Human identification system
GET Group North America, global provider of end-to-end solutions for secure credentials with over 20 years of experience in identity management, has announced a partnership with Secure Planet, an I3 affiliated company, which provides facial recognition-based solutions of the highest overall quality, security, and value to U.S. Government, industry and commercial clients. Under the terms of the agreement, Secure Planet’s cutting-edge facial recognition technology will be incorporated in sel...
Customers of IndigoVision will now be able to access advanced facial recognition technology following the announcement of a new partnership with AnyVision. The new partnership will see AnyVision’s renowned Better Tomorrow software being integrated with IndigoVision’s Control Center, its innovative security management solution. Trusted by customers around the world for over 25 years, IndigoVision is committed to keeping customers at the forefront of security innovations and the new i...
Altek Corp., global digital imaging company based in Taiwan, is introducing three new technologies: Vision AI chips, AI commercial surveillance cameras, and 3D depth image sensing modules with the theme of ‘Bringing Vision AI to The Edge’. The company’s vision AI chip and AI commercial surveillance cameras enable high-resolution smart surveillance by supporting AI human/object detection, event detection and behavior recognition. The entire AI process is conducted in the camera...
Ping Identity, global identity defined security solutions provider, has announced new programs and benefits for its Technology Alliance and Channel Program partners, including a new online partner directory, app integrations catalog, education and training services, on-demand resources, and enhanced services designed to improve partner products and drive business. Ping is also recognising Microsoft, Optiv and ProofID for their shared commitment to deliver innovative identity solutions to the mar...
MOBOTIX and Konica Minolta are currently developing a new camera platform that specifically meets the requirements of deep learning methods and will lead to innovative recurring revenue models for both companies: MOBOTIX camera platform The new MOBOTIX camera platform, jointly developed with Konica Minolta, is based on the distributed intelligence in our camera system and is crucial for artificial intelligence and at the same time the key for the communication of our products with other sensor...
Evolis announces the formation of a wholly-owned subsidiary in Tokyo, Evolis Japan K.K. The globally renowned French card issuance company designs, manufactures and commercialises a complete range of personalisation and issuance solutions for plastic cards in various markets such as retail, hospitality, banking or public administrations across the globe.Evolis has been present since 2008 in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local...
Iris ID, global provider of iris recognition technology, and GenKey, a trusted provider of biometric identification solutions, has announced the integration of iris recognition cameras and matching engine into GenKey’s biometric ID platform, to provide an all-in-one solution for various biometric registration and verification initiatives. Advanced security and privacy Iris ID iCAM TD100 and iCAM T10 cameras and IrisAccelerator matching engine have been integrated into GenKey’s ID solutions. GenKey’s ID platform has helped many governments and organisations to improve inclusivity, reduce fraud and improve time and cost efficiencies. IrisID, the world’s most deployed iris recognition platform, provides advanced security and privacy, which further enhances GenKey’s ID platform. “GenKey’s ID platform is being used to identify and verify millions of people in several countries worldwide,” said Arnd Langguth, chief operating officer, GenKey. “We are experts in fingerprint biometrics, but our ID platform has been designed for multi-modality. Our customers expect proven, secure, high performance, that is why we choose IrisID. IrisID’s IrisAccelerator will plug-in seamlessly into our ID platform.” Iris ID biometrics authentication systems The integration into Genkey’s ID platform now offers full deduplication on both modalities" The Iris ID technology provides a fast, accurate and non-contact method of capturing citizens’ biometrics, identifying people and detecting duplicates. Iris ID authentication systems are used worldwide for access control, time and attendance checks, national ID programs, border crossings, voter registration, and many other applications. The company’s solutions are currently being used by public and private organisations across Africa and on five other continents. Mohammed Murad, vice president of global sales and business development, Iris ID said the company’s technology is a natural fit with GenKey. Integration with GenKey biometrics ID platform “Our cameras are unaffected by dirt, grease, gloves, facial hair and other factors that can limit the quality of registration and identity verification of other biometric systems.” he said. “In addition to its speed and accuracy, our software has been proven to be highly effective for deduplication – the elimination of multiple registrations by the same person. The integration into Genkey’s ID platform now offers full deduplication on both modalities.” GenKey’s ID platform is designed for capturing biographic and biometric data of individuals in small to large-scale registrations and ensuring that each subject stored is unique. Besides its standard registration, verification and reporting modules, the software has customised modules for biometric voter verification, election management and biometric member verification for healthcare, and other use cases.
People and vehicle access control specialist, Nortech is now offering long-range vehicle and driver identification tags to grant seamless access to approaching vehicles. Nedap TRANSIT reader range Designed to accompany the popular TRANSIT reader range from Nedap, the tags are ideal for use in staff car parks, for priority vehicle control, industrial site access control, fleet and parking management. Key features include simultaneous driver and vehicle identification, a reading distance of up to 10m, easy windshield mounting with suction pads and maximum perimeter security. Driver-based ID systems The TRANSIT Prox Booster (120-125 KHz), SMARTCARD Booster (13.56MHz) and SMARTCARD Booster Ultimate (2.45GHz and 433MHz) enable long range driver-based identification The TRANSIT Prox Booster (120-125 KHz), SMARTCARD Booster (13.56MHz) and SMARTCARD Booster Ultimate (2.45GHz and 433MHz) enable long range driver-based identification. Driver-based ID systems, a building access card and in-vehicle booster ensure that a vehicle can never gain access to a secured area unless occupied by an authorised driver. The booster is used in combination with a personal access credential and is an easy to integrate solution for vehicle access, eliminating the need to issue new cards. The booster is placed on the windshield on the inside of a vehicle. When an authorised building access card is inserted into the booster, it is read and then boosted to the external Nedap TRANSIT reader. The TRANSIT reader then transmits the credential ID to any standard back end security panel. If the credential is authorised and access is granted the gate will open automatically. Removal of the driver ID then allows the access card to be used for building access. TRANSIT Prox Booster 2G Users also have the facility to match up vehicles and drivers, as a separate ID (vehicle ID) can be programmed into the booster on certain models. This ensures the right driver is with the right vehicle. The TRANSIT Prox Booster 2G supports proximity access control cards operating on 120-125 kHz such as HID prox, EM and Nedap. The SMARTCARD Booster 2G supports ISO 14443 or 15693 compliant smartcards (eg. MIFARE, MIFARE DESFIRE, LEGIC, Calypso and HID iClass) operating on 13.56 MHz. SMARTCARD Booster Ultimate The SMARTCARD Booster Ultimate is also available for almost all card technologies The SMARTCARD Booster Ultimate is also available for almost all card technologies. It supports ISO 14443 or 15693 compliant smartcards (eg. MIFARE, MIFARE DESFIRE, LEGIC, Calypso and HID iClass) operating on 13.56 MHz. The advanced tag authentication of the SMARTCARD Booster Ultimate is only functional when the Security Key Pack has been installed in the TRANSIT Ultimate. The SMARTCARD Booster Ultimate operates with two frequencies, and uses the 2.45 GHz for robust vehicle identification and the 433 MHz frequency for advanced tag authentication using AES standards. A bi-directional communication feature in combination with the SMARTCARD Booster Ultimate has also made it possible to write information on the drivers’ access control card when the vehicle enters or leaves a perimeter. Credits, offline access rights or other information can be changed dynamically upon perimeter access. Booster applications in secured areas Typical booster applications are high secured areas like airports, seaports, military bases, utility companies, corporate and educational campuses, police, fire and other installations where vehicles must be assigned to a specific driver. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
NEC Corporation announced the development of a ‘Person Re-identification Technology’ that is capable of matching images of people whose figures are partially hidden from cameras, even if the image is taken from behind or from the side. This technology analyses the entire appearance of a person's photo image, such as their clothes and body shape, to determine whether they match with other images of people. Using the image analysis and deep learning technologies that NEC has cultivated through Facial Recognition Technology and other technologies, NEC was able to establish this high-precision technology that does not rely solely on facial images. Recognising wide range of people The technology enables a wide range of people to be recognised, even in places where there are many people or visual obstructionsIn many cases, Facial Recognition Technology alone may not be enough to match a person whose face is partially concealed. Conventionally, once a person was matched using Facial Recognition Technology, the appearance of that person could then be collected from images taken by multiple cameras. However, when there were many people and objects in an area, such as chairs and counters, people appearing in images of those areas cannot be fully scene, making it difficult to match them. This technology enables a wide range of people to be recognised, even in places where there are many people or visual obstructions that prevent a person's face or body from being fully seen. Helpful in searching lost children Potential applications for this technology include security support in large-scale facilities with many people or visually blocked areas, as well as assistance in the search for lost children. NEC has a large portfolio of world-class biometrics certification technologies that include facial and fingerprint recognition" "NEC has a large portfolio of world-class biometrics certification technologies that include facial and fingerprint recognition," said Masayuki Mizuno, general manager, Biometrics Research Laboratories, NEC Corporation. "We are now expanding this portfolio within our NEC Safer Cities solutions, our NeoFace facial recognition AI-engine that boasts the world's No.1 accuracy, and NEC's advanced video analyser." Main features of this technology: 1. Even persons who are not fully visible to a camera can be matched NEC's unique ingenuity in deep learning technology is used to match a person's image by automatically selecting other parts of their image when there is overlap between multiple people, such as in crowded or shaded environments where a person's full image cannot be viewed. The matching rate for a person is as high as 90%. 2. Matching is possible with images taken from behind or from the side Effective use of deep learning techniques can match people from numerous angles, such as from behind or from the side, and shot with multiple cameras. As a result, this technology can effectively match people using camera images where the face is not visible.
Neurotechnology, a provider of deep learning-based solutions and high-precision biometric identification and object recognition technologies, has announced the release of the SentiVeillance 7.0 software development kit (SDK) and the end-user oriented SentiVeillance Server solution. With SentiVeillance SDK, developers can create identification solutions that use live video streams from digital surveillance cameras. The latest version adds multiple enhancements to the biometric face recognition algorithms and two completely new analytical features: vehicle-human detection and classification and automatic license plate recognition (ALPR) modalities. All modes are designed to function without requiring any particular effort by users to be recognised or detected, making SentiVeillance well-suited for law enforcement, security, access control, statistics counting, traffic monitoring and other commercial applications. With SentiVeillance SDK, developers can create identification solutions that use live video streams from digital surveillance cameras "This release brings a wealth of new features,” said Vytautas Pranckenas, SentiVeillance product lead for Neurotechnology. “Most of the new additions come by way of listening to our customers and developing what best suits their needs. We are very grateful for their continuous feedback and support." The enhanced SentiVeillance modes, developed to function in live, real-time solutions via deep neural network algorithms, provide a high degree of recognition and detection accuracy. SentiVeillance’s biometric facial identification Biometric facial recognition - The high reliability of SentiVeillance’s biometric facial identification algorithm allows it to be used with large watch-list databases (both identifying a person who is on a list and adding new faces from video streams to watch-lists). It tracks identified faces as they move around the camera’s field of view and continues tracking even if a person moves behind an object and re-appears. It is effective both close-in and at a distance when using high-resolution cameras. It can perform gender classification, evaluate a person’s age, identify facial expressions (e.g. smile, open mouth, closed eyes) and detect particular attributes, such as if the person is wearing glasses or sunglasses and whether they have a beard or mustache. Vehicle-human detection and movement tracking (VH) - SentiVeillance detects both moving and static vehicles or people in a scene and performs object classification and tracking until the subjects disappear. In addition to pedestrian detection and vehicle classification by type, the algorithm also returns an estimation of paint color (vehicles) or predominate clothing color (pedestrians) and determines the vector in which they are moving (e.g. north, south, southwest). Automatic license plate recognition (ALPR)The new ALPR capability in SentiVeillance automatically detects and reads vehicle license plates - The new ALPR capability in SentiVeillance automatically detects and reads vehicle license plates, recording the information from both stationary and moving vehicles within the scene. The latter two modes (VH and ALPR) can be used together to create larger, more varied solutions. As an example, when conventional ALPR is used for road tolls, automatic car washes or paid parking systems, users might try to avoid paying by altering or exchanging license plates. Stolen vehicles might also have their license plates changed. When using multiple analytics in concert the resulting solution could match and verify plate numbers with other characteristics of the vehicle, such as type and color, through queries of previously stored values or vehicle registration databases. SentiVeillance SDK and Server video analytics SentiVeillance is designed to run on multi-core processors for fast performance and can process video data from multiple cameras simultaneously using a common PC (current generation i7 CPU with 4 or more cores) with a graphics processing unit (GPU). It can be used with large surveillance systems, incorporating many cameras and data-processing nodes. Developers have many and varied options in the creation of scalable, cost-effective solutions for their customers. SentiVeillance Server - Neurotechnology now provides customers with the option of a ready-to-use, end user-oriented analytics server. The new SentiVeillance Server provides a solution with all the key features already in place, by-passing the need for extensive development where it is not essential or required. SentiVeillance Server is available for use with existing Milestone and Luxriot Evo video management systems (VMS). The new SentiVeillance products may be purchased from Neurotechnology or through distributors worldwide. A free 30-day trial is available and, as with all Neurotechnology products, the latest version is a free upgrade for existing customers.
Iris ID, a global provider of iris recognition technology, announced its iCAM 7S series has been certified by the Bureau of Indian Standards (BIS) under license number R-41110639, the national standards-setting body for India. The recently mandatory BIS certification attests to the safety, quality and reliability of electronic, medical, construction and other many other commercial and consumer products. The iCAM 7S series and other company products are extensively used by India’s Unique Identification Authority as part of the country’s national identity program. Registrations, known as Aadhaar numbers, are used for Indians to apply for a passport, obtain a driver’s license, receive social services and many other daily activities. More than 1 billion citizens are enrolled in the program. Used for access control, time and attendance Once a product has passed BIS certification, manufacturers may use the agency’s mark on products used in IndiaMohammed Murad, vice president global sales and business development, Iris ID, said the BIS certification is similar to Underwriters Laboratories (UL) standards found throughout the world and the CE mark used in Europe. “We’re pleased to have received BIS certification as India is a very important market for Iris ID,” he said. “Our products are used not only by government agencies, but also by many commercial organisations.” Once a product has passed BIS certification, manufacturers may use the agency’s mark on products used in India. Iris ID authentication systems are currently used worldwide for access control, time and attendance, national ID programs, border crossings, voter registration and many other applications.
Evolis, global provider of personalisation systems for plastic cards, announced the creation of a subsidiary in Tokyo under the name of Evolis Japan. Evolis Japan Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support. Since 2008, Evolis has been present in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group’s business development and maximise the chances to establish a long-term presence in Japan. Card personalisation solutions Evolis Japan’s mission is to expand the traditional distribution network, develop a new network dedicated to new sectors and to strengthen its ability to reply to demands of government bodies and financial institutions. "Japan is one of the world’s leading economies with more than 125 million people. We therefore see strong potential in several key markets for card personalisation. The creation of a Japanese company will help us reinforcing our existing business relationships and facilitate the development of new partnerships" says Emmanuel Picot, president of Evolis.
According to the reports of not-for-profit organisation Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organisations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot detection solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognise firearms in different shapes, sizes, colours, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyse the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-shot detection advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimise the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organised manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
The Food Standards Agency (FSA) in the UK has begun investigations into meat wholesalers after a raise in concern for food hygiene. This investigation has impacted businesses such as Wetherspoons, as well as schools and care homes up and down the country. Consumers are beginning to lose trust in businesses that are supplied by untrustworthy production companies and it seems to be becoming more common, if we are to look back to the horse meat scandal in 2013. But what are the benefits of having security systems within these types of production facilities? From ensuring consumer confidence, to maintaining quality control within products, what does it achieve? Finally, what crime exists surrounding the industry and how can the implementation of protective systems boost satisfaction? Instant barriers for unwanted people The world is becoming more advanced and revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices — whether this is protecting people from a physical threat or a threat that is much more devious within our foods. Food factories should start with access control systems. This will put an instant barrier between operations and any entry attempts by unauthorised personnel. Whether this a swiped identification card, biometrics or a passcode way of entry, only authorised personnel will be granted access. Revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices Another security system that could be put in place to help food factories and encourage them to work more efficiently is CCTV. By spring 2018, all slaughterhouses within England are required to have CCTV systems in place that can be reviewed by the FSA who have unprecedented access to footage within a 90-day period — is this something we should be looking to do in food factories to ensure safety for the British people? CCTV is a worthwhile investment for production companies who want to gain visibility of their entire operation and gain the respect from consumers across the country. The benefits for CCTV Customer reassurance — as food factories don’t operate openly and everything is hidden away, this instantly creates suspicion from a consumer’s perspective as they will be the ones buying the final product once distributed to stores around the country. CCTV will counter this issue as it shows that operation centres have nothing to hide — giving them the ability to publish any footage if accused of misconduct. Maintaining quality — using more advanced CCTV within food factories will enable production companies to monitor the production line and maintain the standards that they sell themselves on. Sometimes, a human error is unavoidable on a production line after several hours of non-stop work — being able to detect it instantly is essential. Criminal activity across food factories 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. It has been proven that CCTV can deter criminals. By installing these systems, food factories can protect themselves from threats that are external and internal as well as being able to support themselves in any claims of violation. Although produced goods have been at the centre of news stories regarding the integrity and containments of what is being delivered, another common crime within this industry is fraud. 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. Common perpetrators in fraud When it comes to the most common types of fraud, information theft stood at 30%, compliance breach at 30% and intellectual property theft standing at 26% of the respondents who were asked — all of which could cause great impacts to production lines. It was also found that those who had recently started working for the company, such as junior employees, were the most common preparators when it came to fraud within a manufacturing factory (39%). Temporary manufacturing workers came in at second place with 37%, while those in senior or middle management positions were at 33% — the same as ex-staff members. However, vendors/suppliers who do not have as much access to your business accounted for 33% too. This clarifies that anyone has the potential to commit a crime within a factory. To ensure protection for the British consumer, food production factories should seriously consider implementing similar systems to UK slaughterhouses. This article was contributed by IP security provider 2020Vision.
The Middle East security market provides a healthy opportunity for manufacturers who can capitalise on the region’s key verticals. Intersec’s 20th edition show focused more on solutions than on products, including solutions for the growing retail sector and an infrastructure market requiring ruggedised equipment to stand up to harsh environments. Intersec hosted security, safety and fire protection exhibitors from over fifty countries at Dubai’s spacious International Convention and Exhibition Centre on 21st - 23rd January. For the security market, the show was an opportunity to demonstrate how the industry’s latest technologies can benefit end-users in the UAE and globally. While the show hosted many impressively-sized stands from key security players, these tended to reflect the ongoing shift from a product-centric market to a focus on customer problems and solutions. Rather than filling the floorspace with an abundance of products, many brands chose to showcase how their flagship solutions could function in real-world applications. Retail surveillance delivers ROI Numerous companies opted to highlight their retail solutions – a key vertical for Dubai, which is known for its elaborate city shopping hubs. The Axis Communications stand allowed visitors to experience its network video offerings for the retail sector, including integrations with Electronic Article Surveillance (EAS) and Point of Sale (POS) technologies. Solutions on show reflected how security systems are increasingly expected to provide a tangible return on investment: With options for queue management and people counting, Axis video technology can be used to provide business intelligence and improve the customer experience, as well as enhancing safety. IP video manufacturer Vivotek also showcased its latest retail offering, including fisheye cameras with built-in crowd detection and heatmap technology, which can help retail managers analyse customer traffic patterns and highly frequented areas. The panoramic nature of Vivotek’s IP cameras makes them ideal for collecting comprehensive data from retail stores. MOBOTIX CEO Thomas Lausten demonstrates how the company’s dual modular camera delivers high-quality images in extreme weather conditions IP video in extreme conditions The MOBOTIX stand was also less product-driven than at past shows. Instead, the focus was on how the manufacturer combines intelligent IoT technology and robust materials to address real end-user needs. CEO Thomas Lausten, who joined the company in June 2017, was on-hand to demonstrate how the company’s dual modular camera continues to deliver high-quality images in extreme weather conditions including ice, rain and sand. Rugged solutions were a big theme across the show floor. This is unsurprising given Intersec’s location in Dubai – the Middle East provides ample opportunity for the security market to capitalise on large outdoor projects, including the oil and gas industry. Video surveillance manufacturer Videotec showcased its latest HD PTZ cameras built to withstand harsh outdoor environments. The stand hosted an immersive ‘Experience Centre’, where the company’s flagship PTZ cameras moved in sync to a rolling video, demonstrating their use in vertical markets including oil and gas, marine surveillance, and critical infrastructure. Video surveillance manufacturer Videotec showcased its latest HD PTZ cameras built to withstand harsh outdoor environments MENA security market requirements Storage provider Promise Technology showcased its latest portfolio of surveillance solutions, including a cloud-based infrastructure optimised for growing IP video requirements. The manufacturer also introduced its new Vess A700 network video recorder series. This latest NVR offering specifically targets medium- to large-scale applications such as banking and industry. Such a solution is ideal for the growing Dubai market, where strict legislation requires a video retention time of 180 days. Intersec is set to return to Dubai from 20th - 22nd January 2019. Organisers expect over 1,300 exhibitors from across to globe to come together for a bigger, wider ranging and more innovative show.
Amazon Go is a new idea in retailing, now being tested at a store in Seattle, that eliminates the need for customers to go through a checkout line. The so-called “just walk out” experience depends on “the world’s most advanced shopping technology.” Customers simply enter a retail store, choose the goods they want, and leave. The checkout process is automated: The selected goods are charged to the customer’s account automatically. Solving shoplifting Most of the information I have read about the system emphasises its benefits in terms of customer convenience. However, another huge benefit would be to essentially “solve” the problem of shoplifting. Anyone – criminal or not – who enters the store, takes items and leaves will be charged for the goods. Shoplifting has been a huge and intractable cost for retailers for decades. Solving it is no small feat, and the potential money savings could help to pay for wider use of Amazon Go technology. After all, the high costs of the system are cited as one obstacle to wider implementation. Amazon Go smart phone app The Amazon Go system involves a smart phone app that identifies the customer as he or she walks into the store (presumably through a turnstile). In addition, there are computerised systems in place that automatically identify which customers pick up which items from the store shelves, and keep a running, real-time tally of who buys what. No need for check-out lines; it’s all automatic. Customers only need an Amazon account, a supported smartphone, and the free Amazon Go app. There are computerised systems in place that automatically identify which customers pick up which items from the store shelves, and keep a running, real-time tally Currently, the first Amazon Go store is being tested in Seattle; Amazon employees are using the store now in a Beta programme, and it will be opened to the public in 2017. Goods include ready-to-eat food items, as well as grocery essentials ranging from bread and milk to artisan cheeses and locally made chocolates. Future of Amazon Go How fast might the technology become more widespread? The Wall Street Journal earlier reported that Amazon envisioned opening more than 2,000 physical stores in the United States, although the company denies the report, perhaps in the interest of lowering expectations. Amazon describes the technologies involved as “computer vision, deep learning algorithms and sensor fusion.” Suffice it to say the 1,800-square-foot store relies on cameras and microphones, as well as infrared, pressure and load sensors on the store shelves. Surveillance cameras track customers through the store, as does computerised analysis of the sounds they make as they move about. In effect, the store has a continuous awareness of where everything and everyone are at any moment, and movements are analysed to determine what items are being purchased. The system also relies heavily on Amazon’s cloud computing service. Eliminating retail shrinkage Shoplifting accounts for some 38 percent of shrinkage in the retail community. It appears Amazon Go would eliminate most, if not all, of those losses, which could contribute substantially to any return-on-investment evaluation when deciding whether to expand the concept to a wider audience. Customers would likely also be willing to pay a premium for the convenience of not waiting in line, and automated processes tend to lower labour costs. The retail market depends on physical security technologies to fight shoplifting, and is also embracing a variety of those technologies, especially video surveillance, to boost the level of customer service. Amazon Go is a showcase for how far technologies have come, and it also suggests other ways innovation could be used in the physical security market and beyond. By automating the checkout process, while also eliminating shoplifting and adding customer convenience, the concept of Amazon Go might just be a winner. That is, assuming customers wouldn’t rather just shop online and have goods delivered.
The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a way of preserving “privacy.” The clothing, covered with ghostly face-like designs to specifically trigger face-detection algorithms, are a backlash against the looming possibility of facial recognition being used in retail environments and for other commercial purposes. Increasingly common facial recognition technology It’s another possible obstacle to the use of a technology that has faced many challenges already. Successful implementations of facial recognition technology have been elusive over the years, especially when it comes to identifying “faces in a crowd.” Variables such as partial obstructions, movement, lighting, etc., have been a challenge to the algorithms tasked with identifying faces. Most successful face recognition systems have been those that have controlled the positioning of each face in order to maximise recognition. People walking single-file through a door, for example, provide faces one by one to make them easier to recognise. Despite the challenges, face recognition technology is becoming more common. The ability to recognises faces (and identities) is central to new marketing technologies such as automated customer service or signage that targets an individual’s buying habits. For example, face recognition is an element in Amazon Go’s recently announced automated convenience store concept. In the online world, many ofus are willing to give up alevel of privacy if we perceivea benefit tradeoff. But whatabout the physical world? Infringement on privacy? Clothing or other textiles with face-like patterns are being positioned as a way for consumers to fight back against any perceived invasions of privacy. Berlin-based artist and technologist Adam Harvey is designing the clothing to confuse face recognition software algorithms. In effect, the clothing “overloads an algorithm with what it wants, oversaturating an area with faces to divert the gaze of the computer vision algorithm,” Harvey told a recent hacking conference in Hamburg. One pattern would reportedly give a computer more than 1,200 possible facial detections. Concerns about face recognition algorithms extend beyond the ability to identify a person. Algorithms can also identify traits such as “calm” or “kind,” or demographics such as age and gender. Using such small bits of data to drive marketing efforts is problematic for many. Harvey points to the capabilities as another way that facial recognition is changing our expectations of privacy – and even more reason to fight back. Harvey’s other anti-surveillance work It’s not the first time Harvey has been involved in trying to foil facial recognition systems; he previously proposed using makeup and hairstyling to prevent machines from detecting a face. There are also some “anti-drone stealth wear” fashions on the market, made of silver-plated fabric that reflects thermal radiation to enable the wearer to avert overhead thermal surveillance. Privacy is an ongoing concern in the physical security and video surveillance market, and public opinion is evolving. In the online world, many of us are willing to give up a level of privacy if we perceive a benefit tradeoff. But what about the physical world? Face detection technology is a common feature of today’s video surveillance cameras, and facial recognition algorithms are becoming more sophisticated. Questions of privacy in the physical world have not yet evolved, and it’s unclear what benefits (if any) there are for consumers to allow machines to invade their privacy. Until those benefits become apparent, it’s not surprising there would be backlash. However, anti-surveillance clothing would have to really catch on to make any real difference, wouldn’t it?
Deliveroo, one of the world’s fastest-growing tech businesses, has chosen AEOS access control by Nedap to protect its staff across the world. Nedap’s Uk Expert channel partner, Hunter Group, completed the installation at the first site, in Dubai, and an ambitious rollout will see Hunter install AEOS at around 50 more Deliveroo sites, plus new locations, over the next 12-18 months. Deliveroo was founded in the UK and is proud to export British-born technology around the world. Its ‘Frank’ algorithm is based on powerful predictive technology that evaluates the most efficient way of distributing orders based on the location of restaurants, riders and customers. Global security platform With 650% year-on-year growth, Deliveroo’s development has been explosive and the company now has at least 200 offices across 47 countries. Staff security is paramount for Deliveroo and it wanted a global security platform and technology partners capable of keeping up with its expansion. Naturally, Deliveroo is keen to embrace new technologies and innovations too, and wanted to move forward with companies like Nedap and Hunter that have the same future-facing mentality. AEOS will enable Deliveroo to centralise security and will be able to manage its global security system AEOS will enable Deliveroo to centralise security. It will be able to manage its global security system, and closely monitor staff safety at each location, from its London headquarters. Access control reporting will, for example, show that drivers have arrived safely and CCTV footage will enable offices to be viewed from across the world. Central security policy Some Deliveroo sites are in areas where staff need more robust protection. AEOS gives the flexibility to adapt security settings and solutions according to the site, while still adhering to a central security policy. Deliveroo can, for example, choose which identifiers its staff can use at each site, and can easily change this whenever it chooses to. AEOS also scales easily – both at individual sites and across new locations. So as Deliveroo continues to grow, its security system can too. Over the coming months, AEOS will be installed at Deliveroo sites in London, Paris, Amsterdam and Brussels, with sites in Madrid, Melbourne and Singapore following soon afterwards.
HID Global, provider of trusted identity solutions, announces that the European Molecular Biology Laboratory (EMBL) in Grenoble, France has selected HID’s radio frequency identification (RFID) tags and its patented direct bonding technology for automated handling of biological samples at cryogenic temperatures of 196°C (-321° F) in liquid nitrogen. EMBL Grenoble creates high-resolution pictures and 3D atomic models of biological macromolecules using a specialised imaging process called macromolecular crystallography (MX). These images are useful for studying biological materials, developing highly efficient medicine, and fighting cancer more effectively. Limited storage density The images require molecular samples to be prepared in a crystalised form and frozen The images require molecular samples to be prepared in a crystalised form and frozen. Handling these samples is a complex task: tiny crystals must be grown, harvested, frozen on a sample holder at the tip of a tiny needle, and stored in liquid nitrogen at cryogenic temperatures and identified for further processing while remaining cool. Most current sample holders used in MX imaging offer limited storage density and poor initial crystal-positioning, which affects processing and limits the benefits of automated crystal harvesting systems. As a result, EMBL set out to design a storage and identification solution robust enough to function at extreme cold temperatures, but small enough to facilitate high precision and storage density. It also needed to support high-speed, automated handling by robots. Direct bonding technology “The HID Global technology has proven to be reliable against temperature cycling between room and liquid nitrogen temperatures, and the HID team was very supportive in helping us with our new designs,” said Florent Cipriani, Head of Instrumentation Team, EMBL Grenoble. HID’s direct bonding further allows the secure attachment of antennas to chips without the bulk of added modules Embeddable RFID tags and direct bonding technology from HID were chosen for identification in EMBL’s new sample holders due to the tags’ tiny footprint, proven track record to work in cryogenic environments, and ability to be custom designed to meet the needs of EMBL. HID’s direct bonding further allows the secure attachment of antennas to chips without the bulk of added modules, making the units the smallest HF formats available in the market that deliver uncompromised performance. Reliable sample tracking “HID Global’s proven RFID technology has been used in various cryogenic environments for years,” said Richard Aufreiter, Director Product Management, Identification Technology with HID Global. “It was a natural partnership between HID and EMBL to design a tracking system resistant to frosting and other aspects of extreme cold. Our team worked directly with EMBL engineers to ensure the best tracking system was deployed in their newly designed sample storage solution.” With HID technology, EMBL developed two new sample holders optimised for high throughput, precision, and reliable sample tracking of more than 200 thousand crystals per year. The new RFID-enabled sample holders increase throughput by allowing the crystal harvesting, cryogenic storage, and MX beamline feeding process to be fully automated using robot grippers and specifically designed RFID readers. Available memory space in the RFID tags can store additional information about the samples.
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition this week in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organisations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric high-throughput system The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility entry control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless iris authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
People and vehicle access control specialist Nortech has recently seen St James’ Market in central London update and improve access to its site using Nedap’s uPASS Target system. Supplied by Nortech, Nedap’s uPASS Target was installed by leading supplier of integrated security systems Total Support Services (Security) Ltd, which was selected to supply the robust solution for long-range identification to its recently installed security gates at the market. Total Support Services (Security) Ltd, TSS, which designs and engineers its own brand of security products and equipment, was able to use its 26 years of experience in specialised security products and services to provide the ideal security and access system that fitted the client’s needs. TSS selected the uPASS Target as it is easy to integrate with any existing access control system so users don’t need to get out of their vehicles to get into the development. Reliable and easy to install system Guy Bulmer, Director at Total Security Services commented, “We use Nortech as they are our ‘go-to’ provider for access control and vehicle identification systems. We have had a great relationship with them for nearly 20 years, ever since we were asked to install a Norpass system for some clients, and it just went from there.” The uPASS Target is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots He continued, “We certainly recommend Nortech products to others and we are very happy with the end result achieved for the client. We have our core products that we use because they are easy to install and they just work. Any issues are dealt with in a helpful and friendly way by the tech guys and we always get a reliable system at the end of it.” Ideal for access control and monitoring activities The uPASS Target is a robust solution for long-range identification of vehicles, people and rolling stock. It is ideal both for access control to gated sites and for close monitoring of traffic flow activities at industrial sites and logistic depots. Its plug-and-play features enable it to be installed in just a few simple steps, and its variety of industry-standard communication interfaces support seamless integration into any existing or new third-party systems for access control, logistic operations, security and parking. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Dayton Public Schools (DPS) covers about 53 square miles in Dayton, Ohio. The school system is comprised of 30 school buildings and special centers with approximately 15,000 students in pre-kindergarten through high school. An urban district, DPS brings innovative students and teachers together to develop productive citizens ready to serve their communities. Core to achieving their mission is ensuring first, that students arrive at their school and at their classes, on time and ready to learn. DPS had a wide variety of, and in some cases a lack of, ID system capabilities throughout the district. This made it difficult to implement standard process improvements that would speed the creation of new IDs at the beginning of each school year. Additionally, DPS needed to expedite the check-in of tardy students thus allowing them to arrive at their classes faster. For managing tardy students, the schools traditionally used manual processes with handwritten passes which were inefficient and caused unnecessary delays if multiple students came to school late. Seeking to streamline processes, the school district realised that it needed to institute a universal, mandatory student ID system that allowed them to improve student attendance across the district while enhancing the security of its students and visitors. PlascoID card-based management system PlascoID showed DPS HID’s FARGO desktop card printers and their automated student management system, PlascoTrac, as a possible solution to the challenges the school system was facingWhile attending the Ohio eTech conference in early 2011, DPS learned about PlascoID, an authorised HID Global FARGO integrator and global provider of card-based ID systems. PlascoID showed DPS HID’s FARGO desktop card printers and their automated student management system, PlascoTrac, as a possible solution to the challenges the school system was facing. Because the printers and software integrated seamlessly with eSchoolPlus, the school system’s existing Web-based student-information system, DPS selected PlascoID to help streamline its attendance processes. Genuine HID products including the DTC4500 card printer/encoder, non-technology cards and Asure ID Enterprise card personalisation software were recommended by PlascoID to support the creation of efficient, multipurpose IDs. HID Global’s Asure ID software would enable the school system to create customised student ID cards while the DTC4500 printers would allow campus officials at each school location to instantly issue all student IDs. The printer’s modular design and small footprint were also ideal features for the school environment where space is at a premium. Asure ID enterprise software Prior to the start of the 2012 school year DPS implemented the solution over the course of just two weeks, installing the PlascoTrac system with 31 DTC4500 printers and Asure ID Enterprise software so it could be used on the first day of the new academic year. With the new DTC4500 printers and Asure ID software, DPS can now: Print a high volume of cards at fast print speeds: Every year, 15,000 IDs are needed by DPS in just the first week of school. The DTC4500 meets this challenge by quickly and reliably producing large quantities of cards with high-quality images. Able to withstand the day-to-day wear and tear by students these new IDs are now also uniform in image quality, design and durability. Save money and training time: The modestly priced DTC4500 has an intuitive set up and is easy to use. Already optimised for organisations like DPS, the printer is a high-security, high-performance ID issuance system that doesn’t require large capital investments or extensive training by system operators. Prepare for future ID card needs: The DTC4500 is field upgradeable. As their student ID system changes and evolves, DPS can modify their printers to fit new requirements. Achieve multiple uses with a single software application: With Asure ID Enterprise software, DPS is able to easily design card templates, enter student data and create photo ID badges. Additionally, Asure ID’s LiveLink capability enables the schools to sync student ID badge data with attendance data in PlascoTrac, and with student records in eSchoolPLUS. PlascoTrac card ID system The newly designed DPS student ID is a white card featuring the district’s logo and mission statement With this combined solution from PlascoID and HID Global, DPS can now easily and quickly provide all students with IDs during the first week of the new school year. And when a student loses his or her badge, or is newly enrolled in school, a new ID can be created and issued that same day. The newly designed DPS student ID is a white card featuring the district’s logo and mission statement. New visual security elements include a large color photo of the student and his/her name printed in large font on the front of the card, so school personnel can easily identify individuals. Additionally, the ID now includes a barcode that is used in conjunction with the PlascoTrac system. So, when a student arrives late to school or is tardy to a class, they are scanned into PlascoTrac and a tardy pass is printed automatically. HID's Plasco ID cards With this brand-new student ID system, processing tardy students now takes 25 to 35 percent less time than before, enabling DPS students to spend more time in class while reducing the administrative burden of its staff. Some schools have even tied the new ID cards to their media centre In addition to addressing their original challenges, DPS has now found that the new HID and Plasco ID card solution gives them even greater functionality and versatility. Some schools have even tied the new ID cards to their media centre for checking out books or documenting lunches purchased in the cafeteria. Elementary schools are even exploring ways to use the IDs to encourage positive reinforcement of good behaviors. HID Global card issuance/PlascoTrac solution “We are extremely satisfied with how adaptable the solution is on a per-school basis,” said Richard Melson, director of The Office of Information Technology at Dayton Public Schools. “Initially the principals had one vision of how things were going to work and now that they have the technology in their possession, they each use it a little differently based on specific needs of their school.” In the near future, DPS expects to expand its use of the HID Global card issuance/PlascoTrac solution to keep track of visitors. Currently the district provides printed temporary ID passes, but it plans to eventually incorporate scanning of government IDs, such as a driver’s license, before granting visitors entry.
Safety is at the forefront of hospitals across the nation. According to a landmark report To Err is Human (2000) by The Institute of Medicine (IOM), between 44,000 and 98,000 patients die a year in the U.S. due to preventable medical errors including wrongful administration of medication. Beyond the cost of human life, these errors cost the healthcare industry as much as $29 million per year. This figure takes into account the expenses associated with additional care, loss of income and disability so as to reduce medication administration errors, hospitals are modifying their current medical dispensing systems in operation to prevent and eliminate these errors. Based in Portsmouth, Ohio, Southern Ohio Medical Center (SOMC) is one such hospital that is addressing this concern. A 222-bed hospital that provides emergency and surgical care, as well as a wide range of other health-care services, SOMC employs 2,200 full and part-time doctors and volunteers. SOMC has a medical staff of more than 140 board-certified or board-eligible physicians and specialists and is supported by more than 800 volunteers. WALLaroo 2000 wall station The WALLaroo 2000 wall station featured a cabinet mounted outside each patient’s room to temporarily stock the non-narcotic medications prior to dispensing One of the “Best Practices” outlined in the IOM report calls for the healthcare industry to utilise technology, such as bed side bar coding, to improve patient identification. To meet these standards, SOMC quickly modernised their process from relying heavily on a two-cart dispensing system that included laptops on wheels (LOW’s) and pharmacy carts, to a system that was more efficient and accurate. The new solution, the WALLaroo 2000 wall station, featured a cabinet mounted outside each patient’s room to temporarily stock the non-narcotic medications prior to dispensing. SOMC’s IT department was tasked with finding a way to integrate the wall stations with a state-of-the-art access control system that was equipped with an access-controlled lock and reader. By implementing this solution, SOMC has been able to strictly adhere to their patient’s rights as they pertain to medication dispensing, which includes: the right patient, the right medication, the right dose, the right time and the right route of administration. Centrally networked access control system “When we started our quest for an access-control solution, we looked for two things,” said Dennis Ward, information services and applications manager for SOMC. “First SOMC needed a solution that would be centrally networked with the current eMAR system, as well as have a main power source. Additionally, we needed to replace the magnetic strip on employee badges with a more effective technology.” Ward consulted with several companies within the security industry, including Accu-Tech, SecuriCo, Microman and HID Global, before finding the optimal solution- SecuriCo’s Securus Web software solution. The solution operates with a HID EdgeReader coupled with iCLASS 2K (37-bit) smart cards and Rutherford Controls 3513 Lock. SecurusWeb software solution SOMC project requirements indicated that both a Web-based software solution and an IP PoE Access Control solution were required" “SOMC project requirements indicated that both a Web-based software solution and an IP PoE Access Control solution were required,” said Jim Andrews, president of SecuriCo, Inc. “After Dennis and I reviewed the project requirements and discussed the design options with AccuTech and Microman, everyone agreed that the SecurusWeb software solution with a pre-configured HID EdgeReader and iCLASS 2K (37-bit) smart cards were the perfect fit for the hospital’s unique access control needs.” According to Ward, “As I conducted product research in the security information space, I noted that most available solutions were based on HID technology. This was important since the hospital was growing, and our security needs would grow, too. HID Global has a great industry reputation so it was a natural and easy decision to select the company’s solutions and OEM partner, SecuriCo, Inc.” Installing WALLaroo wall stations and HID EdgeReader Since Ward had never implemented a project like this before, he obtained samples of one of the WALLaroo wall stations, a HID EdgeReader and evaluation software from SecuriCo. Using the samples, he created a prototype that would fit all his access control needs and serve SOMC in the best possible way. Installed by Microman, these pre-programmed wall units have the SOMC specifications that Ward devised. While physical access control is delivered through the HID EdgeReader and iCLASS cards, the control of the hardware is provided through SecuriCo’s Securus Web software. The software controls which individuals are granted access to each station based upon a preset access level, which includes the day and time access is allowed. In addition, the application also records how access is added and removed. This innovative solution also enables pharmacy technicians to deliver barcoded, 24-hour scheduled, non-narcotic medications to the secured wall mounted stations. Using their authorised HID iCLASS cards, the nursing staff is then able to access and administer the medication. SecurusWeb and HID Global’s Edge IP access solutions SecurusWeb and HID Global’s Edge IP access solutions can make it easier to meet the unique and demanding needs of healthcare applications, as experienced by SOMC Thinking outside the box and using innovative products like SecurusWeb and HID Global’s Edge IP access solutions can make it easier to meet the unique and demanding needs of healthcare applications, as experienced by SOMC. Accuracy for patient medication dispensing has improved significantly thanks to the new solution. Workflow is also more efficient because the amount of time it previously took nurses to go to the medication room and retrieve new medications has been significantly reduced. Additionally, medication is secure and located where the staff expects it to be, while eliminating the need for medication carts, making the hospital hallways accessible and less cluttered. With the original installation of 73 of HID’s EdgeReaders being such a great success, SOMC ordered and installed an additional102 EdgeReaders in the hospital’s new North Tower, including 12 on the first floor Heart Care Unit (HCU), 30 on the second floor in the Surgical-Vascular Care Unit (SVCU), 30 on the third floor in the Medical-Surgical Care Unit (MSCU), and 30 more that are located on the fourth floor in the Progressive Care Unit (PCU).
Round table discussion
Ensuring privacy is often a concern for video surveillance systems, especially in situations where a system intended for “public” surveillance could somehow, perhaps inadvertently, view private areas or situations. The classic example is an apartment building whose windows are within the range of a video surveillance camera. How can you provide video surveillance without invading the privacy of the apartment dwellers? Integrators and end users often turn to technology for a solution. We asked this week’s Expert Panel Round Table: How can smart camera features (such as privacy masking and programmable pan-tilt-zoom) address concerns about privacy?
Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-world solutions that can prevent terrorist attacks? We presented the question to this week’s Expert Panel Roundtable, and received a variety of interesting responses. Specifically, we asked: How is the recent rise in terrorism impacting the physical security market (e.g., higher demand, different mix of products, etc.)? How should the physical security market respond? What solutions are needed?