Iris recognition systems
The idea of touchless systems has gained new levels of prominence during the last year, driven by the global COVID-19 pandemic. Contactless systems have been part of the industry’s toolbox for decades, while technologies like facial and iris recognition are finding new uses every day. We asked this week’s Expert Panel Roundtable: Which security markets are embracing touchless, contactless systems and why?
March Networks, a global video surveillance and video-based business intelligence firm, is pleased to introduce its new VA Series IP Cameras, a comprehensive line of 2 MP and 4 MP cameras, featuring advanced encoding technology and built-in video analytics. VA Series IP cameras The VA Series IP cameras deliver a range of features for indoor and outdoor applications at a cost-effective price point. Incorporating the latest imaging sensor technology for improved colour reproduction, the cameras...
Iris ID, the globally renowned company in iris recognition technology for over 20 years, will showcase its top products for law enforcement agencies at the National Sheriffs’ Association's (NSA) annual conference and exhibition – NSA 2021 Annual Conference and Exhibition, slated to take place from June 22-24, 2021, at the Phoenix Convention Center. Iris ID will occupy booth #114 at the exhibition. NSA 2021 Annual Conference and Exhibition The annual conference is an opportunity for...
Johnson Controls, a global pioneer in smart, healthy, and sustainable buildings and architect of the Open Blue digital platforms, has released the latest version of Tyco American Dynamics victor and VideoEdge video management systems, offering accelerated deployment, more powerful analytics and optimised video management and control. Robust cybersecurity The powerful victor and Video Edge 5.7 solutions deliver on Johnson Controls' commitment to empowering customers with technology to maintain...
Along with administering vaccines, face masks have become another important way to keep one safe. In public areas like airports, hospitals, schools, offices, people are complying with mask rules. Security industries had to think of a way to ensure safety of individuals and to also keep up their business during the pandemic. And the solution was face recognition devices with mask and temperature detection features. Demand for face recognition devices has increased to 124% in the past year. Deep...
Interphone, the security systems and building technology integrator, is embracing the latest iris and facial recognition technology to meet the growing demand for touchless door entry and access control. The company has launched a range of advanced and affordable solutions available for any new build or retrofit building requirement in the commercial residential marketplace. Significance of touchless technologies “The COVID pandemic has placed hygiene, infection control, and risk mitigat...
ProdataKey (PDK), a manufacturer of the cloud access control platform built for mobile, announces the release of seamless integration with Rhombus Systems, the pioneer in cloud-based video surveillance and asset tracking systems. In joining forces, the two companies – each known for their best-in-class cloud offerings – bring to market the industry’s easiest-to-implement, easiest-to-use, comprehensive access control and AI-assisted video management solution. The integration is free to PDK dealers and available immediately. Facial recognition algorithms The PDK/Rhombus integration allows users of a Pdk io access control system to easily associate readers with Rhombus cameras, facilitating automated processes that simplifying monitoring while enhancing security. Video clips for all entry events are captured and indexed, and may be filtered and searched for easy investigation. PDK credentials, combined with Rhombus facial recognition algorithms, allow for highly accurate AI-powered entry verification that matches faces to credentials. Rhombus licence plate recognition can be tied to garage and parking access points Real-time alerts for unauthorised access, tailgating, and persons-of-interest may be sent to system administrators, speeding up response time. Rhombus licence plate recognition can be tied to the garage and parking access points, providing frictionless entry for employees while documenting visitor access. The PDK/Rhombus integrated solution requires no onsite servers and no downloaded software. Integration between the systems is accomplished in seconds via a few clicks within the software interface via phone, tablet, or web-enabled computer. Cloud-based solution Dealers may customise trigger events and automated responses to align with customers’ security objectives. The integration is fully scalable, supporting an unlimited number of PDK and Rhombus devices. Both systems offer end-to-end encryption for enterprise-grade security. Dallan Labrum, ProdataKey’s director of sales, says, “We are extremely excited about PDK’s partnership with Rhombus. Sharing a video integration with another cloud-based solution allows our dealer partners to install more product in less time, while offering their customers a more robust, effective security solution that leverages the power of video analytics. Because both platforms are communicating through the cloud, the integration delivers an exceptionally clean user experience along with a much easier integration set-up.”
Iris ID, a pioneering provider of iris recognition technology, announced the compatibility of its iCAM M300 handheld, multi-modal biometric reader and the MozaicID iCAM M300 smartcard software credential application. This application enables the mobile device to accommodate a range of Personal Identity Verification (PIV) compatible credentials including PIV Interoperable (PIV-I) and the Transportation Worker Identification Credentials (TWIC), a smartcard used by workers requiring access to secure areas of U.S. maritime facilities and vessels. Secured identity authentication The MozaicID app uses the iCAM M300’s detachable FBI-certified Sherlock fingerprint sensor from Integrated Biometrics to authenticate workers’ identities by comparing a live fingerprint to a stored template embedded in the credential. The application will also check the trust status of the presented credential. The iCAM M300 also enables mobile enrolment of workers with its embedded camera simultaneously capturing both iris and facial modes for contactless identity authentication. Authorities statement Mohammed Murad, vice president of global sales and business development, Iris ID, said compatibility with the MozaicID app adds to the versatility of the iCAM M300. “Iris ID and MozaicID have combined best of breed technologies to create an accurate and more secure means of identifying maritime employees wherever their jobs take them,” he said. “The iCAM M300 provides an unparalleled intuitive user interface, which makes the process easier for the user and operator.” Jim Parroco, chief executive officer of MozaicID said “MozaicID is dedicated to providing effective, relevant and user-friendly security solutions. We institute intuitive and innovative technology in our software with proven results. The product offering, we have with Iris ID provides an excellent security solution in response to a specific need.” Features and benefits Supports other contact or contactless Personnel Identity Verification (PIV) smartcards such as Common Access Cards (CAC) used by military, civilian and vendor employees in controlled government spaces Commercial Identity Verification (CIV), used by commercial organisations to meet federal government access control standards Comes equipped with software development kits (SDK’s) ready to deploy a wide variety of Android-based identity application Organisations requiring remote identity verification, such as the U.S. Customs and Border Patrol and law enforcement departments, use the water- and dust-resistant iCAM M300 Provides magstripe and contactless card support, as well as an MRZ reader to verify ePassports Communications protocols include NFC, Wi-Fi, Bluetooth, GPS, 4G LTE
Iris ID, the global renowned provider of iris recognition technology solutions, announced that it has begun shipping IrisTime, a new biometric time and attendance platform that offers a fully customisable and accurate solution, to meet the pioneering workforce management needs of small businesses to enterprise organisations worldwide. IrisTime IrisTime also offers a new recognition technique for authenticating employee identity that uses a fusion of iris and face recognition to increase accuracy and convenience of use. IrisTime’s open Android-based platform accommodates hundreds of current time and attendance applications while also enabling independent software vendors (ISVs) to create custom software solutions meeting specific organisational needs. The platform is shipped with a standard app, which is capable of meeting the needs of many organisations of varying size. Iris ID’s IrisTime platform is contactless, an essential consideration during the COVID-19 pandemic" “Furthermore, Iris ID’s IrisTime platform is contactless, an essential consideration during the COVID-19 pandemic,” said Mohammed Murad, Vice President, Global Sales and Business Development, Iris ID. Enhanced accuracy and convenience IrisTime biometric time and attendance platform is unaffected by employees wearing personal protective equipment (PPE), such as gloves, masks and goggles. A recent study by a federal agency showed that systems using only facial recognition technology could be up to 50% less accurate, especially when people wore masks or face coverings. “IrisTime biometric platform uses fast auto-focus to quickly and conveniently authenticate employees’ identity, at distances up to 24 inches,” said Murad, adding “Also, IrisTime’s accuracy is unsurpassed as it is the first time and attendance platform that combines identifying characteristics from both an employee’s iris and face.” Seamless integration with payroll software Murad further stated, “That accuracy, along with seamless integration with payroll software, helps the platform eliminate potential errors while calculating hours worked, as well as benefits such as disability and accrued vacation time.” Using IrisTime, employee authentication takes less than a second, a vital consideration during busy shift changes. While clocking in, the IrisTime screen displays an employee’s name, company I.D. number and photo, along with the time and date of the activity. Biometric technology authentication Biometric technology authenticates identity with no need for employees to present a card Biometric technology authenticates identity with no need for employees to present a card or remember a personal identification number to clock in or out. However, IrisTime integrates with card-based access control systems to create multi-factor authentication at mission-critical sites. The companies that are currently using Iris ID platforms for time and attendance or access control have no need to re-enroll employees in order to use IrisTime software. For any size company, IrisTime provides a high return on investment by eliminating costs associated with administering and managing punch, barcode, magnetic swipe or proximity cards and PINs. The accuracy of the biometric technology ensures the identity of an employee, eliminating the ability of employees to clock in for each other in a costly payroll fraud known as buddy punching. Iris-based authentication systems “Fraud, along with inaccurate or outdated payroll technologies, may cost a business thousands of dollars annually,” said Mohammad Murad, VP of Global Sales & Development at Iris ID. Iris ID currently provides iris-based authentication systems for the world’s top workforce management solution suppliers, such as Paychex and SimplyWork, as well as for many global enterprise customers. Murad adds, “For more than 20 years, Iris ID has been the globally renowned innovator of flexible and reliable iris authentication solutions. Now, we are revolutionising the time and attendance function with a biometric platform, which is aimed at meeting many of the unprecedented challenges facing employers today. IrisTime is the time clock for the modern workforce.”
The Security Industry Association (SIA) and SecureIDNews have selected five distinguished biometrics and security experts as the 2020 winners of the Women in Biometrics Awards – a globally recognised program co-founded by SIA and SecureIDNews and co-presented with sponsors IDEMIA, Biometric Update and the SIA Women in Security Forum. The honourees will be recognised during the 2020 SIA GovSummit, SIA’s annual government security conference, which will be hosted as a free virtual event June 1-4. On June 3 at 1 p.m. EDT, attendees will enjoy a special keynote panel session honouring the award winners – The Women in Biometrics Awards Presents the Future of Biometrics in Government Security Applications. Biometric exit solutions The Women in Biometrics Awards honour the efforts of top female experts helping drive the biometric identity and security industry. Nominees and past winners include those working for biometric companies, peripheral suppliers, system integrators, academia, government and security and IT departments at a variety of organisations in the United States and internationally. The 2020 winners of the Women in Biometrics Awards are: Jeni Best, Branch Chief, U.S. Customs and Border Protection (CBP) Jeni Best has extensive programme management experience running large-scale programmes and working with external stakeholders, exemplified in her work on CBP’s Biometric Exit Program as well as in developing and implementing Automated Passport Control and Mobile Passport Control. Leading the CBP charge in implementing biometrics at airport touchpoints, Best has operationalised CBP biometric exit solutions at 27 U.S. airports and 2 international locations. Biometric mandate For much of 2019, she served as the acting director of biometric air exit operations at CBP Best contributed to the development of CBP’s exit roll-out strategy, which leverages stakeholder engagement and partnerships to achieve CBP’s biometric mandate. For much of 2019, she served as the acting director of biometric air exit operations at CBP – often referred to as “biometric boarding.” Best has over 20 years of experience with CBP and its predecessor agencies working on issues related to immigration, travel and tourism, business transformation initiatives and biometrics. She holds a bachelor’s degree from Sam Houston State University and a master’s degree in criminal justice from Boston University. Records management systems Anne May, Biometric Support Centre Lead, Identity Operations Division, Office of Biometric Identity Management (OBIM), U.S. Department of Homeland Security (DHS) Anne May has 25 years of programme management experience in the public sector, including 17 years of experience with biometric technologies. She began her government career with the U.S. Immigration and Naturalization Service (INS), where she was the programme manager for large-scale records management systems and also served as biometrics portfolio manager, overseeing budget and system business operations for the INS biometrics programme. Specialised biometric hardware Anne has excelled in her leadership and dedication filling multiple critical roles as an irreplaceable subject matter expert May has worked at US-VISIT since its inception in 2003, managing the implementation of multi-year, multi-agency projects and responsible for the deployment of specialised biometric hardware to over 550 border patrol and immigration enforcement field sites. After over a decade of service to the OBIM, Anne has excelled in her leadership and dedication filling multiple critical roles as an irreplaceable subject matter expert in the field of biometrics. Anne is the lead manager for the DHS 24/7 Biometric Support Centre, an integral piece of the identity mission for worldwide U.S. government missions. She has also applied her expertise in support of building the next-generation DHS biometric system, Homeland Advanced Recognition Technology. Face recognition evaluation Mei Ngan, Computer Scientist, Image Group, National Institute of Standards and Technology (NIST) Mei Ngan is a scientist in the NIST Image Group, which develops standards, measurement methods and best practices for biometric technologies, promoting accuracy and interoperability and the gold standard for biometric testing and evaluation worldwide. She is an accomplished computer scientist who has produced creative and outstanding work in the fields of face morphing detection, tattoo recognition and face recognition evaluation providing the needed science and framework to underpin the successful measurement and assessment of technologies for operational viability. Face morphing detection Ngan led the NIST project supporting the Intelligence Advanced Research Projects Activity Janus programme Ngan is the project lead for the NIST Face Recognition Vendor Test (FRVT) MORPH programme – an ongoing project focused on evaluation of automated face morphing detection capabilities – and has become an integral part of the FRVT activities at NIST. In 2014, she launched the Tattoo Recognition Technology Program, the first NIST programme to provide a measurement and testing foundation to support the operational needs and applications for image-based tattoo recognition. Ngan has also led the NIST project supporting the Intelligence Advanced Research Projects Activity Janus programme, targeting the development of advanced face recognition algorithms for unconstrained images. Terrorism detection capabilities Lauren Reed, Senior Program Director for Biometric Forensics, IDEMIA National Security Solutions (NSS) In her role at IDEMIA NSS, Lauren Reed leads the deployment of large-scale multimodal biometric systems to U.S. government foreign partners, enabling them to advance their crime and terrorism detection capabilities. She has been working in biometrics and forensics for more than 20 years; prior to joining IDEMIA NSS, she was the first woman to serve as director of the U.S. Army Criminal Investigation Laboratory at the Defence Forensic Science Centre, which provides forensic and biometric laboratory services in seven scientific disciplines to the military criminal investigative agencies of U.S. Department of Defense (DOD) globally. Multi-modal biometric examination She was instrumental in standing up multi-modal biometric examination operations for the DOD Reed also previously served as the first chief of the Biometric Examination Services Branch for the Defense Forensics and Biometrics Agency in Clarksburg, West Virginia, where she was instrumental in standing up multi-modal biometric examination operations for the DOD’s Automated Biometric Identification System with expansion of services to include face and iris in addition to fingerprints. In 2012, she received the FBI Director’s Award for Exceptional Public Service for leading a latent print sharing initiative between the DOD, FBI and DHS resulting in more than 500 identifications associated with terrorist and national security cases. Reed holds a Bachelor of Science from Washington State University, a Master of Forensic Science from National University and an executive MBA degree from Kennesaw State University. Seamless airport implementation Annet Steenbergen, Co-Founder, Aruba Happy Flow Project Annet Steenbergen is a visionary Dutch national who is well respected in the U.S. and internationally as the co-founder/initiator of the Aruba Happy Flow project for the government of Aruba, the first seamless airport implementation of its kind in the world, a single-token initiative that creates a seamless flow of passenger facilitation from curb to gate through the reuse of biometrics and advanced cooperation between the public and the private sector. Steenbergen took stakeholder cooperation to a new level between the governments of Aruba and the Netherlands, KLM Airlines, the Aruba Airport Authority and the biometric vendor to provide biometric-based security while substantially enhancing the passenger experience and creating room for expansion of Happy Flow to other airlines and countries. Seamless travel solutions She holds a master’s degree from Leiden University and has also studied at University College London She has more than 20 years of international experience working in the field of border control, border management and public-private cooperation at airports, previously holding roles with the Dutch Immigration and Naturalisation Service at Schipol Airport and at headquarters in the policy department for border management. Besides her work for the government of Aruba, Steenbergen is a consultant on passenger facilitation innovation with a strong focus on seamless travel solutions, where biometrics are used as a baseline for facilitation, security and GDPR-compliant privacy, or “privacy by design.” She holds a master’s degree from Leiden University and has also studied at University College London, the University of Massachusetts at Amherst and the University of the Witwatersrand. Enhancing cutting-edge fields “Each year, the Women in Biometrics Awards recognise the best and brightest talent helping to advance biometrics technologies, which are essential to securing identities today, and the achievements of these female industry leaders are improving processes like air travel, enhancing cutting-edge fields like facial recognition and working to keep people safe,” said SIA CEO Don Erickson. “SIA applauds the 2020 honourees for their impressive dedication, innovation and leadership in this critical technology market and looks forward to honouring this outstanding group during SIA GovSummit.” Private industry technologists The 2020 class of Women in Biometrics Award winners astound me with their contributions to the security industry" “Once again, the 2020 class of Women in Biometrics Award winners astound me with their contributions to the security industry and society in general,” said Chris Corum, editor and publisher, SecureIDNews. “Their collective work keeps international borders secure, fights terrorism, aids law enforcement and makes our daily lives safer and more convenient.” SIA GovSummit – the annual government security conference hosted by SIA – brings together government security experts and private industry technologists for top-quality information sharing and education on security topics affecting federal, state and even local agencies. Facial recognition technology Attendees will hear keynote presentations from Rep. Dina Titus (D-Nev.); Brian Harrell, Assistant Director for Infrastructure Security at DHS’ Cybersecurity Infrastructure Security Agency (CISA); Daryle Hernandez, Chief of the Interagency Security Committee within DHS CISA; and Kathleen McGuiness, Auditor of Accounts for the State of Delaware. Additionally, GovSummit 2020 will feature specialised sessions on cutting-edge topics such as emerging applications of facial recognition technology, trends in federal procurement of security products and services, drones and counter-UAS technology, fever detection and camera technology in pandemic recovery and using robotics in security operations.
In 2020, with the continuous spread of the COVID-19 pandemic, millions of people have been infected around the globe. Touchless security devices In these uncertain times, with the ever-increasing demand for touchless security devices, Anviz, a globally renowned biometric security solutions firm, offers the latest touchless solutions - iris and face recognition access control terminals. The company’s latest iris and face recognition access control terminals help reassure business owners, wrestling with the uncertainties of running their businesses, during this very challenging period. Iris S2000 and FacePass 7 Series access control terminals Anviz’s Iris (S2000) and FacePass (FacePass 7 Series) recognition terminals provide 100% touchless user authentication for a variety of applications, spanning access control, time & attendance, visitor management, etc. These terminals help: Detect if a person requesting access has an acceptable face mask or glasses. The face recognition readers have body temperature detection that will instantly alert and deny access to anyone trying to enter with body temperature above the acceptable range. Efficient body temperature screening Anviz’s iris and face recognition terminals feature a very powerful embedded dual core processor Denying access to anyone with high body temperature prevents healthy individuals from being infected, especially in shipping facilities, airports, schools, commercial office buildings, pharmacies, grocery stores, and so on. Anviz’s iris and face recognition terminals are a combination of a very powerful embedded dual core processor and the latest AI deep learning algorithm for high-level accuracy and quick matching-speed. Featuring integrated thermal sensor The capture time of the company’s touchless access control devices is less than 1 second and the matching speed is less than 0.5 second and its body temperature detection is accurate to within +/- 0.3 degrees Fahrenheit when a person stands within 20 inches of its integrated thermal sensor. Anviz successfully launched 3 models of its touchless access control series.
UNIONCOMMUNITY has newly developed its iris recognition terminals (UBio-X Iris) that can recognise IRIS at a distance of 50cm. Sales are expected to increase this year with the launch of contactless new products such as face recognition devices. Amid the on-going COVID-19 crisis, the demand for the non-contact biometric method is growing popular and biometric recognition solutions firm, UNIONCOMMUNITY has announced to launch an iris recognition system on the 12th of May, 2020. UBio-X Iris, iris recognition system UNIONCOMMUNITY's iris recognition system "UBio-X Iris" is equipped with an auto tilting function, which automatically finds iris at a distance of up to 50 cm and quickly authenticates it. It is expected that it will be spotlighted in medical facilities, airports, and commercial facilities where there is a high risk of infection due to the large floating population by eliminating the rejection of the iris scanner. Multimodal iris and fingerprint recognition In particular, security and convenience have been further strengthened with the "multimodal type" product, which enables not only iris authentication but also the multi-modal authentication of iris and fingerprints, to differentiate it from existing companies’ products. It is also equipped with a high-performance iris recognition algorithm that enables 20,000 iris authentications within a second. Contactless biometric recognition solutions UNIONCOMMUNITY expects a significant increase in sales with the launch of the iris recognition system this year As the demand for contactless biometric recognition has expanded in the global market, UNIONCOMMUNITY expects a significant increase in sales with the launch of the iris recognition system this year. There has been a steady request for iris products in major exporting areas such as the Middle East Region. Unlike facial recognition, the introduction of an iris recognition system is accelerating, focusing on public institutions and others, given that recognition can be accurate and fast even if using hijab. Rising demand for iris-recognition products In addition, in case of iris distinction, even twins are also knowledgeable and even after plastic surgery, there is no problem with authentication. UNIONCOMMUNITY is planning to speed up the release of iris-recognition products, which were scheduled to be released in the second half of this year, and strengthen its promotion. Biometric recognition systems Shin Yo-sik (Yoshik Shin), CEO of UNIONCOMMUNITY, said, "Based on our know-how that has been developing and selling biometric recognition systems for the past 20 years, we have established an integrated biometric recognition system that encompasses iris, face, and fingerprints as of this year.” Shin Yo-sik adds, “We will expand our demand for non-contact products around the world and plan to increase sales by strengthening non-face-face-face-face biometric products and security solutions."
Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualise and share the multiple data sources needed in an SOC today. Security Operation Centre (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualisation platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analysed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualisation. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centres of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualisation and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Centre, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organisation’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favour of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centres, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. Hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centres. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organisations with physical and cyber security needs.
Recently contacted by your credit card company because of a data breach or were you a victim of identity theft? Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction? Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknesses but due to the global COVID-19 pandemic, touchless is highly preferred. Any company claiming their technology is best for all applications is likely being disingenuous. The key is to first prove a biometric is required, and once decided, the following five steps will help select the best biometric modality and supplier. Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknessesBiometrics can provide a mechanism to tackle these issues head-on by moving from what you know (password) and have (ID card) to who you are (your biometric), which dramatically increases the level of security while also being user-friendly. But how is the best biometric modality selected for an upcoming product? User interaction Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as well as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Biometric storage Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as Due to the global COVID-19 pandemic, touchless is highly preferredwell as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Cost and security Start by selecting which product lines will use the biometric and establishing the desired price point(s). Decide how the biometric will fit into the product and get bulk pricing to understand unit costs at volume. Software is typically handled as a license fee and often negotiable. The production cost per unit decreases as volumes increase. Choose the biometric modality that best meets functional and security requirements while hitting the targeted price. The biometric security level required depends on the assets being protected and the matching usage model. A 1:1 model, such as a cellphone, may be fine with a low-security biometric application. However, in a 1:N model, such as airport security, requires a more secure biometric such as iris. To select the best biometric for the product, compare each company's false acceptance rate (FAR) and false rejection rate (FRR). FAR indicates the biometrics ability to keep intruders out, while FRR indicates the biometrics ability to allow enrolled users in. Ensure that all biometric companies being considered can provide this information at a minimum. It is better to get each company's detection error trade-off (DET) curve, which shows how FAR and FRR vary relative to each other. Criminal activity Hackers and criminals are always trying to break technology, including biometrics. Be certain each technology has robust presentation attack detection (PAD), which ideally is third-party certified. Understand what if any personally identifiable information (PII) needs to be captured, and decide how the PII will be handled, including who will manage the data (i.e., your company, the biometric supplier or another third party). Be certain that whoever controls the PII uses the latest encryption standards and employs techniques to secure this data in memory, crossing the network and in the biometric database. Understanding the European GDPR Compliance standards if applicable will also be important. Supplier consideration Each supplier being considered should be evaluated throughout the POC testing process. Ensure the supplier is trustworthy, provides good customer support and meets its commitments. Evaluate the supplier's engineering capability and support model to ensure it can support any desired design changes and support your Be certain each technology has robust presentation attack detection (PAD)engineers to deliver the best functioning product. Selecting the best biometric for your exact use case will take some time and effort, but it has the potential to grow your business and delight your customers. Do not shortchange the process and go with the cheapest solution without doing some research. As the saying goes, you get what you pay for.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance to stop secret surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating facial recognition technology Although the facial recognition aspects of the ordinance have been the most publicised, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilising an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes biometrics, RFID scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport security not part of ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding privacy of citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance technology policy Banning use of facial recognition just when its capability is being realised is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realised is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple colour and infrared cameras that can detect facial features and confirm an identity. Real-time 3D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System helps in tailgating mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy enrolment and deployment Enrolment in the system is easy. Companies can deploy a separate enrolment station, or any reader can be used for enrolment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrolment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting intent from positioning of eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large, well-known companies and the government. “When big disasters happen, people begin rethinking what they need to protect against,” says Dick Fordham, Director of Marketing and Strategy, Recovery Point. “We try to imagine the worst that can happen, and put in place adequate measures to provide the security in those areas.” Recovery Point is a national provider of integrated business continuity and disaster recovery systems. The company stores copies of its customers’ critical enterprise data on its servers in multiple locations. Recovery Point enables customers to bring their systems and networks back up and let employees continue working despite any damage from the disaster. “We’re not a big company – about 150 employees – but we can service the biggest clients because we provide a high degree of personalised service,” says Fordham. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape Client data storage and backup Recovery Point’s flagship facility is located on a 17-acre private campus in Germantown, Maryland; about 30 miles northwest of Washington, D.C. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape in high-end, secure vaults. There are also two 100-seat work areas where displaced workers from customer companies can continue to perform their duties – one in Gaithersburg and another one in Kenosha, Wisconsin. Recovery Point is also a tenant in a data centre in Mt. Prospect, Illinois, providing an additional, redundant location to store data in case of a disaster. Recovery Point offers cloud backup strategies to handle data from major computer systems used by large companies; whether it’s mainframe computers, AIX operating systems or iSeries. In addition to providing recovery services in case of a disaster, the company works with companies daily to test and maintain their systems and to provide proof-of-concept demonstrations. Concentric circles of security Security is a large part of the services Recovery Point provides. The company leverages the most secure approaches and technologies to ensure that customers’ data is protected, including the familiar “concentric circles of security” approach familiar to most security practitioners. At the centre of the circle is the data of customer companies, what Fordham calls ‘the crown jewels.’ Recovery Point uses a combination of cyber, network and physical security to protect a customer’s data assets. “If their data is gone or corrupted, their business is gone or corrupted,” says Fordham. Location of the data centre(s) is the first stage of protecting the backup data. Recovery Point is located outside urban areas, away from likely terrorist threats, in an area that is not prone to hurricane or tornado activity. The ‘geographically stable’ area is above the 100-year floodplain. At the perimeter, there is no signage identifying the company or its mission. An anti-ram barrier topped with a 10-foot personnel security fence encircles the campus. At the gate, visitors must be validated remotely or by authorised badge and security code. Inside the perimeter, there are hydraulic anti-vehicle barriers that can resist a 30-tonne truck going 50 miles per hour. Bollards at four-foot intervals keep vehicles away from the building. Visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass Inside, visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass. Badges allow access only to the specific areas a visitor needs, whether it is the location where their data is stored, temporary work areas, meeting rooms or overnight sleeping quarters. Two-factor authentication includes iris-scan, fingerprint and voice recognition biometrics. Data security process Independent certification, including auditing of processes and physical boundaries around the data, meets standards such as the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorisation Management Program (FedRAMP). The network and power must also be stable and Recovery Point has Uptime Institute Tier 3 certification, which includes redundant, switchable systems. There is an A side and B side to each system; if one side is ‘down’ for maintenance or a malfunction, the other side is fully functional to ensure uninterrupted service. “Customers have already had one disaster,” says Fordham. “We make it as painless as possible for them not to worry about their data, to make them feel secure. In a disaster there are other things to worry about, such as their home and families. We want security you can see and security you can feel.”
Merrion Vaults, an Ireland-based provider of safe deposit boxes, has selected biometric identity verification technology from Iris ID. Merrion Vaults rents safe deposit boxes, like those found at banks, but with a significant difference, customer identities are authenticated through highly accurate iris readers, in order to enhance security. Private safe deposit boxes Merrion Vaults operates private safe deposit boxes in Glasgow and Edinburgh, in Scotland, Nottingham, Liverpool and Newcastle, in England and Dublin, in Ireland. Seamus Fahy, Director, Merrion Vaults, said the iris readers are replacing fingerprint recognition systems for authenticating customer identity. Fahy believes the choice of contactless iris readers was well timed, with the ongoing COVID-19 pandemic. Seamus Fahy stated, “The initial customer reaction to the Iris ID readers has been excellent. The customers love it.” Fingerprint readers It’s a simple, easy process for them to swipe an access card and then look into the reader with nothing to touch" He adds, “It’s a simple, easy process for them to swipe an access card and then look into the reader with nothing to touch. The entire process takes a few seconds to complete. Using the fingerprint reader, customers would forget which finger they registered with or would press too hard or too lightly on the reader. If they couldn’t get access, we’d have to check their names and passwords, and then re-register them. It was a hassle.” According to Fahy, the Iris ID readers are part of a tight security plan that includes video surveillance, access control, turnstiles, intrusion alarms and panic buttons, as well as seismic and water sensors. Employees monitor cameras at each facility and in a system-wide control room in Dublin, Ireland. Iris recognition system Mohammed Murad, Vice President of Iris ID feels the iris recognition system allows rapid and highly accurate authentication of Merrion Vaults customers, due to each person’s unique iris patterns. Mohammed Murad said, “The accuracy, speed and convenience of the Iris ID system are critical for a business that identifies its customers using biometrics. Our system also provides another critical layer of security, ensuring only Merrion customers gain access to the vault. No two people, including identical twins, have the same iris patterns.” Iris iCAM7S system readers The Iris iCAM7S system readers provide a mirror interface with colour-alignment indicators guiding customers through the authentication process while capturing iris images at distances of up to 15 inches. Fahy adds that many banks in the United Kingdom are discontinuing safe deposit box service, creating an opportunity for private vendors to fill the gap. Merrion Vaults plans to open new facilities in Belfast, Northern Ireland, Reading and Bristol, England and Barcelona, Spain in 2021. Longer-term plans include locations in cities across the U.S. Merrion Vaults partners with Aditech, which uses dial-in capabilities to remotely configure and set up the system and test it with Merrion Vault’s IT department.
Asian Banker magazine recently selected Qatar National Bank for having the “Best Biometrics Initiative, Application or Program in Qatar” for its use of iris recognition systems from Iris ID in some QNB branch ATMs. The bank is the one of the largest financial institution in the Middle East and Africa, with branches, subsidiaries and associate companies in 31 countries on three continents. Biometric Eyes (IRIS) Scan ATM program The deployment of QNB’s Biometric Eyes (IRIS) Scan ATM program, a first-of-its-type in Qatar, is part of the bank’s commitment to innovative solutions to deliver premium services to customers in a safe, fast and convenient way. Mohammed Murad, Vice President, Global Sales and Business Development, Iris ID, congratulated QNB on the award. “QNB should be applauded for staking out a futuristic, leadership position when it comes to improving the security, convenience and safety of its customers as they access their accounts via bank ATMs” he said. “The ease and speed of our contactless iris-based recognition system makes it ideal for use in the financial industry. Our contactless systems have taken on added importance with the worldwide spread of the COVID-19 virus.” Iris ID authentication systems The bank launched its use of the Iris ID biometric solution in ATMs in late 2016. The system enables QNB customers to access their accounts at ATMs without the need of a bank card or PIN. To use the Iris ID solution the bank’s customers, participate in a one-time registration at a QNB branch office. The two-minute process involves taking a digital photo of the iris, which is converted into a small template stored in a secure database. At the ATM, customers need only a second to look into a built-in reader and have their iris pattern confirmed. In addition to the QNB deployment, Iris ID authentication systems are currently used worldwide for access control, time and attendance, national ID programs, border crossings, voter registration and many other applications.
Iris ID, a global provider of iris recognition technology, has partnered with Africa’s leading manufacturing conglomerate, Dangote Group, to provide a time and attendance solution for more than 30,000 employees working at Dangote Cement manufacturing plants in five countries. The Dangote Group is a Nigerian multinational industrial conglomerate, founded by Aliko Dangote. It is the largest conglomerate in West Africa and one of the largest on the African continent. The group employs about 35,000 people, generating revenue in excess of US$4.1 billion in 2017. Contactless facial recognition system Prasanna Burri, group chief Information officer, Dangote, Group, said the company wanted a biometric solution that provided greater accuracy than a facial recognition system previously used at the company’s cement manufacturing plants in Nigeria, Ethiopia, Senegal, Sierra Leone and Congo. The new system also had to be contactless to reduce the chances of spreading colds, flu and other diseases. The Iris ID readers provide us with a secure time and attendance solution" “Iris-based technology is not only contactless and more accurate but also faster than our previous system,” he said. “The Iris ID readers provide us with a secure time and attendance solution, deployed in Dangote Group’s public cloud that integrates seamlessly with the enterprise resource planning system at our Nigerian headquarters.” Early success Burri said the system’s early success has Dangote considering expanding it to more of its African operations. Mohammed Murad, vice president global sales and business development, Iris ID, said the iris-based solution was ideal for use in the Dangote cement manufacturing operations. “Our contactless readers work well in a dusty environment and are unaffected by employees wearing safety glasses and other protective gear,” he said. “Dangote is the largest indigenous industrial conglomerate in sub-Saharan Africa, helping to drive the continent’s growth. We’re happy to play a part.” Time and attendance system Initial installation of the time and attendance system was completed by Maxut Consulting Ltd. Of Lagos, Nigeria. Iris ID technology is used in several African nations providing identity authentication for national ID, voter registration and other public and private programs.
Princeton Identity Inc., provider of the fastest, simplest and most secure biometric security systems on the market, announced that Alabama’s Auburn University has updated and expanded the biometric identity system it uses to secure areas within its athletic facilities. Princeton Identity’s new IDS software and Access200 iris readers allow student athletes, coaches and other affiliated team members enrolled in the system to unlock the doors to team locker rooms by glancing at small reader panels mounted outside each entrance. As athletes and coaches rarely carry personal items with them onto the field, the Princeton Identity system eliminates the need for access control cards, fobs, or PIN codes, which can be difficult to manually enter when carrying equipment. It also increases security. Biometric credentials make it impossible for students to share cards or codes with others, while the system’s convenience factor reduces the desire for students to leave doors propped open for easier access. Integration with OnGuard access control system The new IDS software is browser based, providing greater flexibility to school administrators responsible for enrolling students and managing the systemThe new IDS software is browser based, providing greater flexibility to school administrators responsible for enrolling students and managing the system. The system’s Access200e enrolment camera is a stand-alone unit that can be plugged into any network jack without need for special software or drivers, allowing enrolment to occur from any web-enabled device, including tablets and laptops. Permissions are handled through an integration with the University’s Lenel OnGuard access control system. When students leave a team or graduate, their permissions are turned off. However, as iris signatures remain stable over time, if students or staff return to the program – even years later – there is no need for re-enrolment. Their permissions are simply reactivated. System configuration, management and monitoring of the IDS system is handled through a web-based dashboard that provides Auburn’s IT staff with access to all devices, which are spread across multiple buildings on campus. Faster processing and superior software interface The new platform offers faster processing, a superior software interface, more features and greater flexibilityThe installation of new Princeton Identity hardware and software are an upgrade to the University’s legacy Princeton Identity system, which was installed in 2011. Since that time, the system has required almost no maintenance. The new platform offers faster processing, a superior software interface, more features and greater flexibility. Older readers will still be supported, allowing the University to preserve the value of earlier investments. Jeff Steele, Associate Director of Facilities and Operations, says “Reaction to the PI system has been overwhelmingly positive. When we give campus tours to prospective students and their parents, the moms and dads are most impressed with it – especially if they are parents of a female student-athlete. They can see that it’s a much stronger system than key or card access.” Jeff Kohler, Business Development Director at Princeton Identity, says “We are honoured to have Auburn University as a long-term partner and customer. Their adoption of Princeton Identity’s technology demonstrates a team committed to offering both security and convenience to its student-athletes and staff members.”
Bluffton Self Help, a non-profit organisation providing food, clothing and financial assistance to low-income residents of Bluffton, S.C., has gone high tech with an Iris ID iris recognition system tracking the hours of paid staff and volunteers. An Iris ID iCAM R100 camera replaces mag stripe cards, said Tony O’Brien, president of Sourcecode LLC, a South Carolina-based software development firm. He designed the iris system, as well as a computer network and telephone system for Bluffton Self Help. Saving the cost of purchasing ID cards “When I started working with the group it was still using sign-in sheets for its patrons to receive benefits,” he said. “I helped move them to a swipe card system about seven years ago. Then last summer I suggested to the executive director we could use iris identification to eliminate the cards.” The iris-based system saved Bluffton Self Help from purchasing and printing new and replacement ID cardsAccording to O’Brien, the iris-based system saved Bluffton Self Help from purchasing and printing new and replacement ID cards for the five paid staff members and more than 250 volunteers who regularly use the system. The Iris ID system paid for itself in about five months, O’Brien said. After staff inputs a new volunteer’s data, it takes seconds to enrol the person in the system. The person stands in front of a camera which takes a picture of both eyes (irises). Software turns the photo into a digital template stored on the organisation’s computers network. The same camera is later used to identify volunteers arrive and leave in a process that takes less than two seconds. Monitoring volunteers’ working hours Kimberly Hall, executive director, Bluffton Self Help, said the volunteers, many of them senior citizens, tell her the system is easy and fun to use. “Our volunteers love it,” she said. “And with the touch of a button on our computer we can see how many hours our volunteers have worked.” With the touch of a button on our computer we can see how many hours our volunteers have worked"Hall estimated volunteers annually provide about $1.2 million worth of services. That’s important to know when the privately funded group seeks contributions from donors who often want to make sure the organisation has the manpower to ensure those in need are receiving services. Hall said patrons still use the swipe card system as many are undocumented residents and fearful of new technologies. She hopes education will change that as Iris ID’s stored digital templates cannot be reconstructed to identify a person. Accurate and easy to use systems Mohammed Murad, vice president global sales and business development, Iris ID, said the Bluffton Self Help system shows how iris recognition technology is appropriate for virtually any organisation needing identity verification for security or time and attendance. “Systems from Iris ID are affordable, accurate and easy to use,” he said. “They’re no longer just for government organisations or Fortune 500 companies. The company is excited to be a technology provider to many non-profit organisations around the world.”
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition this week in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organisations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric high-throughput system The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility entry control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless iris authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
Round table discussion
A shift toward touchless devices during the coronavirus pandemic has been a boon to the biometrics sector. Another factor in the recent increase in use of biometrics is lower prices, which are a symptom of a maturing market and of new technology capabilities. Increasingly, integration of biometrics with access control and other security systems is expanding use cases and sales numbers. For additional insights, we asked this week’s Expert Panel Roundtable: What are the new trends and opportunities with biometrics (facial, fingerprint, iris and/or voice)?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-world solutions that can prevent terrorist attacks? We presented the question to this week’s Expert Panel Roundtable, and received a variety of interesting responses. Specifically, we asked: How is the recent rise in terrorism impacting the physical security market (e.g., higher demand, different mix of products, etc.)? How should the physical security market respond? What solutions are needed?