managing Traka key and locker systemsIntegrated lock and key management Abloy showcased its complete CLIQTM portfolio for critical national infrastructure applications, helping secure business resilience and continuity of service with remote access management. Its integrated locking and key management solutions include PROTEC2 CLIQTM, CLIQ Go and eCLIQ. The brand also presented Abloy OS, an intuitive map-based user interface and the ABLOY PULSE digital locking and access management system. Traka exhibited its latest key and asset management solutions. This included live demonstrations of Traka Web, an innovative software for centrally managing Traka key and locker systems. The brand also demonstrated how Traka can be integrated with different access control systems, including ARX and Lenel. The new V-Touch key management system from Traka was also on display. Capable of accommodating up to five sets of keys, the cabinet provides assured key control for critical keys at multiple locations, from a compact unit where space is at a premium.
Hikvision, the world's premier supplier of innovative video surveillance products and solutions, has launched a range of groundbreaking face recognition terminals. Hikvision’s face recognition terminals are embedded with deep-learning algorithms for access control and office scenarios for improving building operations, workforce management and safety operations. Hikvision's face recognition terminals Three face recognition terminal models are available, each one uniquely and flexibly designed for a wealth of applications and scenarios: Wall-Mounted Face Recognition Terminal – DS-K1T604MF & DS-K1T606MF Base- or Wall-Mounted Face Recognition Terminal – DS-K1T605MF Face Recognition Component for Access Turnstile – DS-K5603-Z All three of these models are easy to install and use. The wall-mounted terminal is well-suited for quick access at an entrance. The base & wall-mounted terminal can be mounted on convenient vertical surfaces or on the front desk. The face recognition component is designed for use in conjunction with access turnstiles. If needed, this model can be rotated horizontally upon installation for capturing facial images at the most effective angle. Various models and types are available with a wide variety of front-end or back-end combinations to meet a multitude of scenarios and environments. Hikvision’s face recognition terminals support 1:1 or 1:N matching modes, authentication via Mifare cards, and TCP/IP or RS-485 connectivity. Hikvision’s face recognition terminals apply to a wide variety of scenarios and environments and can be highly personalised Accurate & fast face recognition Hikvision has embedded deep-learning algorithms into its face recognition terminals, providing fewer transmission delays and a reduced load on backend components. As a result, the terminals have a high success rate – the face-capture rate can hit 99% accuracy at less than 0.5 seconds. Dring rush hours, access turnstiles equipped with Hikvision’s face recognition terminals can respond in less than a half-second, passing up to 40 persons per minute. Hikvision’s face recognition terminals apply to a wide variety of scenarios and environments and can be highly personalised. Multiple authentication modes are available: face images, swiping ID card and comparing images, custom modes, and more. Applications range from commercial real estate, government agencies, small to very large businesses or factories, just to name a few.
People and vehicle access control specialist Nortech has recently seen St James’ Market in central London update and improve access to its site using Nedap’s uPASS Target system. Supplied by Nortech, Nedap’s uPASS Target was installed by leading supplier of integrated security systems Total Support Services (Security) Ltd, which was selected to supply the robust solution for long-range identification to its recently installed security gates at the market. Total Support Services (Security) Ltd, TSS, which designs and engineers its own brand of security products and equipment, was able to use its 26 years of experience in specialised security products and services to provide the ideal security and access system that fitted the client’s needs. TSS selected the uPASS Target as it is easy to integrate with any existing access control system so users don’t need to get out of their vehicles to get into the development. Reliable and easy to install system Guy Bulmer, Director at Total Security Services commented, “We use Nortech as they are our ‘go-to’ provider for access control and vehicle identification systems. We have had a great relationship with them for nearly 20 years, ever since we were asked to install a Norpass system for some clients, and it just went from there.” The uPASS Target is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots He continued, “We certainly recommend Nortech products to others and we are very happy with the end result achieved for the client. We have our core products that we use because they are easy to install and they just work. Any issues are dealt with in a helpful and friendly way by the tech guys and we always get a reliable system at the end of it.” Ideal for access control and monitoring activities The uPASS Target is a robust solution for long-range identification of vehicles, people and rolling stock. It is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots. Its plug-and-play features enable it to be installed in just a few simple steps, and its variety of industry-standard communication interfaces support seamless integration into any existing or new third-party systems for access control, logistic operations, security and parking. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Safety is at the forefront of hospitals across the nation. According to a landmark report To Err is Human (2000) by The Institute of Medicine (IOM), between 44,000 and 98,000 patients die a year in the U.S. due to preventable medical errors including wrongful administration of medication. Beyond the cost of human life, these errors cost the healthcare industry as much as $29 million per year. This figure takes into account the expenses associated with additional care, loss of income and disability so as to reduce medication administration errors, hospitals are modifying their current medical dispensing systems in operation to prevent and eliminate these errors. Based in Portsmouth, Ohio, Southern Ohio Medical Center (SOMC) is one such hospital that is addressing this concern. A 222-bed hospital that provides emergency and surgical care, as well as a wide range of other health-care services, SOMC employs 2,200 full and part-time doctors and volunteers. SOMC has a medical staff of more than 140 board-certified or board-eligible physicians and specialists and is supported by more than 800 volunteers. WALLaroo 2000 wall station The WALLaroo 2000 wall station featured a cabinet mounted outside each patient’s room to temporarily stock the non-narcotic medications prior to dispensing One of the “Best Practices” outlined in the IOM report calls for the healthcare industry to utilise technology, such as bed side bar coding, to improve patient identification. To meet these standards, SOMC quickly modernised their process from relying heavily on a two-cart dispensing system that included laptops on wheels (LOW’s) and pharmacy carts, to a system that was more efficient and accurate. The new solution, the WALLaroo 2000 wall station, featured a cabinet mounted outside each patient’s room to temporarily stock the non-narcotic medications prior to dispensing. SOMC’s IT department was tasked with finding a way to integrate the wall stations with a state-of-the-art access control system that was equipped with an access-controlled lock and reader. By implementing this solution, SOMC has been able to strictly adhere to their patient’s rights as they pertain to medication dispensing, which includes: the right patient, the right medication, the right dose, the right time and the right route of administration. Centrally networked access control system “When we started our quest for an access-control solution, we looked for two things,” said Dennis Ward, information services and applications manager for SOMC. “First SOMC needed a solution that would be centrally networked with the current eMAR system, as well as have a main power source. Additionally, we needed to replace the magnetic strip on employee badges with a more effective technology.” Ward consulted with several companies within the security industry, including Accu-Tech, SecuriCo, Microman and HID Global, before finding the optimal solution- SecuriCo’s Securus Web software solution. The solution operates with a HID EdgeReader coupled with iCLASS 2K (37-bit) smart cards and Rutherford Controls 3513 Lock. SecurusWeb software solution SOMC project requirements indicated that both a Web-based software solution and an IP PoE Access Control solution were required" “SOMC project requirements indicated that both a Web-based software solution and an IP PoE Access Control solution were required,” said Jim Andrews, president of SecuriCo, Inc. “After Dennis and I reviewed the project requirements and discussed the design options with AccuTech and Microman, everyone agreed that the SecurusWeb software solution with a pre-configured HID EdgeReader and iCLASS 2K (37-bit) smart cards were the perfect fit for the hospital’s unique access control needs.” According to Ward, “As I conducted product research in the security information space, I noted that most available solutions were based on HID technology. This was important since the hospital was growing, and our security needs would grow, too. HID Global has a great industry reputation so it was a natural and easy decision to select the company’s solutions and OEM partner, SecuriCo, Inc.” Installing WALLaroo wall stations and HID EdgeReader Since Ward had never implemented a project like this before, he obtained samples of one of the WALLaroo wall stations, a HID EdgeReader and evaluation software from SecuriCo. Using the samples, he created a prototype that would fit all his access control needs and serve SOMC in the best possible way. Installed by Microman, these pre-programmed wall units have the SOMC specifications that Ward devised. While physical access control is delivered through the HID EdgeReader and iCLASS cards, the control of the hardware is provided through SecuriCo’s Securus Web software. The software controls which individuals are granted access to each station based upon a preset access level, which includes the day and time access is allowed. In addition, the application also records how access is added and removed. This innovative solution also enables pharmacy technicians to deliver barcoded, 24-hour scheduled, non-narcotic medications to the secured wall mounted stations. Using their authorised HID iCLASS cards, the nursing staff is then able to access and administer the medication. SecurusWeb and HID Global’s Edge IP access solutions SecurusWeb and HID Global’s Edge IP access solutions can make it easier to meet the unique and demanding needs of healthcare applications, as experienced by SOMC Thinking outside the box and using innovative products like SecurusWeb and HID Global’s Edge IP access solutions can make it easier to meet the unique and demanding needs of healthcare applications, as experienced by SOMC. Accuracy for patient medication dispensing has improved significantly thanks to the new solution. Workflow is also more efficient because the amount of time it previously took nurses to go to the medication room and retrieve new medications has been significantly reduced. Additionally, medication is secure and located where the staff expects it to be, while eliminating the need for medication carts, making the hospital hallways accessible and less cluttered. With the original installation of 73 of HID’s EdgeReaders being such a great success, SOMC ordered and installed an additional102 EdgeReaders in the hospital’s new North Tower, including 12 on the first floor Heart Care Unit (HCU), 30 on the second floor in the Surgical-Vascular Care Unit (SVCU), 30 on the third floor in the Medical-Surgical Care Unit (MSCU), and 30 more that are located on the fourth floor in the Progressive Care Unit (PCU).
The Lagoon Amusement Park in Farmington, Utah, likes things fast, too. For more than 100 years, it has offered exhilarating thrill rides as part of its entertainment package. The park’s Fire Dragon Double-Loop Rollercoaster hits speeds of 90 kilometers per hour, and its Lagoon-A-Beach Waterpark promises 550,000 gallons of liquid fun. Identification cards Like many other parks, Lagoon provides identification cards to its employees and offers season passes (called Season Passports) with identification cards to its guests. But the equipment formerly used to print the cards was not keeping up with the pace of the park. “As the public demand for Season Passports increased, it was becoming more difficult to keep up with the desired pace,” said Nic Young, ticketing manager. “We used to take Polaroid pictures and laminate them onto pre-printed cards but matching the pictures with the cards was tricky. It was easy to put the wrong picture on someone’s card.”Lagoon now is able to satisfy the needs of its employees and guests with the updated card printing technology The multi-step process also was slow and cumbersome – not a minor concern with 2,500 employee ID badges and more than 30,000 season passes issued every year. Lagoon now is able to satisfy the needs of its employees and guests with the updated card printing technology, bringing the park back to its desired speed. ID badges and card-printing technology “These printers are extremely fast,” said Young, “which is especially important during our busy months of May and June. I also like the one-step printing process and the fact that the printers are easy to maintain and keep clean.” The Employee Services department uses colored ribbons when printing employee ID cards, identifying employees 15 years of age or younger by printing those names in red on the employee’s card. The Ticketing department uses standard black ribbons for its season passes. With five computer stations in the Season Passport photo area, ticketers can issue passes to large groups of people at the same time. Barcode technology Both employee and Season Passport ID cards use barcode technologyBoth employee and Season Passport ID cards use barcode technology. For employees, the barcodes specify the level of park access and also bring up full-sized pictures of the employees to be viewed by Lagoon security. For Season Passport holders, barcodes record when a passport has been used or restrict passport usage on specified dates (such as during Lagoon’s July Fun Pass). Now that the Lagoon Amusement Park has established its current system, computer stations at the gates can track Season Passport access information and provide valuable marketing information. “We’re trying to increase our per person usage through promotions such as our Season Passport Holder coupon books,” Young said. “Our ID card system allows us to record our progress.” The bottom line, however, is speed. “There are no more long lines,” Young said. “We’re able to operate at full capacity all day long, allowing our guests to get their Season Passports quickly and proceed directly to the fun.”
Established by the French Government’s Ministry of Finance and Economics, the ACCORD project was commissioned to design and implement financial system modernisation. The charter of the ACCORD initiative team, composed of representatives from multiple government ministries, is to architect solutions that enable the French government to manage the finances of the country with the same level of accountability as private sector enterprises. The technology-based infrastructure selected was a smart card solution to confirm and authenticate users across 40 departments. HID Global’s Identity Assurance software The systems operated in parallel but could not leverage the benefits of a unified system AIFE – Agence pour l’Informatique Financière de l’Etat – chose HID Global’s Identity Assurance software coupled with smart cards for the solution. Ensuring users are ‘who they say they are’ over the course of several decades, individual French government departments had developed separate and distinct applications to manage activities such as budgeting, processing purchase orders, and other accounting activities. The systems operated in parallel but could not leverage the benefits of a unified system. Enterprise Resource Planning system With the inception of the ACCORD project, the government committed to streamlining finance management by moving to one system for centralised control of the country’s budgeting and finance operations – with a goal that by 2004, all government central entities will be using the standard Enterprise Resource Planning (ERP) system. The transition to an online application that consolidates financial reporting and transactions requires an organisation to determine how it will identify users with certainty prior to granting them access to the system and to valuable data. The solution must be easy to use to ensure departmental acceptance of the new application and authentication process. It must also minimise the IT staff time required for day-to-day administration and helpdesk activities for a large population over 7,000 dispersed users. These multiple challenges presented an opportunity to leverage proven digital identification solutions from HID Global. Smart card-based PKI identification solution HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entrySmart card-based solution using digital certificates with PKI, The French government-wide implementation securely links multiple departments, such as the Ministries of Education, Justice, Transportation and Housing, and Foreign Affairs, to the unified ERP application, enabling the exchange and ultimate consolidation of digital information. In 2000, the Ministry of Finance began deploying HID Global’s smart card-based PKI solution. HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entry – any of which could become a source of fraudulent or malicious activity in the absence of strong authentication and confirmation of digital identity. Today, employees regularly use the card with a microchip that holds their unique credentials in the form of an Entrust digital certificate. HID Global’s Gold Entrust-Ready certification ensures a smooth deployment to large numbers of users, and the combined solution with Entrust TruePass delivers the following benefits: Enhanced Security: HID Global’s multi-factor authentication reinforces the fundamental security and intent of a PKI by requiring something the user has (a smart card) and something the user knows (a PIN code) in order to use the private keys stored on the card. To further enhance security, the key pair is generated on the cryptographic smart card itself, so that the private key is never exposed to the insecure PC environment. The tight integration of HID Global’s client software with Entrust ensures certificate key updates are transparently and automatically made on the card. Non-Repudiation: To support non-repudiation, it is essential that ERP system users provide undeniable proof that they are who they say they are. Keys used for that authentication can never be stored on the potentially vulnerable user workstation. Those sensitive keys must remain under the sole control of the user, and HID Global’s client software ensures private keys are generated on the card and remain in the rightful owner’s possession at all times. User Simplicity: HID Gobal’s Security Client software provides a familiar ATM-like user interface that makes complex digital identity and PKI technologies transparent, so employees can focus on their work responsibilities and financial application activities to easily access the system. HID Global’s commitment to openness and industry standards ensures that the French Government’s initial investment in digital identity products and smart card client software infrastructure is capable of supporting multiple PKI vendors and other forms of identity credentials in the future.
Gatwick Airport is the UK’s second largest airport and the most efficient single-runway airport in the world. It serves more than 228 destinations in 74 countries for 45 million passengers a year on short and long-haul point-to-point services. It is also a major economic driver for the UK, contributing £5.3 billion to national GDP and generating 85,000 jobs nationally. As a key national infrastructure and major transport hub, Gatwick Airport takes the challenge of maintaining the safety and security of its passengers, visitors and employees seriously. It delivers on this challenge through people and process change, combined with powerful technology enablement and a standardised set of operational procedures and ways of working. This brings together the airport security and operations teams, Sussex Police, Border Force and many more interested parties. Qognify Situator is the technology enabler at the heart of the Gatwick Airport Integrated Security project Gatwick Airport Integrated Security The aim of the Gatwick Airport Integrated Security project was to use all available security elements to deliver a fully automated and rapid response solution for this state-of-the-art facility. Qognify Situator is the technology enabler at the heart of the Gatwick Airport Integrated Security project. It provides a consolidated view and full management of any situation or emergency. The additional integration of Qognify’s Suspect Search real-time video analytics proprietary software to this closely integrated network of security systems, means Gatwick Airport is now able to rapidly identify and pinpoint a suspected criminal/terrorist, or find a lost person in real-time. Suspect Search real-time video analytics A key aim of the project was the standardisation of operations and management across the airport. Security teams throughout the terminals and facilities collaborate effectively, ensuring the full safety of people and assets, along with full compliance and auditing abilities. The whole project helps to support smooth operations and minimise downtime in an intensely busy environment. The power of the CCTV solution is that it gives Gatwick Airport superior situational awareness" By using a combination of Qognify’s situational management and real-time video analytics solutions, the airport has the most powerful, automated and rapid response security system. From fighting terrorism, to combatting crime, or locating misplaced items and even finding a lost child, the security team at Gatwick Airport can now identify any issue and mobilise to wherever it is needed faster than ever before. Robin Lomax, IT Project Manager, CCTV Refresh Project Gatwick Airport explains: “The power of the CCTV solution is that it gives Gatwick Airport superior situational awareness and allows us to command, adapt and respond to any security event, before, during and after it occurs. It enables a quicker speed of response; a more appropriate size of response and it allows us to play back and learn lessons from the incident after the fact.”
For Oklahoma City, it took one day to change the way city officials viewed their security. That day was September 11, 2001. After that day, the U.S. government issued Homeland Security Presidential Directive (HSPD)-12, requiring ‘a common identification standard for federal employees and contractors.’ For Oklahoma City, that meant creating a new system for issuing ID cards to city employees, vendors and contractors. Unfortunately, Oklahoma City was no stranger to emergencies. It ramped up its security program after the Murrah Federal Building bombing in 1995, but it still issued a variety of ID cards. After 9/11 and HSPD-12, it coordinated the look and feel of its ID cards, enhancing its security system at the same time. “Governments often face emergency situations and need a uniform badge,” said Aaron Hallmark of Dowley, Inc., a security systems integration company working with the city. “They want the ability to verify authenticity at a glance.” A Fargo HDP820 High Definition Printer/Encoder prints police and vendor ID cards, while a Fargo HDP600-LC prints cards for city employees Printing cards for police and city employees City officials found what they were looking for in two Fargo printers, both of which reside in the Police Department’s Permits and ID section. A Fargo HDP820 High Definition Printer/Encoder prints police and vendor ID cards, while a Fargo HDP600-LC prints cards for city employees. Hallmark created the design for the city’s ID cards. “City officials wanted a clean, simple card something that could easily be identified at a glance,” he said. Thus, a photo is the predominant feature. The proximity cards are sequenced so when a user is assigned a card, the number is registered, and the user’s access to the system is tracked. City officials can control exactly who has access to what areas in the city facilities. The cards also are used as identification when an official enforces city codes and ordinances, such as keeping property free of dilapidated buildings. Adding holographic layer to avoid duplicity If someone has to take action on behalf of the city for violations, he or she has verifiable identification. “Government markets need ID that is hard to duplicate and to which security features can be added without extreme costs,” Hallmark added. Two years ago, the city added a holographic overlay to its cards. “Administrators needed to add levels of security that could be seen at a glance,” he said, “because there could be many people with ID cards at a disaster site.” Some departments have touch ID controls that allow access with a thumbprint or computer sign-in capabilities, but all also have readers to record employee time and attendance Today, the city uses about 4,000 cards, laminated with a special holographic film created with the seal of Oklahoma City. An unusual aspect of the city’s ID card program is that there are multiple administrators. Access control is administered by managers who can add or delete access rights for their areas. The process is automatic through an interface between AMAG Technology for access control and PeopleSoft Enterprise software. ID cards for visual verification and access control “Each department within the city is like its own company,” added Hallmark, “and it can assign people access control through a central database. This is a little unusual. In most applications, there is one administrator. In the City of Oklahoma City, there are several. Cards are associated with a department, but the database is visible to everyone.” Some departments have touch ID controls that allow access with a thumbprint or computer sign-in capabilities, but all also have readers to record employee time and attendance. Today, the City of Oklahoma City uses ID cards extensively for visual identification and access control, printing cards for both purposes in-house. A photo ID card is used for visual security, and a proximity card with a barcode is used for building and department access. Even street entertainers and ice cream vendors wear an official city ID card. Safety for Oklahoma residents and visitors The city’s new ID card system has gone a long way towards helping with security, controlling who has access to what areas and tracking that access, according to Hallmark. If there’s a question of who was in a particular location and for how long, the administrator of the system can track that information. Oklahoma City has dedicated itself to improvements in the last several years, working hard to make the city more attractive to visitors and a better place to live for residents. It can be proud of the strides it has made in its security program, too. Although the new ID card security program was created by the unfortunate events of one day, it is designed to provide safety for the residents and visitors of Oklahoma City for years to come.