Iris recognition systems
Pelco by Schneider Electric, global provider of intelligent video surveillance solutions, announced the release of the GFC Professional 4K, a video camera delivering 8 MP resolution detail for demanding video security applications with heavy foot and vehicular traffic. The GFC Professional 4K is also designed to support challenging lighting conditions that are typical in city surveillance, airports, seaports, traffic, gaming facilities, corrections, commercial, and hospitality deployments. GFC...
The ZMR6442AX-P IP dome camera from LILIN serves as a first line of defense for stores, homes, offices and hotels when monitoring suspicious activity indoors and outdoors. With its 4MP video resolution, IR LED long-distance illumination, and P-IRIS support, the ZMR6442AX-P ensures around-the-clock safety and security. The ZMR6442AX-P achieves 2688 (H) x 1520 (V) resolution or roughly thirty percent more area coverage than an 1080p HD camera to help reduce the required number of cameras installe...
Iris ID, a provider of iris recognition technology, announced its IrisAccess iCAM 7S series enrollment and system management process is now fully integrated with the latest version of the Honeywell Pro-Watch security management suite. The integration makes it more convenient for Pro-Watch users to employ the added benefits of biometric identity authentication. Pro-Watch 4.4 is the latest version of Honeywell’s popular solution for enterprise and critical infrastructure customers. The Pro-...
Boon Edam Inc., global supplier of security entrances and architectural revolving doors, is showcasing the company’s continuing advances in technology and customer support in booth #1715 at the GSX (formerly ASIS) exhibition in Las Vegas, NV from September 25-27. With the launch of their new Interactive Troubleshooting Guides for Security Entrances, a range of new partner technology integrations and the growing adoption of anti-tailgating and anti-piggybacking entrances by Fortune 50 Globa...
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, is showcasing the company’s continuing advances in technology and customer support in booth #1715 at the GSX (formerly ASIS) exhibition in Las Vegas, NV from September 25-27. With the launch of their new Interactive Troubleshooting Guides for Security Entrances, a range of new partner technology integrations and the growing adoption of anti-tailgating and anti-piggybacking entrances by Fortune 50 Glo...
Iris ID, a provider of iris recognition technology, announces its iCAM 7S series enrolment process is now fully integrated with the latest version of the Symmetry Enterprise access control software from AMAG Technology. Symmetry Enterprise is designed for large organisations with complex security requirements. It supports unlimited card readers, cardholders and clients and allows users to control security from one location. The native integration of the iCAM enrolment process allows users to se...
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced they are emphasizing the theme of tailgating in booth #1715 at the GSX (formerly ASIS) exhibition in Las Vegas, NV from September 25-27. GSX is an annual event that brings together 22,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official turnstile sponsor of the show. Access technologies are critical for granting or denying entry to secure areas within a building. However, these solutions are only effective at mitigating tailgating when coupled with security entrances. This complete solution ensures only one person enters per valid authorisation. The following solutions will be on display in Boon Edam’s booth: Preventing tailgating and intrusion Offering the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centres Tourlock 180+90: The industry’s best-selling security revolving door will feature an AMAG Symmetry card reader to demonstrate access control integration paired with the door’s uniquely high, bi-directional throughput and its ability to prevent tailgating and piggybacking without manned supervision. Circlelock: Offering the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centres. The portal will be configured to demonstrate two-factor authentication: an AMAG Symmetry card reader on the outside of the portal conducts the initial authorisation, followed by an iris scanning technology inside the portal from Iris ID called the iCAM7S Series reader, to confirm identity. Mantrap entrance with two-factor authentication Circlelock Combi: This half-portal solution is the newest entry from Boon Edam. The Combi transforms an existing swinging door into a high security mantrap entrance that prevents piggybacking. It also enables organisations to save on both space and renovation costs. In the booth, the half portal will demonstrate a two-factor authentication scenario: initial authentication using an AMAG Symmetry card reader to enter the portal, followed by facial scanning technology from StoneLock Pro to open the second door. Lifeline Speedlane Swing: The industry’s slimmest optical turnstile will feature a custom, integrated pedestal that incorporates the MorphoWave touchless fingerprint technology from IDEMIA. This solution enables high throughput with the enhanced security of rapid biometric identification, all in a stylish, cohesive design. Integrating card readers and barcode scanners The Boost is suitable for the integration of a variety of access control systems, ranging from card readers and barcode scanners to various biometric devices New! Lifeline Boost: A brand new, stylish access control pedestal designed by Boon Edam to perfectly complement the popular Lifeline optical turnstile series. The Boost is suitable for the integration of a variety of access control systems, ranging from card readers and barcode scanners to various biometric devices. BoonConnect: An IP-addressable, proprietary software system providing diagnostic and configuration tools for the Tourlock security revolving door and Circlelock mantrap portal. Users can remotely access door operations and events using devices such as a tablet, laptop or smartphone via a secured corporate network. Tailgating prize giveaway We’re celebrating our position as the market leader for security entrances, according to a recent report by IHS Markit, with a tailgating-themed prize giveaway. All visitors to GSX are invited to participate by visiting booth #1715 during show hours. Participants have the opportunity to win a variety of prizes that will help them make the most of the upcoming tailgating season: the Big Green Egg grill, a YETI cooler, StubHub tickets and much more. Winners will be selected at random after the exhibition, and an announcement will be made to all participants via email on October 5.
NEC Corporation (TSE: 6701) announced an investment in Tascent, Inc., a U.S.-based biometric system company, with the aim of accelerating the global expansion of its safety business. The amount of the investment is not disclosed. Recently, the demand for multimodal biometric identification to further bolster security is rapidly growing. Within this environment, the iris identification market is expected to experience significant growth. NEC has been developing biometric identification technologies for more than 40 years, and systems using NEC's Bio-Idiom biometrics have been introduced through more than 700 systems in 70 countries and regions around the world. Moreover, earlier this year, NEC's iris recognition was named the world's most accurate by the U.S. National Institute of Standards and Technology, which has also recently named NEC's face recognition and fingerprint recognition technologies as the most accurate. Next generation iris authentication Established in 2015, Tascent provides multimodal biometric identification systems, with particular emphasis on the iris modality. The company's technologies include optical control technology to remotely capture an accurate, high-quality iris image at high speed, and a user interface (UI) technology that smoothly guides users in support of capturing accurate biometric information. Tascent's technologies are embedded in security systems widely used at airports, government agencies and enterprises around the world. This investment and partnership will enable the two companies to jointly enhance the capacity of iris recognition This investment and partnership will enable the two companies to jointly enhance the capacity of iris recognition, using Tascent's optical control and UI technologies and NEC's advanced biometric engines and create a next generation iris authentication offering for the public safety market. Accelerating multimodal biometrics applications "In NEC's 'Mid-term Management Plan 2020', the company positions its safety business as an engine for global growth and focuses on the development of this business," said Masakazu Yamashina, executive vice president, NEC Corporation. "Moving forward, NEC aims to expand its social solution business and further boost profitability by acquiring new customers, delivery resources, core technologies and business models through collaborations and M&A, while developing its own core technologies and solutions." "Tascent is excited to partner with NEC to develop world-class identity solutions and to accelerate the adoption of multimodal biometrics in government and commercial applications. The unique combination of NEC and Tascent technologies has great potential to address today's identity challenges, making life easier and safer for people around the world," said Alastair Partington, Founder and Co-CEO of Tascent, Inc.
Princeton Identity, provider of the fastest, simplest and most secure biometric security system on the market, announced three new patents related to innovations in iris recognition technology that the company was awarded by the U.S. Patent and Trademark Office (USPTO). The new patents include: Patent 10042994 for Validation of the Right to Access an Object. Patent 10025982 for Collecting and Targeting Marketing Data and Information Based upon Iris Identification. Patent 10038691 for Authorisation of a Financial Transaction. Ensuring accurate authentication of people The new patents represent the application of Princeton Identity’s unique approach to iris authentication in three very important market areas: access, marketing, and financial transactions. Using the techniques described in these patents, Princeton Identity advances the application of iris identification and personnel authentication much more broadly than physical security and represents the anticipated adoption of these technologies in the broader marketplace. “We’re extremely excited that the USPTO has recognised Princeton Identity’s latest inventions and team of biometrics experts,” stated Mark Clifton, CEO of Princeton Identity. “With over 11 patented technologies in our portfolio and many more pending, we continue to demonstrate our commitment to creating the most advanced and accurate iris recognition-based solutions to ensure accurate and convenient authentication of people and access to assets.” Implemented in airports, universities and stadiums Quickly gaining recognition as a leader in advanced biometric security, Princeton Identity’s technology is present in the busiest international airport in the world, prominent financial institutions, major universities, sports stadiums and the largest American manufacturing company. The company has deployments within the U.S. Department of Defense, and its identification software has been integrated into over 90 million mobile devices in over 120 countries.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
Iris ID, a premier provider of iris recognition technology, announced its iCAM R100 face and iris cameras will be integrated into Mentalix, Inc.’s Fed Submit suite of live scan solutions. Fed Submit is employed by civilian and law enforcement agencies across the county, provides users with intuitive, multi-modal booking and background check systems. Mentalix, headquartered in Dallas, is an industry leader in FBI-certified identification software. Iris ID’s IrisAccess iCAM R100 cameras will now be made available with Mentalix Fed Submit live scan stations, operating alongside standard fingerprint scanners so iris information may be shared with the FBI as part of its NGI (Next Generation Identification) program. With Fed Submit it’s possible for agencies to access the FBI’s iris database, as well as create and grow their own local iris archive. Accurately capture iris data Dale Remmers, the chief technology officer of Mentalix, said the Iris ID technology was selected for its speed and accuracy in capturing iris data. He reported that jail officials can often acquire, submit and receive an FBI response to an iris query before a suspect’s booking procedure is completed. “They can know within a few minutes if the suspect arrested for public intoxication has any felony warrants in other states,” Remmers said. “We’re excited to be able to offer our law enforcement customers the Iris ID technology as an additional modality within our Fed Submit product.” The iris solution is contactless, unlike fingerprint pads which need to be wiped clean after each use R100 iris recognition technology The R100 iris recognition technology can obtain a valid identity scan from virtually any suspect. While fingerprints can be altered intentionally or worn down by jobs in industries such as agriculture, construction and manufacturing, iris patterns remain unchanged through a person’s life. The iris solution is also contactless, unlike fingerprint pads which need to be wiped clean after each use. Remmers said law enforcement clients may also use the iris scan feature of the Mentalix Fed Submit system to authenticate the identity of suspects being released from jail. Iris ID authentication Mohammed Murad, vice president global sales and business development, Iris ID, said the Mentalix partnership is another example of how Iris ID’s technology is being used to assist law enforcement officials. “Our iCAM R100 cameras add a valuable dimension to the Fed Submit kiosks” he said. “The Mentalix solution will make it easier – and faster – for local officials to know who is being booked and released from their facilities.” Iris ID technology is also being used by governments around the world for authentication at border crossings, national ID and voter registration efforts and by corporations large and small for access control and time and attendance applications.
TBS Biometrics introduces a revolutionary reader, featuring combined iris algorithm and face detection. Its distinctiveness comes from the combination of eye and face detection that makes an even more robust accuracy. The sensor captures the iris of both eyes while the face sensor is used to automatically distinguish the height of the users and adjust. All biometric devices have their advantages and limitations. Where popular face recognition still struggles is with high accuracy however, it is very intuitive and simple to use. Iris recognition extremely accurate but is still not user-friendly. 2D Eye's face detection interaction is most convenient for users, while its iris-based identification guarantees highest levels of accuracy delivered by modern technology Multi-modal identification The TBS 2D Eye overcomes limitations by combining the best of both worlds. Its face detection interaction is most convenient for users, while its iris-based identification guarantees highest levels of accuracy delivered by modern technology. For even further user comfort, the reader adjusts itself automatically to the height of users. Additionally, the 2D EYE allows multi-modal identification by PIN and RFID. The 2D Eye is part of the TBS Ecosystem and manufactured by CMITech, a leader in the biometric Iris industry. All TBS Ecosystem products comply with TBS quality standards while developed by a third-party manufacturer and fully integrated by TBS R&D within the powerful TBS Biometric subsystems (web based software/server with biometric core). It adds an additional masterpiece to one of the most complete biometric portfolios. From corporate offices to airports, government to healthcare, research centres and critical infrastructures, the TBS 2D Eye will be the right solution where security is paramount Optimal security solution With a sleek and attractive design, its screen allows for a great deal of interactivity, customisation and notably gives the opportunity for the user to see themselves during capture process, similar to facial recognition. Pilot users acclaimed the exceptionally comfortable experience as opposed to traditional iris-based technologies. This has established that the 2D Eye meets the expectations from the users for a ‘touchless’, convenient and rapid identification. From corporate offices to airports, government to healthcare, research centres and critical infrastructures, the TBS 2D Eye will be the right solution where security is paramount. With the 2D Eye, TBS is even more at the forefront of integrated biometric solutions. Two touchless biometric sensors and four different touch-based fingerprint sensor technologies, complete a compelling portfolio at the disposal of countless system integrators to provide seamless biometric solutions for access control and attendance. TBS, Secure by Nature.
Bluffton Self Help, a non-profit organisation providing food, clothing and financial assistance to low-income residents of Bluffton, S.C., has gone high tech with an Iris ID iris recognition system tracking the hours of paid staff and volunteers. An Iris ID iCAM R100 camera replaces mag stripe cards, said Tony O’Brien, president of Sourcecode LLC, a South Carolina-based software development firm. He designed the iris system, as well as a computer network and telephone system for Bluffton Self Help. Saving the cost of purchasing ID cards “When I started working with the group it was still using sign-in sheets for its patrons to receive benefits,” he said. “I helped move them to a swipe card system about seven years ago. Then last summer I suggested to the executive director we could use iris identification to eliminate the cards.” The iris-based system saved Bluffton Self Help from purchasing and printing new and replacement ID cardsAccording to O’Brien, the iris-based system saved Bluffton Self Help from purchasing and printing new and replacement ID cards for the five paid staff members and more than 250 volunteers who regularly use the system. The Iris ID system paid for itself in about five months, O’Brien said. After staff inputs a new volunteer’s data, it takes seconds to enrol the person in the system. The person stands in front of a camera which takes a picture of both eyes (irises). Software turns the photo into a digital template stored on the organisation’s computers network. The same camera is later used to identify volunteers arrive and leave in a process that takes less than two seconds. Monitoring volunteers’ working hours Kimberly Hall, executive director, Bluffton Self Help, said the volunteers, many of them senior citizens, tell her the system is easy and fun to use. “Our volunteers love it,” she said. “And with the touch of a button on our computer we can see how many hours our volunteers have worked.” With the touch of a button on our computer we can see how many hours our volunteers have worked"Hall estimated volunteers annually provide about $1.2 million worth of services. That’s important to know when the privately funded group seeks contributions from donors who often want to make sure the organisation has the manpower to ensure those in need are receiving services. Hall said patrons still use the swipe card system as many are undocumented residents and fearful of new technologies. She hopes education will change that as Iris ID’s stored digital templates cannot be reconstructed to identify a person. Accurate and easy to use systems Mohammed Murad, vice president global sales and business development, Iris ID, said the Bluffton Self Help system shows how iris recognition technology is appropriate for virtually any organisation needing identity verification for security or time and attendance. “Systems from Iris ID are affordable, accurate and easy to use,” he said. “They’re no longer just for government organisations or Fortune 500 companies. The company is excited to be a technology provider to many non-profit organisations around the world.”
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition this week in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organisations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric high-throughput system The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility entry control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless iris authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
Ask a student, or pretty much anyone, what they think about “access control” and you’ll get a shrug. Conversely, all of us are enthusiastic about security and convenience. Students across Europe are discovering SMARTair wireless access control gives them both. Adding SMARTair access control to a door involves just replacing a standard cylinder or escutcheon with a digital, smartphone- or smart-card–operated electronic lock. It’s hassle-free to make the switch to SMARTair. And with a system design focused on user experience, SMARTair takes some of the everyday pain out of student life. Wherever you fit SMARTair, it’s easy to configure access cards to enable payments in the canteen or at vending machines; for changing room locker locks; and for the photocopier or library loans. You can’t do that with a metal key. MIFARE RFID cards At Madrid’s prestigious Colegio Universitario de Estudios Financieros (CUNEF) students now open doors with smart MIFARE RFID cards instead of keys At Madrid’s prestigious Colegio Universitario de Estudios Financieros (CUNEF) students now open doors with smart MIFARE RFID cards instead of keys. CUNEF fitted escutcheons to monitor and ease access to different areas of the university for 1,600 students, without the need for expensive wired door locks. If a student loses their card, there’s no threat to campus security. A manager issues a new credential which automatically cancels the lost card — much faster than changing a lock. When Mezzino took ownership of Rialto Court — apartments for students attending Durham University and Teesside University — they replaced a mechanical master key system with SMARTair. From the company’s point of view, the high annual tenant turnover and a need for scheduled cleaning and summer shutdown were becoming difficult to manage with physical keys. Students also reaped the benefits of their new, user-friendly access system. They have the confidence no previous resident of their flat has copied a physical key. At Funway Academic Resort in Madrid, student rooms are also locked with SMARTair escutcheons. Energy-saving wall devices inside rooms regulate electricity use, and students each have their own safe locked with a SMARTair cabinet lock. The Funway gym, study rooms, games rooms, swimming pool and changing rooms, spa and staff areas are also locked with SMARTair escutcheons — and open with the same smart-card. SMARTair Openow solution The recent launch of the SMARTair Openow solution puts credentials on a mobile phoneThere’s more to come from SMARTair. The recent launch of the SMARTair Openow solution puts credentials on a mobile phone. With SMARTair and the Openow app, students can open their rooms and authorised doors with a smartphone. If you have your phone, you’re already carrying your keys. Student services or facilities managers issue virtual keys over-the-air — and can revoke them whenever they choose — so there’s no need for a key-card handover meeting, at the beginning or end of term. A time-limited virtual key arrives ahead of the first day and automatically expires when it’s time to vacate your halls. Mobile credentials Mobile credentials will be a big hit. Student life goes on inside the handset, as much as IRL (“In Real Life”, for the uninitiated). Last year’s Deloitte Mobile Consumer Survey found a fifth of 18- to 24-year-olds even check their phone for messages in the middle of the night*. From a security standpoint, phone-based credentials have another advantage. Checking our phones is “habitual”, “unconscious” and “repetitive”, according to one study**. We know very quickly if it is missing. How soon would you notice a missing plastic card, especially if you were enjoying yourself on a night out? Biometric security Plus, a virtual key on every student’s smartphone potentially provides an extra layer of biometric protection for every controlled university door Plus, a virtual key on every student’s smartphone potentially provides an extra layer of biometric protection for every controlled university door. Fingerprint, and even face and iris, scanners are commonplace on smartphones. ”Generation Z students were raised as digital natives,” says Felix Moran, SMARTair Product Manager at ASSA ABLOY. ”They expect convenience as a standard feature, not a mechanical solution used in Ancient Egypt. In Europe’s increasingly international, marketized higher education ecosystem, attracting these tech-savvy students is critical, as is keeping them satisfied with the campus experience.” SMARTair TS1000 software The complete SMARTair solution includes wireless escutcheons, cylinders, wall readers, locker locks and more; the intuitive SMARTair TS1000 software; and the enhanced new Openow app functionality. It works out the box and is easy to install — and even easier to operate.
Princeton Identity Inc., provider of the fastest, simplest and most secure biometric security systems on the market, announced that its customer, Brevillier Village, is reporting a huge increase in brand awareness resulting from publicity of its status as the nation’s first senior residential and healthcare facility to deploy iris recognition technology as part of a comprehensive physical security system. Located just outside Erie, PA, Brevillier Village has been the subject of local and international press coverage during the past year due to public fascination with its cutting-edge approach to security. The Princeton Identity IOM Access solution allows staff and residents with normal mental acuity to unlock exterior doors to exit the building by gazing into wall-mounted iris readers positioned near each exit, while restricting residents with dementia from opening the doors and leaving the building unsupervised. Two reader ‘heads’ are located at each monitored doorway – one positioned for standing residents and the other for those in wheelchairs Easy registration of iris credentials The system makes it possible for both non-dementia and dementia residents to live comfortably in the same building as part of a mixed population. Non-technical personnel at Brevillier Village can easily register new residents to the system and, if a resident begins to experience cognitive decline, his or her iris credentials can be deactivated, allowing them to remain living in the familiar surroundings of their own apartment rather than move to a fully locked facility. The Princeton Identity solution piggybacks onto the Assa-Abloy Securitron access control infrastructure that was already in place at Brevillier Village, with each iris scan logging as an ‘event’ within the access control system. Two reader ‘heads’ are located at each monitored doorway – one positioned for standing residents and the other for those in wheelchairs. These are connected to integrated control units that communicate over Ethernet cabling back to the server room. Brand awareness for Brevillier Village has skyrocketed and, in 2017, it was honoured for the first time with the region’s prestigious Erie’s Choice Award for Best Retirement Facility Better access control system than keypad Dan Desrocher, the facility’s Director of Development, says that “If there’s any question about who left the building at a given time, we can look at who had their iris scanned and then check surveillance video to make sure that they are the only person who went through the door. From a security standpoint, this is far more information than was available using the keypad system we had in place, for which everyone shared the same code.” Brevillier administration places a high value on security, regarding it not only as an operational imperative but as a point-of-differentiation in the highly competitive senior living and healthcare market. The investment in technology is paying off. Brand awareness for Brevillier Village has skyrocketed and, in 2017, it was honoured for the first time with the region’s prestigious Erie’s Choice Award for Best Retirement Facility, beating out a much larger facility that had won for the past ten years in a row. No need to remember keypad codes Mark Clifton, Princeton Identity’s CEO, says, “This project highlight some of the advantages in deploying iris recognition in healthcare and assisted-living facilities. There are no keypad codes to remember, it doesn’t require a free hand and it’s touchless, making it completely sanitary.” Brevillier’s Dan Desrocher adds, “We’re using the technology to keep people in, rather than keep people out, but we could definitely use the other way too. With an iris reader, residents would no longer have to fumble for a key fob to get into a building. The convenience factor is huge.”
Boon Edam Inc., a manufacturer of security entrances and architectural revolving doors, has announced that Georgia Southern University’s state-of-the-art Recreation Activity Center (RAC) has deployed an integrated pedestrian access solution so only members can access the facility. A Boon Edam Trilock 60 tripod turnstile is integrated with Iris ID IrisAccess solution to enable swift user verification and access with a minimum of effort for students, faculty and staff. Centre of campus life The RAC at Georgia Southern serves as the centre of campus life, welcoming over 5,000 students each day. Originally opened in 1998 with 80,000 square feet, the facility was expanded in 2006 to its present size of 215,000 square feet. The expansion achieved LEED certification, the first building to do so at Georgia Southern, which reflected the university’s culture of sustainability. Among the many amenities at the RAC are an aquatics centre with a 25-metre swimming pool, eight indoor basketball courts, group fitness studios, a rock climbing wall and an 18,000 square foot fitness centre.When students used the iris scanners in the dining halls, it took no more than 2 seconds to process their entry Iris recognition-based access control The newly renovated RAC deployed Boon Edam waist-high turnstiles and gates as a means to control access for the increased number of visitors each day under staff supervision. In 2006, the turnstiles were paired with fingerprint scanning technology to confirm the identity of each member. But in 2014, when the Iris ID IrisAccess solution was paired with tripod turnstiles at two dining centres on campus, the RAC facility managers decided to investigate integrating an eye scanner with their current access control software. “With each passing year, the size of the database would grow, leading to an increase in the time it would take to verify each member. The process slowed, taking five to 12 seconds to grant access, causing unwanted delays for our users,” said Jason Schmidt, facility coordinator at the RAC. “When students used the iris scanners in the dining halls, it took no more than 2 seconds to process their entry. Once we realised that Iris ID was the superior method for access control, we decided to upgrade our system to better meet the needs of our members.”Once members purchase a membership and are entered into our database, the system grants them seamless access to the facility" Trilock Side Gate-controlled egress Currently, as members enter the RAC in the main lobby, they can choose from two different access points. They can scan their iris at the iCAM7000S Series mounted on the turnstile, or swipe their ID at the main desk and proceed through a gate. Boon Edam Trilock Side Gates are used on the other side of the main desk for dedicated egress. “The arrangement of a turnstile paired with the iris scanner technology is extremely fast and we’re encouraging our members to use it,” said Schmidt. “Once they purchase a membership and are entered into our database, the system grants them access to the facility and it is pretty seamless.” The RAC is planning to renovate in the near future to have a total of 4 turnstiles integrated with the Iris ID IrisAccess solution. Towards multiple entrance lanes “The Iris ID and Boon Edam partnership goes back to early 2000 when the two technologies were integrated at Schipol airport in Amsterdam,” said Mohammed Murad, vice president for Iris ID. “We’re very excited to continue delivering integrated technology solutions to our customers.” “We are always concerned with who is coming in and prefer to have as many turnstiles as possible to automate the process and reduce the burden on our staff. Everyone who is registered for the iris scanner likes it; we’re looking forward to the next stage when we can have multiple entrance lanes, bringing everything up to speed,” concludes Schmidt.
Princeton Identity Inc., a provider of the fastest, simplest and most secure biometric security system on the market, announced the deployment of its Access500e identity management kiosk module within the Dubai International Airport (DXB). The Princeton Identity solution identifies DXB travelers within one to two seconds, reducing time spent in security lines and enhancing the overall travel experience. The Emirates Airlines terminals are the largest terminals within one of the world’s busiest passenger airports. Dubai saw nearly 14.9 million international visitors in 2016, and is expected to surpass 20 million visitors by 2020. There are currently about 100 Access500e products in operation across DXB’s Emirates Airlines terminals, with plans to deploy about 40 more in the near future in order to support the influx of new international tourists. The Access500e turns what used to be a slow process for travelers into a convenient, quick and more secure experience Passenger security with iris recognition “Princeton Identity and the Dubai International Airport share a goal of simplifying and speeding access to keep people and business moving, and the Access500e deployment at the DXB marks a new standard in passenger security,” said Mark Clifton, chief executive officer at Princeton Identity. “Iris recognition is most reliable form of biometric identification and the Access500e turns what used to be a slow process for travelers into a convenient, quick and more secure experience.” Access500e is a fast, high quality face and iris biometric capture device designed for integration into a variety of application solutions. At DBX, it is integrated into a new Smart Gate, commonly referred to as the ‘Eyen’ gate system, which captures biometric signatures—eliminating the need for visitors to check in with a customs agent, and saving time for passengers as well as airport staff. This helps ensure verification of all travelers entering and leaving the country, seamlessly and efficiently. Princeton Identity partnered with the tech company Emaratech in fostering the implementation of Access500e into the terminals at DBX. Access500e is a fast, high quality face and iris biometric capture device Innovative future-forward experiences “DXB has always set a high bar in terms of innovative and future-forward experiences and we applaud the leadership team’s decision to tap the power of iris recognition to further enhance both traveler satisfaction and security,” added Clifton. A newly opened Princeton Identity International office in Dubai is dedicated to ensuring the continued success and expanded implementation at DXB. The office will also serve as the hub for Princeton Identity’s Middle Eastern and African regional offices, supporting territories ranging from Northern Africa to Eastern Europe and Jordan. Princeton Identity will use this new hub to further its work with organisations in the enterprise, healthcare, financial and government sectors in the Greater Middle Eastern region. To learn more about the Access500e deployment at DXB and Princeton Identity’s comprehensive portfolio of face and iris recognition solutions for identity management, visit the company in booth C40, Hall S3 at Intersec, Jan. 21-23 in Dubai.