Human identification system
ULIS, a designer and manufacturer of a wide range of innovative thermal image sensors, has announced the launch of ThermEye Building, a thermal sensor line for system integrators of detection and people counting equipment for connected buildings. ThermEye Building rangeThe new ThermEye Building range includes two new products: ThermEye-b90 and ThermEye-b120 The new ThermEye Building range includes two new products: ThermEye-b90 and ThermEye-b120. These 80x80 thermal sensors provide system inte...
Plasco ID, global integrator of identification solutions, announces it has hired Jeff Bill as its Chief Operating Officer. Bringing a valuable combination of industry experience and proven results, he will focus on business operations and strategic initiatives. Physical card access control A veteran in visual and physical card access control, Jeff formerly held the position of President at Bristol ID, global technology card business; prior, he served as General Manager for Brady’s Peopl...
BriefCam, the provider of Video Synopsis and Deep Learning solutions, announced that it will demonstrate the BriefCam v5.2.1 video content analytics platform at the Global Security Exchange (GSX) Security Conference & Expo in Las Vegas. BriefCam’s integration technology BriefCam’s breakthrough technology detects, tracks, extracts and identifies people and objects from video, including; men, women, children, clothing, bags, vehicles, animals, size, color, speed, path, direction,...
Rhombus Systems, an enterprise video security startup, is redefining video security for businesses around the world with their AI-powered security camera – the Rhombus R1. This next-generation security camera has the ability to learn and alert users to an unidentified person, making threat detection faster than ever before. Rhombus’s video security system continuously analyses video to help organisations better secure their physical spaces. Today the company announced a $3 million se...
Exabeam, next-gen security information and event management company, and Okta, global provider of identity solutions for the enterprise, have partnered to deliver a robust identity security solution that enables organisations to detect, investigate and respond to credential-based attacks in real time. By joining the Okta Integration Network, Exabeam benefits from Okta’s identity platform, helping security teams to proactively detect and respond to user-based threats before they become crit...
Allegion US, global provider of security products and solutions, announced the latest version of the Keri Systems’ software now supports Schlage locks in no-tour mode. Schlage locks The supported locks, which include Schlage Control, NDE and LE, are ideal for multi-family property managers looking to retrofit their existing properties with electronic access control on individual apartment spaces. This provides more security, eliminates unnecessary expenses around managing traditional key...
CNL Software, a provider of Physical Security Information Management (PSIM) software, is pleased to announce that it has entered a technology partnership with Herta, a developer of facial recognition solutions. The partnership, formed under the CNL Software Technology Alliance Program, has enabled the companies’ technologies to work together to help secure one of the world’s most iconic museums. Herta focuses on the development of user-friendly software solutions that enable the integration of facial recognition in security applications that include access control, surveillance and identity verification at borders. Their deep learning algorithms work differently to traditional analytics, as faces are encoded directly into small templates, which are very fast to compare and yield much more accurate results. This provides an important technological advantage, especially when working with partners, as it allows the development of more robust, safer and efficient solutions. As security departments strive to benefit from advances in technology, we are focused on helping them by removing the barriers created by silos of information within the control room" Scalable security management software IPSecurityCenter PSIM takes a vendor agnostic approach to implementing flexible and scalable security management software. It allows security teams to efficiently integrate all of their technology from across their organization into one intuitive interface. "By expanding IPSecurityCenter to support Herta face detection software, we are enabling our customers to seamlessly address the growing need to quickly identify and differentiate between authorised and unauthorised individuals. Our workflow engine, process automation and operator guidance enable this data to be quickly processed and actioned, so individuals are managed according to the security threat they pose," said Adlan Hussain, VP marketing at CNL Software. "As security departments strive to benefit from advances in technology, we are focused on helping them by removing the barriers created by silos of information within the control room." The integration is currently in use to protect some of the world’s most valuable exhibits in a state-of-the-art security facility within an iconic museum in the middle east.
Integrated security manufacturer TDSi is pleased to announce exciting new features for its powerful EXgarde Web security solution. Additional functionality includes approving door entry PIN codes and photo capture, all from any secure Internet-enabled device. Alex Rumsey, Director of UK Sales at TDSi commented, “EXgarde Web was originally launched in 2014 and offers an additional option to interface with TDSi’s powerful EXgarde solution. It allows security operators or authorised staff to add new security users and grant access through any Internet enabled device. The operator can capture key fields (such as name, organisation and car registration, etc), assign security rights and issue access cards.” EXgarde Web security solution EXgarde Web’s new PIN code functionality allows a PIN to be amended and assigned to a door, as well as adding validity across a range of dates and times EXgarde Web’s new PIN code functionality allows a PIN to be amended and assigned to a door, as well as adding validity across a range of dates and times (which is useful for assigning cards for visitors or short-term contractors). Photos can also be captured through the web portal, so photo ID can be created easily and efficiently. The solution is also ideal for quickly responding to a security issue, such as a lost or stolen access card. The suspect card can be suspended, and a new card issued rapidly, with a visibility of all activity to assess the whole situation. Equally, it can be used to rapidly compile reports, for instance during a fire or other evacuation. EXgarde Web will report on who has entered or left the building, which is invaluable to the Fire Marshall and Search & Rescue teams. Intuitive interface for secure access Secure access can be gained from any Internet portal, including major smartphone platforms as well as PC and Apple" Alex added, “EXgarde Web does not require any new software, the user just requires a spare Network User client licence for the functionality to be supported. Secure access can be gained from any Internet portal, including major smartphone platforms as well as PC and Apple. Using a highly intuitive interface, little or no training is required to operate the software.” The solution is perfect for all sizes of organisations and applications. It is particularly suited to operators such as Receptionists or anyone who uses the system on an infrequent basis, as the software is very easy to use. EXgarde Web’s flexibility deliberately has more limited features compared to the full blown EXgarde PRO Client interface, to ensure security in the unlikelihood a mobile device is breached, or the operator makes a mistake. Integrated security Alex concluded, “EXgarde Web requires the latest version of EXgarde with the free web module installed on a client device. EXgarde Web can be used over multiple devices providing an unbeatable level of flexibility and usability for this powerful integrated security solution. If your business is already using EXgarde it is the perfect way to enhance your security regime for a minimal outlay.”
The latest-generation of SMB surveillance solutions support enhanced site security for end-users, while providing significant revenue opportunities for Hikvision resellers’ business. Small and medium-sized businesses (SMBs) have many of the same surveillance and security requirements as larger organisations. They need to identify and react to perimeter breaches in real time, and they need to automate footage searches to save time for their security teams. The challenge is, how can resellers provide small and medium-sized customers sophisticated and highly effective surveillance solutions at a price point that is appropriate for their business? And how can resellers grow their revenues and bottom line in the process? Win-win surveillance solutions Hikvision is continuously innovating its product lines to deliver cost-effective surveillance solutions needed by SMBs. As a result, they can enjoy new levels of site security, while resellers can focus on growing their revenues. Hikvision AcuSense makes advanced video content analysis and deep learning capabilities available to SMBs One key technology that can help resellers achieve these goals is Hikvision AcuSense, which makes advanced video content analysis and deep learning capabilities available to SMBs for the first time. This technology gives SMBs a cost-effective way to protect their locations and assets, while helping resellers building a uniquely competitive go-to-market proposition. Maximising SMB security Paired with Hikvision cameras such as ColorVu cameras that provide superior video images even at night, the AcuSense deep learning algorithm helps SMB customers maximise security with efficient human and vehicle detection. This helps them react to security threats in real time, while significantly reducing false alarms and associated personnel costs. Hikvision AcuSense works by disregarding natural movements, such as rain or leaves, triggering alerts when vehicles or humans are detected by a camera or a backend NVR/DVR. With automated sound and light alarm functions available in certain models, AcuSense-enabled cameras also detect would-be intruders before a security breach occurs. With Hikvision AcuSense, SMB customers also get a “quick target search” feature that allows security teams to find footage quickly in the event of a security incident. This saves many hours for teams who would otherwise search for footage manually.AcuSense technology provides significant benefits in a wide range of user scenarios Hikvision AcuSense SMB solutions There are very different requirements in the SMB market and AcuSense technology provides significant benefits in a wide range of user scenarios: Residential estates: Hikvision AcuSense cameras can be deployed at perimeter fences to detect break-ins and support protection of residents and their belongings. AcuSense vehicle detection can also be used to ensure that non-parking areas such as emergency exits and pedestrians are not blocked with illegal parking. Small office buildings and factories: Hikvision AcuSense can help security personnel to detect and prevent perimeter break-ins and to react in real time to minimise the risk of losses. AcuSense cameras and NVRs/DVRs can also be used to monitor and protect warehouses and office areas where valuable assets are located or stored. Retail stores: With human detection, Hikvision AcuSense can help small stores to monitor key areas such as cashier area, staff only area or a stock room, for example. Store owners would also be able to view the footage on their mobile phone and find out if there is any employee theft happening when they’re off the premises. Vehicle detection helps owners to ensure on-site parking within the store territory is allowed.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Rosslare Enterprises Ltd., a worldwide provider of professional security solutions including access control, detectors and guard patrol, announced the launch of the Rosslare BLE-ID app. By installing the app in their smartphones, users can use the smartphone as a credential for access control and automation applications. The ID code generated by the app is unique to the device, and may be transferred easily by email to the system administrator. The main benefit of this technology is that the user is no longer obligated to carry a physical RFID card Cost-effective credential solution Rosslare’s new CSN SMART readers will appear in the app, and the user just needs to tap on the reader name to submit the credential to that particular reader. The main benefit of this technology is that the user is no longer obligated to carry a physical RFID card. In addition, the 10-meter operating range of the app introduces a new set of convenience factors. The CSN SMART readers feature a multi-credential UID read technology for contactless smart cards (13.56 MHz) that can read the Card Serial Number (CSN) of many smart card RFID standards. The readers have the ability to read Rosslare’s BLE credential technology and PIN codes (AY-H6355BT), providing the most cost-effective credential solution for any application. The readers are rated IP65 and feature a modern design that can fit comfortably in any installation environment, indoors or outdoors. The app is available for download from Google Play Store and App Store. The creation of the BLE app evolves from our customers, who needed an alternative credential that can be used together or as a physical credential card" Secure entrances with personal devices With the new release, clients utilising Rosslare technology are able to secure their facility entrances and exits using personal devices as identification. This new app makes access control more cost-effective and easier for Rosslare clients everywhere. "The creation of the BLE app evolves from our customers, who needed an alternative credential that is affordable, reliable, and their users will embrace, and can be used together or as a physical credential card. Step into the future with Rosslare smart solutions," said Ezra Ozer, Director of Marketing of Rosslare’s Security Products division.
Redvision’s X-SERIES, RV30 rugged PTZ dome cameras now fully integrate with the Xtralis ADPRO XOa convergence software platform. The ADPRO XOa delivers revolutionary detection, verification and response services for remote guarding and general security applications. It provides remote, multi-site management of the company’s renowned, FastTrace, Remotely Managed Multi-Service Gateways (RMG) and iFT and iFT-E, NVR+ platforms. RV30 PTZ dome cameras Stephen Lightfoot, technical director at Redvision, explained, “Operators can take full advantage of advanced RV30 washer, wiper, IR and white light illumination switching and scheduling, with multiple pre-sets. Further, RV30 camera functionality includes variable speed PTZ operation, with minimal joy-stick latency; Full HD video stream recording, with lower resolution sub-streams; and efficient, remote control, display and transmission.” “Xtralis ADPRO XOa and iFT NVR+ platforms provide customers with a robust recording and control platform for the X-SERIES. ADPRO XOa platforms are already well established and extensively used in local authority and public space applications, where Redvision’s rugged PTZ cameras are also extremely popular.” Long-range people detection Redvision produces 1080p and 720p resolution models of the RV30 X-SERIES rugged, PTZ camera range. The 1080p model will view events at distances of 120 metres, with operators identifying people at 40m. The 720p model, although lower resolution, has a 150m range, with operators identifying people at an incredible 60 metres.
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition this week in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organisations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric high-throughput system The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility entry control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless iris authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
People and vehicle access control specialist Nortech has recently seen St James’ Market in central London update and improve access to its site using Nedap’s uPASS Target system. Supplied by Nortech, Nedap’s uPASS Target was installed by leading supplier of integrated security systems Total Support Services (Security) Ltd, which was selected to supply the robust solution for long-range identification to its recently installed security gates at the market. Total Support Services (Security) Ltd, TSS, which designs and engineers its own brand of security products and equipment, was able to use its 26 years of experience in specialised security products and services to provide the ideal security and access system that fitted the client’s needs. TSS selected the uPASS Target as it is easy to integrate with any existing access control system so users don’t need to get out of their vehicles to get into the development. Reliable and easy to install system Guy Bulmer, Director at Total Security Services commented, “We use Nortech as they are our ‘go-to’ provider for access control and vehicle identification systems. We have had a great relationship with them for nearly 20 years, ever since we were asked to install a Norpass system for some clients, and it just went from there.” The uPASS Target is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots He continued, “We certainly recommend Nortech products to others and we are very happy with the end result achieved for the client. We have our core products that we use because they are easy to install and they just work. Any issues are dealt with in a helpful and friendly way by the tech guys and we always get a reliable system at the end of it.” Ideal for access control and monitoring activities The uPASS Target is a robust solution for long-range identification of vehicles, people and rolling stock. It is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots. Its plug-and-play features enable it to be installed in just a few simple steps, and its variety of industry-standard communication interfaces support seamless integration into any existing or new third-party systems for access control, logistic operations, security and parking. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Dayton Public Schools (DPS) covers about 53 square miles in Dayton, Ohio. The school system is comprised of 30 school buildings and special centers with approximately 15,000 students in pre-kindergarten through high school. An urban district, DPS brings innovative students and teachers together to develop productive citizens ready to serve their communities. Core to achieving their mission is ensuring first, that students arrive at their school and at their classes, on time and ready to learn. DPS had a wide variety of, and in some cases a lack of, ID system capabilities throughout the district. This made it difficult to implement standard process improvements that would speed the creation of new IDs at the beginning of each school year. Additionally, DPS needed to expedite the check-in of tardy students thus allowing them to arrive at their classes faster. For managing tardy students, the schools traditionally used manual processes with handwritten passes which were inefficient and caused unnecessary delays if multiple students came to school late. Seeking to streamline processes, the school district realised that it needed to institute a universal, mandatory student ID system that allowed them to improve student attendance across the district while enhancing the security of its students and visitors. PlascoID card-based management system PlascoID showed DPS HID’s FARGO desktop card printers and their automated student management system, PlascoTrac, as a possible solution to the challenges the school system was facingWhile attending the Ohio eTech conference in early 2011, DPS learned about PlascoID, an authorised HID Global FARGO integrator and global provider of card-based ID systems. PlascoID showed DPS HID’s FARGO desktop card printers and their automated student management system, PlascoTrac, as a possible solution to the challenges the school system was facing. Because the printers and software integrated seamlessly with eSchoolPlus, the school system’s existing Web-based student-information system, DPS selected PlascoID to help streamline its attendance processes. Genuine HID products including the DTC4500 card printer/encoder, non-technology cards and Asure ID Enterprise card personalisation software were recommended by PlascoID to support the creation of efficient, multipurpose IDs. HID Global’s Asure ID software would enable the school system to create customised student ID cards while the DTC4500 printers would allow campus officials at each school location to instantly issue all student IDs. The printer’s modular design and small footprint were also ideal features for the school environment where space is at a premium. Asure ID enterprise software Prior to the start of the 2012 school year DPS implemented the solution over the course of just two weeks, installing the PlascoTrac system with 31 DTC4500 printers and Asure ID Enterprise software so it could be used on the first day of the new academic year. With the new DTC4500 printers and Asure ID software, DPS can now: Print a high volume of cards at fast print speeds: Every year, 15,000 IDs are needed by DPS in just the first week of school. The DTC4500 meets this challenge by quickly and reliably producing large quantities of cards with high-quality images. Able to withstand the day-to-day wear and tear by students these new IDs are now also uniform in image quality, design and durability. Save money and training time: The modestly priced DTC4500 has an intuitive set up and is easy to use. Already optimised for organisations like DPS, the printer is a high-security, high-performance ID issuance system that doesn’t require large capital investments or extensive training by system operators. Prepare for future ID card needs: The DTC4500 is field upgradeable. As their student ID system changes and evolves, DPS can modify their printers to fit new requirements. Achieve multiple uses with a single software application: With Asure ID Enterprise software, DPS is able to easily design card templates, enter student data and create photo ID badges. Additionally, Asure ID’s LiveLink capability enables the schools to sync student ID badge data with attendance data in PlascoTrac, and with student records in eSchoolPLUS. PlascoTrac card ID system The newly designed DPS student ID is a white card featuring the district’s logo and mission statement With this combined solution from PlascoID and HID Global, DPS can now easily and quickly provide all students with IDs during the first week of the new school year. And when a student loses his or her badge, or is newly enrolled in school, a new ID can be created and issued that same day. The newly designed DPS student ID is a white card featuring the district’s logo and mission statement. New visual security elements include a large color photo of the student and his/her name printed in large font on the front of the card, so school personnel can easily identify individuals. Additionally, the ID now includes a barcode that is used in conjunction with the PlascoTrac system. So, when a student arrives late to school or is tardy to a class, they are scanned into PlascoTrac and a tardy pass is printed automatically. HID's Plasco ID cards With this brand-new student ID system, processing tardy students now takes 25 to 35 percent less time than before, enabling DPS students to spend more time in class while reducing the administrative burden of its staff. Some schools have even tied the new ID cards to their media centre In addition to addressing their original challenges, DPS has now found that the new HID and Plasco ID card solution gives them even greater functionality and versatility. Some schools have even tied the new ID cards to their media centre for checking out books or documenting lunches purchased in the cafeteria. Elementary schools are even exploring ways to use the IDs to encourage positive reinforcement of good behaviors. HID Global card issuance/PlascoTrac solution “We are extremely satisfied with how adaptable the solution is on a per-school basis,” said Richard Melson, director of The Office of Information Technology at Dayton Public Schools. “Initially the principals had one vision of how things were going to work and now that they have the technology in their possession, they each use it a little differently based on specific needs of their school.” In the near future, DPS expects to expand its use of the HID Global card issuance/PlascoTrac solution to keep track of visitors. Currently the district provides printed temporary ID passes, but it plans to eventually incorporate scanning of government IDs, such as a driver’s license, before granting visitors entry.
Safety is at the forefront of hospitals across the nation. According to a landmark report To Err is Human (2000) by The Institute of Medicine (IOM), between 44,000 and 98,000 patients die a year in the U.S. due to preventable medical errors including wrongful administration of medication. Beyond the cost of human life, these errors cost the healthcare industry as much as $29 million per year. This figure takes into account the expenses associated with additional care, loss of income and disability so as to reduce medication administration errors, hospitals are modifying their current medical dispensing systems in operation to prevent and eliminate these errors. Based in Portsmouth, Ohio, Southern Ohio Medical Center (SOMC) is one such hospital that is addressing this concern. A 222-bed hospital that provides emergency and surgical care, as well as a wide range of other health-care services, SOMC employs 2,200 full and part-time doctors and volunteers. SOMC has a medical staff of more than 140 board-certified or board-eligible physicians and specialists and is supported by more than 800 volunteers. WALLaroo 2000 wall station The WALLaroo 2000 wall station featured a cabinet mounted outside each patient’s room to temporarily stock the non-narcotic medications prior to dispensing One of the “Best Practices” outlined in the IOM report calls for the healthcare industry to utilise technology, such as bed side bar coding, to improve patient identification. To meet these standards, SOMC quickly modernised their process from relying heavily on a two-cart dispensing system that included laptops on wheels (LOW’s) and pharmacy carts, to a system that was more efficient and accurate. The new solution, the WALLaroo 2000 wall station, featured a cabinet mounted outside each patient’s room to temporarily stock the non-narcotic medications prior to dispensing. SOMC’s IT department was tasked with finding a way to integrate the wall stations with a state-of-the-art access control system that was equipped with an access-controlled lock and reader. By implementing this solution, SOMC has been able to strictly adhere to their patient’s rights as they pertain to medication dispensing, which includes: the right patient, the right medication, the right dose, the right time and the right route of administration. Centrally networked access control system “When we started our quest for an access-control solution, we looked for two things,” said Dennis Ward, information services and applications manager for SOMC. “First SOMC needed a solution that would be centrally networked with the current eMAR system, as well as have a main power source. Additionally, we needed to replace the magnetic strip on employee badges with a more effective technology.” Ward consulted with several companies within the security industry, including Accu-Tech, SecuriCo, Microman and HID Global, before finding the optimal solution- SecuriCo’s Securus Web software solution. The solution operates with a HID EdgeReader coupled with iCLASS 2K (37-bit) smart cards and Rutherford Controls 3513 Lock. SecurusWeb software solution SOMC project requirements indicated that both a Web-based software solution and an IP PoE Access Control solution were required" “SOMC project requirements indicated that both a Web-based software solution and an IP PoE Access Control solution were required,” said Jim Andrews, president of SecuriCo, Inc. “After Dennis and I reviewed the project requirements and discussed the design options with AccuTech and Microman, everyone agreed that the SecurusWeb software solution with a pre-configured HID EdgeReader and iCLASS 2K (37-bit) smart cards were the perfect fit for the hospital’s unique access control needs.” According to Ward, “As I conducted product research in the security information space, I noted that most available solutions were based on HID technology. This was important since the hospital was growing, and our security needs would grow, too. HID Global has a great industry reputation so it was a natural and easy decision to select the company’s solutions and OEM partner, SecuriCo, Inc.” Installing WALLaroo wall stations and HID EdgeReader Since Ward had never implemented a project like this before, he obtained samples of one of the WALLaroo wall stations, a HID EdgeReader and evaluation software from SecuriCo. Using the samples, he created a prototype that would fit all his access control needs and serve SOMC in the best possible way. Installed by Microman, these pre-programmed wall units have the SOMC specifications that Ward devised. While physical access control is delivered through the HID EdgeReader and iCLASS cards, the control of the hardware is provided through SecuriCo’s Securus Web software. The software controls which individuals are granted access to each station based upon a preset access level, which includes the day and time access is allowed. In addition, the application also records how access is added and removed. This innovative solution also enables pharmacy technicians to deliver barcoded, 24-hour scheduled, non-narcotic medications to the secured wall mounted stations. Using their authorised HID iCLASS cards, the nursing staff is then able to access and administer the medication. SecurusWeb and HID Global’s Edge IP access solutions SecurusWeb and HID Global’s Edge IP access solutions can make it easier to meet the unique and demanding needs of healthcare applications, as experienced by SOMC Thinking outside the box and using innovative products like SecurusWeb and HID Global’s Edge IP access solutions can make it easier to meet the unique and demanding needs of healthcare applications, as experienced by SOMC. Accuracy for patient medication dispensing has improved significantly thanks to the new solution. Workflow is also more efficient because the amount of time it previously took nurses to go to the medication room and retrieve new medications has been significantly reduced. Additionally, medication is secure and located where the staff expects it to be, while eliminating the need for medication carts, making the hospital hallways accessible and less cluttered. With the original installation of 73 of HID’s EdgeReaders being such a great success, SOMC ordered and installed an additional102 EdgeReaders in the hospital’s new North Tower, including 12 on the first floor Heart Care Unit (HCU), 30 on the second floor in the Surgical-Vascular Care Unit (SVCU), 30 on the third floor in the Medical-Surgical Care Unit (MSCU), and 30 more that are located on the fourth floor in the Progressive Care Unit (PCU).
The Lagoon Amusement Park in Farmington, Utah, likes things fast, too. For more than 100 years, it has offered exhilarating thrill rides as part of its entertainment package. The park’s Fire Dragon Double-Loop Rollercoaster hits speeds of 90 kilometers per hour, and its Lagoon-A-Beach Waterpark promises 550,000 gallons of liquid fun. Identification cards Like many other parks, Lagoon provides identification cards to its employees and offers season passes (called Season Passports) with identification cards to its guests. But the equipment formerly used to print the cards was not keeping up with the pace of the park. “As the public demand for Season Passports increased, it was becoming more difficult to keep up with the desired pace,” said Nic Young, ticketing manager. “We used to take Polaroid pictures and laminate them onto pre-printed cards but matching the pictures with the cards was tricky. It was easy to put the wrong picture on someone’s card.”Lagoon now is able to satisfy the needs of its employees and guests with the updated card printing technology The multi-step process also was slow and cumbersome – not a minor concern with 2,500 employee ID badges and more than 30,000 season passes issued every year. Lagoon now is able to satisfy the needs of its employees and guests with the updated card printing technology, bringing the park back to its desired speed. ID badges and card-printing technology “These printers are extremely fast,” said Young, “which is especially important during our busy months of May and June. I also like the one-step printing process and the fact that the printers are easy to maintain and keep clean.” The Employee Services department uses colored ribbons when printing employee ID cards, identifying employees 15 years of age or younger by printing those names in red on the employee’s card. The Ticketing department uses standard black ribbons for its season passes. With five computer stations in the Season Passport photo area, ticketers can issue passes to large groups of people at the same time. Barcode technology Both employee and Season Passport ID cards use barcode technologyBoth employee and Season Passport ID cards use barcode technology. For employees, the barcodes specify the level of park access and also bring up full-sized pictures of the employees to be viewed by Lagoon security. For Season Passport holders, barcodes record when a passport has been used or restrict passport usage on specified dates (such as during Lagoon’s July Fun Pass). Now that the Lagoon Amusement Park has established its current system, computer stations at the gates can track Season Passport access information and provide valuable marketing information. “We’re trying to increase our per person usage through promotions such as our Season Passport Holder coupon books,” Young said. “Our ID card system allows us to record our progress.” The bottom line, however, is speed. “There are no more long lines,” Young said. “We’re able to operate at full capacity all day long, allowing our guests to get their Season Passports quickly and proceed directly to the fun.”
Established by the French Government’s Ministry of Finance and Economics, the ACCORD project was commissioned to design and implement financial system modernisation. The charter of the ACCORD initiative team, composed of representatives from multiple government ministries, is to architect solutions that enable the French government to manage the finances of the country with the same level of accountability as private sector enterprises. The technology-based infrastructure selected was a smart card solution to confirm and authenticate users across 40 departments. HID Global’s Identity Assurance software The systems operated in parallel but could not leverage the benefits of a unified system AIFE – Agence pour l’Informatique Financière de l’Etat – chose HID Global’s Identity Assurance software coupled with smart cards for the solution. Ensuring users are ‘who they say they are’ over the course of several decades, individual French government departments had developed separate and distinct applications to manage activities such as budgeting, processing purchase orders, and other accounting activities. The systems operated in parallel but could not leverage the benefits of a unified system. Enterprise Resource Planning system With the inception of the ACCORD project, the government committed to streamlining finance management by moving to one system for centralised control of the country’s budgeting and finance operations – with a goal that by 2004, all government central entities will be using the standard Enterprise Resource Planning (ERP) system. The transition to an online application that consolidates financial reporting and transactions requires an organisation to determine how it will identify users with certainty prior to granting them access to the system and to valuable data. The solution must be easy to use to ensure departmental acceptance of the new application and authentication process. It must also minimise the IT staff time required for day-to-day administration and helpdesk activities for a large population over 7,000 dispersed users. These multiple challenges presented an opportunity to leverage proven digital identification solutions from HID Global. Smart card-based PKI identification solution HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entrySmart card-based solution using digital certificates with PKI, The French government-wide implementation securely links multiple departments, such as the Ministries of Education, Justice, Transportation and Housing, and Foreign Affairs, to the unified ERP application, enabling the exchange and ultimate consolidation of digital information. In 2000, the Ministry of Finance began deploying HID Global’s smart card-based PKI solution. HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entry – any of which could become a source of fraudulent or malicious activity in the absence of strong authentication and confirmation of digital identity. Today, employees regularly use the card with a microchip that holds their unique credentials in the form of an Entrust digital certificate. HID Global’s Gold Entrust-Ready certification ensures a smooth deployment to large numbers of users, and the combined solution with Entrust TruePass delivers the following benefits: Enhanced Security: HID Global’s multi-factor authentication reinforces the fundamental security and intent of a PKI by requiring something the user has (a smart card) and something the user knows (a PIN code) in order to use the private keys stored on the card. To further enhance security, the key pair is generated on the cryptographic smart card itself, so that the private key is never exposed to the insecure PC environment. The tight integration of HID Global’s client software with Entrust ensures certificate key updates are transparently and automatically made on the card. Non-Repudiation: To support non-repudiation, it is essential that ERP system users provide undeniable proof that they are who they say they are. Keys used for that authentication can never be stored on the potentially vulnerable user workstation. Those sensitive keys must remain under the sole control of the user, and HID Global’s client software ensures private keys are generated on the card and remain in the rightful owner’s possession at all times. User Simplicity: HID Gobal’s Security Client software provides a familiar ATM-like user interface that makes complex digital identity and PKI technologies transparent, so employees can focus on their work responsibilities and financial application activities to easily access the system. HID Global’s commitment to openness and industry standards ensures that the French Government’s initial investment in digital identity products and smart card client software infrastructure is capable of supporting multiple PKI vendors and other forms of identity credentials in the future.