Iris recognition systems
Iris ID, a global provider of iris recognition technology, announced its award-winning multimode iCAM M300 handheld biometric platform now offers gateless access control, time and attendance and employee mustering for both commercial and government markets. The new functions are possible with embedded XPressEntry software from Telaeris, a provider of real-time personnel tracking solutions. Also using Iris ID’s Iris Access EAC software, the iCAM M300 continues to provide an ideal portable...
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance to stop secret surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the exces...
Globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has announced that it has now shipped 1 billion fingerprint sensors worldwide. The Swedish-based biometrics specialist company has played a central role in bringing smartphone fingerprint sensors to the mass-market. Having led major advancements to the technology, Fingerprints was responsible for driving the first integration of fingerprint touch sensors into an Android handset back in 2014, with its high-tech fingerprint...
emaratech, a technology and management consulting company which is part of the Investment Corporation Dubai (ICD), is capitalising on its strong participation in the 2019 edition of Airport Show to showcase its collection of cutting-edge technology products, with the key highlight being the Smart Corridor, a first of its kind in the world product that is helping authorities in effective border control and ensuring seamless passenger experience at airports. As the pressure to effectively handle...
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple colour and infrared cameras that can detect facial features and confirm an identity. Real-time 3D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a r...
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced they are emphasising tailgating mitigation through integrated technologies in booth #8037 at the ISC West exhibition in Las Vegas, NV from April 10-12. ISC West is the largest security trade show in the United States, bringing together 30,000 security professionals for its 3-day event. Boon Edam is also the official turnstile sponsor of the show. Tailgating mitigation through integrated solution...
Open Options, global provider of open platform access control solutions, will showcase their DNA Fusion access control platform and its powerful components at ISC West 2019 in Las Vegas. DNA Fusion platform Considered the largest security industry trade show in North America, ISC West hosts over 30,000 security professionals and showcases a wide range of products and solutions from hundreds of industry manufacturers. ISC West attendees are invited to visit Open Options at booth #2103 to experience the latest features in the DNA Fusion platform, including FlexAPI, Open Options’ application programming interface, OpenDX database exchange software, and DNA Fusion’s Mobile and Web applications. Attendees will also be able to learn more about DNA Fusion’s numerous partnerships and integrated solutions with industry leaders such as Milestone, Allegion, ASSA ABLOY, Traka, and many more. IT-centric access control solutions We’re excited that ISC West 2019 will be our platform to announce the latest additions to our extensive partnership portfolio" “Our ability to provide the most IT-centric access control solution on the market is enhanced by unified partnerships and integrations with other leaders in the security industry, and we’re excited that ISC West 2019 will be our platform to announce the latest additions to our extensive partnership portfolio,” said Open Options’ vice president of sales and business development, Ben Vestal. “Each new integration adds robust functionality that enhances the DNA Fusion user experience and provides even more opportunities to supply our customers with a best-of-breed solution.” Product display Some of Open Options’ products and technology integrations that will be on display at ISC West 2019 include: NSC-200 IP-based door module Von Duprin RU/RM wireless exit device Farpointe Conekt Bluetooth reader eyeLock iris reader New destination control integrations Traka key and asset management integration Vingtor-Stentofon AlphaCom substation ASSA ABLOY Aperio Hub and lock Schlage LE series wireless mortise lock ISONAS Pure IP RC-04 reader-controller
Princeton Identity Inc., the identity management company, announced the launch of its new IOM Access600e iris and face biometric capture device, a premium level unit designed for high volume enrolment and fast, convenient identification in high security, high throughput applications. The Access600e replaces the company’s Access500e model, offering superior performance, significantly lower pricing, and a sleek, updated form factor that allows it to fit easily on tight table counters. The unit can comfortably process subjects with a wide range of heights, requiring them to simply glance at the device screen for a collection. Both face and iris can be processed in under 2 seconds. The 600e model features a fully contained lighting source, ensuring consistently high-quality capture of face and iris. Integration with passport scanners The Access600e integrates with passport scanners, fingerprint capture, badge readers and other sensorsThe Access600e integrates with passport scanners, fingerprint capture, badge readers and other sensors. This makes for a complete solution and streamlined enrolment that’s ideal for use at immigration checkpoints, secure military bases, and secure facilities with a large number of employees or contractors. Its ability to support large populations with high accuracy and throughput also makes it well-suited for arenas, cruise ships, theme parks and other commercial venues. The unit operates seamlessly with Princeton Identity’s Identity Management Platform and the IOM Access Control Product Suite, allowing for direct system enrolment. A web service interface enables integration into third party platforms with complex applications. Optional tri-modal enrolment is possible through integration with an external fingerprint capture device. Multi-modal biometric identity solutions The Access600e eliminates the traditional tug-of-war between convenience and security"Bob McKee, Princeton Identity’s VP, Sales and Marketing, says, “Princeton Identity’s multi-modal biometric identity solutions are the gold standard in accuracy while providing subjects with a fast and seamless experience.” Molly Levy, Product Manager says, “The Access600e completely eliminates the traditional tug-of-war between convenience and security, even in the most demanding, high-volume environments. Plus, with the Acces600e, we’ve been able to lower the price for such premium performance.” The IOM Access600e will be introduced at ISC West in Las Vegas, April 10-12.
Princeton Identity Inc., the identity management company, announces the new IOM Access200w iris recognition reader, an environmentally sealed and impact resistant model designed for use outdoors as part of the company’s IOM Access200 biometric identity product family. The IOM Access200w is the first outdoor solution of its kind, which when integrated with access control platforms, allows customers to unlock exterior building doors without removing gloves or reaching in pockets to find access cards while delivering the superior security of iris recognition authentication. External card readers The IOM Access200w features an easily configurable PIN pad, integrates with external card readers, and provides immediate feedback to users with face capture. The reader is suitable for use in heat, cold, humidity, direct sunlight and low light conditions. The IOM Access200w processes subjects almost as quickly as the blink of an eye With its patented technology, the IOM Access200w processes subjects almost as quickly as the blink of an eye. Ideal for a wide range of applications, including college and corporate campuses, critical infrastructures, correctional facilities, airports, data centers and more, the IOM Access200 system’s distributed architecture allows users to network any number and combination of indoor and outdoor readers throughout a facility or multi-site environments. Securing internal spaces “Princeton Identity is pleased to be first to market with a biometric identity solution that offers the convenience, speed and security of iris recognition for use on building exteriors. Outdoor entryways are often the first areas of concern when designing a security program, and now our customers can leverage the use of this golden biometric on these exterior locations as well as for securing internal spaces,” said Bob McKee, Princeton Identity’s VP of Sales and Marketing. “With the addition of our new IOM Access200w reader, Princeton Identity offers a true end-to-end identity management system that’s unparalleled in its accuracy, security, convenience and flexibility, and an ideal enhancement to any facility’s access control and physical security solutions.” The IOM Access200w will be introduced at ISC West in Las Vegas, April 10-12. See it at the Princeton Identity booth 7079.
Iris ID, global provider of iris recognition technology, and GenKey, a trusted provider of biometric identification solutions, has announced the integration of iris recognition cameras and matching engine into GenKey’s biometric ID platform, to provide an all-in-one solution for various biometric registration and verification initiatives. Advanced security and privacy Iris ID iCAM TD100 and iCAM T10 cameras and IrisAccelerator matching engine have been integrated into GenKey’s ID solutions. GenKey’s ID platform has helped many governments and organisations to improve inclusivity, reduce fraud and improve time and cost efficiencies. IrisID, the world’s most deployed iris recognition platform, provides advanced security and privacy, which further enhances GenKey’s ID platform. “GenKey’s ID platform is being used to identify and verify millions of people in several countries worldwide,” said Arnd Langguth, chief operating officer, GenKey. “We are experts in fingerprint biometrics, but our ID platform has been designed for multi-modality. Our customers expect proven, secure, high performance, that is why we choose IrisID. IrisID’s IrisAccelerator will plug-in seamlessly into our ID platform.” Iris ID biometrics authentication systems The integration into Genkey’s ID platform now offers full deduplication on both modalities" The Iris ID technology provides a fast, accurate and non-contact method of capturing citizens’ biometrics, identifying people and detecting duplicates. Iris ID authentication systems are used worldwide for access control, time and attendance checks, national ID programs, border crossings, voter registration, and many other applications. The company’s solutions are currently being used by public and private organisations across Africa and on five other continents. Mohammed Murad, vice president of global sales and business development, Iris ID said the company’s technology is a natural fit with GenKey. Integration with GenKey biometrics ID platform “Our cameras are unaffected by dirt, grease, gloves, facial hair and other factors that can limit the quality of registration and identity verification of other biometric systems.” he said. “In addition to its speed and accuracy, our software has been proven to be highly effective for deduplication – the elimination of multiple registrations by the same person. The integration into Genkey’s ID platform now offers full deduplication on both modalities.” GenKey’s ID platform is designed for capturing biographic and biometric data of individuals in small to large-scale registrations and ensuring that each subject stored is unique. Besides its standard registration, verification and reporting modules, the software has customised modules for biometric voter verification, election management and biometric member verification for healthcare, and other use cases.
Iris ID, a global provider of iris recognition technology, announced its iCAM 7S series has been certified by the Bureau of Indian Standards (BIS) under license number R-41110639, the national standards-setting body for India. The recently mandatory BIS certification attests to the safety, quality and reliability of electronic, medical, construction and other many other commercial and consumer products. The iCAM 7S series and other company products are extensively used by India’s Unique Identification Authority as part of the country’s national identity program. Registrations, known as Aadhaar numbers, are used for Indians to apply for a passport, obtain a driver’s license, receive social services and many other daily activities. More than 1 billion citizens are enrolled in the program. Used for access control, time and attendance Once a product has passed BIS certification, manufacturers may use the agency’s mark on products used in IndiaMohammed Murad, vice president global sales and business development, Iris ID, said the BIS certification is similar to Underwriters Laboratories (UL) standards found throughout the world and the CE mark used in Europe. “We’re pleased to have received BIS certification as India is a very important market for Iris ID,” he said. “Our products are used not only by government agencies, but also by many commercial organisations.” Once a product has passed BIS certification, manufacturers may use the agency’s mark on products used in India. Iris ID authentication systems are currently used worldwide for access control, time and attendance, national ID programs, border crossings, voter registration and many other applications.
As a provider of facial recognition and other biometric, as well as information and communications technologies, NEC Corporation welcomes greater industry collaboration and effective discussion for the future of facial recognition technology and business. As a point of background, NEC produces face, iris, fingerprint, palm print, finger vein, voice and ear acoustic recognition technologies, and has over 700 biometric recognition installations in over 70 countries around the world. In recent weeks, the company has seen renewed calls for government regulation and discussions about how they as an industry can build a foundation of responsibility to protect people against discrimination, invasions of privacy and violations of human rights. NEC Corporation welcomes this debate as they believe it will lead to solutions that can make our world a better place. Furthermore, they are eager to move the discussions forward. Identifying travellers using facial recognition The Department of Homeland Security is using facial recognition technology at more than a dozen airports to positively identify travellers As more companies come forward to add their voices to this dialogue, Takashi Niino, President and CEO, NEC Corporation, believes the company will start to see new and different roles that these technologies can play in protecting and improving our global communities. In the United States, for example, the Department of Homeland Security is today using facial recognition technology at more than a dozen airports to positively identify travellers entering and exiting the United States. Three days after the technology was introduced at Dulles International Airport, an imposter was stopped using a fake document. As recently as late November, the lead architect of this system from U.S. Customs and Border Protection (CBP) reported that it had identified at least 36 imposters so far. Additionally, the first curb-to-gate biometric experience in the U.S. just launched at a major international airport terminal to a positive customer response, potentially changing the future of travel. Protecting society and securing borders NEC, therefore, supports various governments' considerations for reasonable policy, setting privacy standards for personal information and preventing unlawful discrimination related to this technology. Businesses, consumers, and the government should work together to help balance the need for privacy with the benefits of protecting our society, securing our borders and providing consumer convenience without the fear of negative consequences. NEC has a decade-long leadership position and pedigree where NIST evaluations of our facial recognition technologies are concernedAccuracy is vitally important to the effectiveness of biometric technologies. NEC is committed to the National Institute of Standards and Technology (NIST) and their evaluations. NEC has a nearly decade-long leadership position and pedigree where NIST evaluations of our facial recognition technologies are concerned, and you can read more about it on our global website. Digital Trust Business Strategy Division In addition, NEC has established a ‘Digital Trust Business Strategy Division’ to create and promote a strategy based on ‘Human Rights by Design’, considering the impact of the adoption of artificial intelligence (AI) on society and the utilisation of biometric information on human rights and privacy. NEC seeks an adoption path for these technologies that is in line with the worldwide principals of freedom, justice, rights to privacy, transparency and continuous improvement. NEC strongly believes that facial recognition can add significant value to our lives.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
Throughout the UK there are many examples of smart city transformation, with key industries including transport, energy, water and waste becoming increasingly ‘smart’. A smart city is a one that uses information and communication technologies to increase operational efficiency, share information with the public and improve both the quality of government services and resident welfare. Smart access is an important step forward in providing technologically advanced security management and access solutions to support the ambitions of smart cities and their respectively smart industries. Explaining smart access If we used the standard definition of smart, it would be to use technology to monitor, control and manage access, but the technology must be adapted to both the physical and management characteristics of smart cities. Smart access is an important step forward in providing advanced security management and access solutions to support the ambitions of smart cities For example, it would not make sense to install an iris biometric sensor at an isolated water storage tank, which is out in the open and may not even have electrical power. Nor would a permissions management system work, one that does not let you update permissions simply and easily and cannot be customised. With high volumes of people entering and exiting different areas of the city, it is important to be able to trace who has been where, when and for how long. Advanced software suites can provide access to all operations performed by users, including a complete audit trail. This information is often used by business owners or managers for audits, improvements or compliance. When initiating a new access control system it is important that the supplier and customer work together to understand: Who can enter a secure area Where in the building each individual has access to When an individual can enter a secure area How an individual will gain access to a secure area This information can be crucial in the event of a security breach, enabling investigators to find out who was the last known key holder in the building and what their movements were whilst there. Installing an electronic lock does not require electrical power or batteries, much less a connection to send information Modernising locks and keys Installing an electronic lock does not require electrical power or batteries, much less a connection to send information, which means that it can be installed on any door as you would a mechanical lock without maintenance requirements. Permissions are stored within an intelligent key. If you have authorisation for that lock, it will open. If you don’t, you won’t be allowed to enter and all of the activity carried out by the key will be recorded. You can update permissions from a computer or using an app on a mobile phone at the time of access, which will update the key's permissions via Bluetooth. This allows shortened validity periods, constrains movements to be in line with company access policy and removes travel and fixed authoriser costs. This then delivers increased flexibility and higher levels of security. Remote access control utilities Access rights can be set at any time and on any day, and if required can allow access on just one specific occasion Using an app improves access control by updating access rights in real time with the Bluetooth key. It also provides notification of lost keys, joint management of access schedules, protection of isolated workers and much more. Combined with new technological solutions, an app allows contextual information to be sent, such as on-site presence, duration of an operation, authorisations and reporting of anomalies. Access rights can be set at any time and on any day, and if required can allow access on just one specific occasion, for example to repair a failure. Access can be restricted to enable entry only during working hours, for example. Permissions can be granted for the amount of time required, which means that if permission is requested to access a site using a mobile app, the company should be able to access it, for example, in the next five minutes. Once this time has passed, the permission expires and, if a key is lost or it is stolen, they will not be able to access the site. The rules for granting permissions are infinite and easily customisable, and the system is very efficient when they are applied; as a result, the system is flexible and adapted to suit company processes and infrastructures. Using an app improves access control by updating access rights in real time with the Bluetooth key Finding applications to create solutions In many cases, companies themselves find new applications for the solution, such as the need to obtain access using two different keys simultaneously to prevent a lone worker from accessing a dangerous area. The software that manages access makes it smart. It can be used from a web-based access manager or through personalised software that is integrated within a company's existing software solution, to automatically include information, such as the employee's contractual status, occupational risk prevention and the existence of work orders. In some companies, the access management system will help to further improve service levels by integrating it with the customer information system, allowing to link it for instance with alarms managers, intrusion managers or HR processes. With over one million access points currently secured worldwide, this simple and flexible solution will play a strategic role in the future of security.
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centres, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrolment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labour. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrolment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity authentication In common access control systems, access is authorised either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organisations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customisation of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large, well-known companies and the government. “When big disasters happen, people begin rethinking what they need to protect against,” says Dick Fordham, Director of Marketing and Strategy, Recovery Point. “We try to imagine the worst that can happen, and put in place adequate measures to provide the security in those areas.” Recovery Point is a national provider of integrated business continuity and disaster recovery systems. The company stores copies of its customers’ critical enterprise data on its servers in multiple locations. Recovery Point enables customers to bring their systems and networks back up and let employees continue working despite any damage from the disaster. “We’re not a big company – about 150 employees – but we can service the biggest clients because we provide a high degree of personalised service,” says Fordham. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape Client data storage and backup Recovery Point’s flagship facility is located on a 17-acre private campus in Germantown, Maryland; about 30 miles northwest of Washington, D.C. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape in high-end, secure vaults. There are also two 100-seat work areas where displaced workers from customer companies can continue to perform their duties – one in Gaithersburg and another one in Kenosha, Wisconsin. Recovery Point is also a tenant in a data centre in Mt. Prospect, Illinois, providing an additional, redundant location to store data in case of a disaster. Recovery Point offers cloud backup strategies to handle data from major computer systems used by large companies; whether it’s mainframe computers, AIX operating systems or iSeries. In addition to providing recovery services in case of a disaster, the company works with companies daily to test and maintain their systems and to provide proof-of-concept demonstrations. Concentric circles of security Security is a large part of the services Recovery Point provides. The company leverages the most secure approaches and technologies to ensure that customers’ data is protected, including the familiar “concentric circles of security” approach familiar to most security practitioners. At the centre of the circle is the data of customer companies, what Fordham calls ‘the crown jewels.’ Recovery Point uses a combination of cyber, network and physical security to protect a customer’s data assets. “If their data is gone or corrupted, their business is gone or corrupted,” says Fordham. Location of the data centre(s) is the first stage of protecting the backup data. Recovery Point is located outside urban areas, away from likely terrorist threats, in an area that is not prone to hurricane or tornado activity. The ‘geographically stable’ area is above the 100-year floodplain. At the perimeter, there is no signage identifying the company or its mission. An anti-ram barrier topped with a 10-foot personnel security fence encircles the campus. At the gate, visitors must be validated remotely or by authorised badge and security code. Inside the perimeter, there are hydraulic anti-vehicle barriers that can resist a 30-tonne truck going 50 miles per hour. Bollards at four-foot intervals keep vehicles away from the building. Visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass Inside, visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass. Badges allow access only to the specific areas a visitor needs, whether it is the location where their data is stored, temporary work areas, meeting rooms or overnight sleeping quarters. Two-factor authentication includes iris-scan, fingerprint and voice recognition biometrics. Data security process Independent certification, including auditing of processes and physical boundaries around the data, meets standards such as the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorisation Management Program (FedRAMP). The network and power must also be stable and Recovery Point has Uptime Institute Tier 3 certification, which includes redundant, switchable systems. There is an A side and B side to each system; if one side is ‘down’ for maintenance or a malfunction, the other side is fully functional to ensure uninterrupted service. “Customers have already had one disaster,” says Fordham. “We make it as painless as possible for them not to worry about their data, to make them feel secure. In a disaster there are other things to worry about, such as their home and families. We want security you can see and security you can feel.”
Might the future of video surveillance include the use of intelligent contact lenses that incorporate tiny built-in cameras that can record video at the blink of an eye? It seems a little far-fetched, but it’s definitely an idea that’s on the drawing board. Three tech giants – Google, Samsung and Sony – have all sought to patent designs for intelligent contact lenses that include built-in CMOS camera sensors that record video, follow a person’s gaze and are controlled by blinking and eye movements. Security applications for intelligent contact lenses The uses for such technology are numerous, and some of them relate directly to security. In one sense, intelligent contact lenses are another “wearable” technology – a more discreet variation of the failed Google Glass, a wearable computer that resembles a pair of glasses. Much like Google Glass, the intelligent contact lenses would combine computing power with image capture and recording. Digital zoom could enable a security officer to see images from farther distances, and image stabilisation could offset excessive eye movement Our security market presents numerous ways such technology could be useful. A security officer wearing the contact lens could capture video of everything he sees, for example, and could see better with the help of thermal night vision or other video features. Digital zoom could enable a security officer to see images from farther distances, autofocus could make images clearer, and image stabilisation could offset excessive eye movement. Video analytics alerts could prompt an officer to act, or face recognition software could instantly identify a criminal in a crowded room. An early warning could spot a hazard before it is recognised by the human brain. Or a security officer could review previously recorded video, projected straight into his or her eye. How would an eye-based system operate? Controlling the eye-based video system would involve a user interface based on conscious blinking. A deliberate blink last minutely longer than an unconscious blink, but a computer can tell the difference and interpret the longer blink as a signal while ignoring the shorter. Tiny built-in piezoelectric sensors can measure differences in acceleration, temperature, pressure and/or force, enabling interpretation of eye movements. Sony’s patent includes the ability to store video, while the other proposed contact lenses would send video to an external storage mechanism (or perhaps a video management system [VMS]?) using an embedded antenna. Problems to address There are obviously still issues to be addressed before such technology goes mainstream. For example, how do you power the device wirelessly? One possibility is to use electromagnetic induction, in which a modest electrical current is created by forcing a conductor through a magnetic field. Most of us are too busy implementing today’s technologies to give much thought to what’s coming in the future. To be sure, there are aspects of smart phones and today’s other technologies that are still working their way into our collective system roadmaps. And there are other technology innovations – maybe not as futuristic – on the horizon that will impact how we work to make the world a safer place. Even so, it’s interesting to consider the possibilities of the future, whether it’s driverless cars or a cure for cancer. And futuristic contact lenses may be coming sooner than you think – they have been on the drawing board for several years, and the first patent applications go back at least to 2012. That’s a long time ago, given the fast pace of technology development in 2016.
Iris recognition has been used as a biometric for access control applications for many years, but we have heard a lot more lately about fingerprint scans. However, iris recognition has many advantages over fingerprints and other biometrics, and the technology has come a long way. Mark Clifton, vice president of the Products and Services Division of SRI International, calls the iris a “protected” biometric, typically not injured and unlikely to be contaminated as fingers or hands might be. The iris is also a more complex biometric, providing around 250 points of identification (versus 13 or so in a fingerprint). Accuracy is therefore better: The rate of false positives is about 1 in 1.4 million for a single iris scan; the likelihood shrinks to 1 in 1.4 trillion if both eyes are scanned and identified. In contrast, there might be a false positive fingerprint scan once in 100,000 scans. (Clifton emphasizes that all numbers are approximates.) SRI International highlighted iris recognition at ASIS 2014, featuring the IOM PassPort SL, a commercially available biometric product that enables customers to integrate face capture and dual-capture iris recognition directly into existing building/facility turnstiles, infrastructures or entrances at high-traffic locations such as corporate lobbies, airports, sporting events and security checkpoints. The dual-modality system provides a good face image and good eye images for each subject, thus providing additional certainty. The “Iris on the Move” (IOM) capability was developed three or four years ago at SRI and has matured from a product line of small systems that control access on the side of a door to high-throughput systems that can now identify 30 people per minute, walking through a door in full stride without stopping to find an ID card. What differentiates SRI’s technology is the ability to identify irises from a distance and on the move, with no need to look directly into a device, outdoors or indoors, and not depending on variables of lighting. High-resolution cameras used in SRI’s systems provide anywhere from 80 pixels across the iris to hundreds of pixels As someone walks through the system, the camera instantaneously finds the face and eyes, provides illumination, captures the irises, recognises them, and opens a gate or door. The system uses a near-infrared light source that is invisible. There is no limit to database size, and SRI has systems in the field currently that can recognise a single iris against a database of 6 to 7 million. “As long as your eyes are open and we can see your irises, we can process them,” says Clifton. Using a high-throughput system is more expensive, but a return on investment (ROI) is easy because higher throughput decreases the number of gates required, says Clifton. Enrolment in the system might involve a self-service kiosk, where a user would input name and other information then push a button to capture a face and iris image. There is also a handheld enrolment system. High-resolution cameras used in SRI’s systems provide anywhere from 80 pixels across the iris to hundreds of pixels, depending on the product and the distance away it operates – some are at 18 inches, some at a meter and some at 3 meters (about 10 feet). Markets for iris recognition products include access control and time and attendance, and the next generation of products will likely deal with consumer applications in the home. As the price of iris recognition capabilities drop, they will also become more common in financial transactions. "As long as your eyes are open and we can see your irises, we can process them" Applications include use of a handheld iris recognition system for time and attendance. A large construction company uses the system at 34 different construction sites with 18,000 employees. The system reduced payroll fraud by 10 percent. It can also verify the identification of people working in the field and confirm their eligibility, licensing, etc. Used in conjunction with card-based systems, an iris recognition system can address the problem of lost or forgotten cards. If there are thousands of people using their badges for access control, for example, it is likely that 200 or 300 each day might forgot or lose their badges. Using an iris recognition kiosk to furnish those forgetful employees with temporary badges could eliminate the need for one or two guard positions to fulfil that function. Iris recognition can be used to replace card access control in applications where the card system might be circumvented. For example, Auburn University in Alabama uses “Iris on the Move” to restrict access to its athletic facility, eliminating the need for keys or access cards. One still hears privacy concerns related to capturing biometric information, especially in the United States. However, people are often willing to give up “privacy” if there is an advantage, such as convenience. “When you think about the amount of personal information people give up [on social media], they shouldn’t worry about someone having their face or iris,” Clifton comments. The rest of the world is much more accepting of biometrics. The systems are used commonly around the world – whether to manage entitlement programs in India or for voter ID in Brazil. Iris recognition systems can even be used in cultures where women wear burqas or other garments that cover their faces. For example, SRI has a system installed at a woman’s university in Saudi Arabia. SRI International is primarily a research and development organisation and has been behind recent technology advancements in several markets, including Apple’s Siri (conversational interface), the DaVinci surgical robot, and Nuance (voice recognition). The company’s roots (and focus on optics and video) go back to the old RCA Laboratories in Princeton, N.J. Clifton works in the Products and Services Division, which pushes technology out of the lab to create actual products.
Iris ID, a global provider of iris recognition technology, has partnered with Africa’s leading manufacturing conglomerate, Dangote Group, to provide a time and attendance solution for more than 30,000 employees working at Dangote Cement manufacturing plants in five countries. The Dangote Group is a Nigerian multinational industrial conglomerate, founded by Aliko Dangote. It is the largest conglomerate in West Africa and one of the largest on the African continent. The group employs about 35,000 people, generating revenue in excess of US$4.1 billion in 2017. Contactless facial recognition system Prasanna Burri, group chief Information officer, Dangote, Group, said the company wanted a biometric solution that provided greater accuracy than a facial recognition system previously used at the company’s cement manufacturing plants in Nigeria, Ethiopia, Senegal, Sierra Leone and Congo. The new system also had to be contactless to reduce the chances of spreading colds, flu and other diseases. The Iris ID readers provide us with a secure time and attendance solution" “Iris-based technology is not only contactless and more accurate but also faster than our previous system,” he said. “The Iris ID readers provide us with a secure time and attendance solution, deployed in Dangote Group’s public cloud that integrates seamlessly with the enterprise resource planning system at our Nigerian headquarters.” Early success Burri said the system’s early success has Dangote considering expanding it to more of its African operations. Mohammed Murad, vice president global sales and business development, Iris ID, said the iris-based solution was ideal for use in the Dangote cement manufacturing operations. “Our contactless readers work well in a dusty environment and are unaffected by employees wearing safety glasses and other protective gear,” he said. “Dangote is the largest indigenous industrial conglomerate in sub-Saharan Africa, helping to drive the continent’s growth. We’re happy to play a part.” Time and attendance system Initial installation of the time and attendance system was completed by Maxut Consulting Ltd. Of Lagos, Nigeria. Iris ID technology is used in several African nations providing identity authentication for national ID, voter registration and other public and private programs.
Princeton Identity Inc., provider of the fastest, simplest and most secure biometric security systems on the market, announced that Alabama’s Auburn University has updated and expanded the biometric identity system it uses to secure areas within its athletic facilities. Princeton Identity’s new IDS software and Access200 iris readers allow student athletes, coaches and other affiliated team members enrolled in the system to unlock the doors to team locker rooms by glancing at small reader panels mounted outside each entrance. As athletes and coaches rarely carry personal items with them onto the field, the Princeton Identity system eliminates the need for access control cards, fobs, or PIN codes, which can be difficult to manually enter when carrying equipment. It also increases security. Biometric credentials make it impossible for students to share cards or codes with others, while the system’s convenience factor reduces the desire for students to leave doors propped open for easier access. Integration with OnGuard access control system The new IDS software is browser based, providing greater flexibility to school administrators responsible for enrolling students and managing the systemThe new IDS software is browser based, providing greater flexibility to school administrators responsible for enrolling students and managing the system. The system’s Access200e enrolment camera is a stand-alone unit that can be plugged into any network jack without need for special software or drivers, allowing enrolment to occur from any web-enabled device, including tablets and laptops. Permissions are handled through an integration with the University’s Lenel OnGuard access control system. When students leave a team or graduate, their permissions are turned off. However, as iris signatures remain stable over time, if students or staff return to the program – even years later – there is no need for re-enrolment. Their permissions are simply reactivated. System configuration, management and monitoring of the IDS system is handled through a web-based dashboard that provides Auburn’s IT staff with access to all devices, which are spread across multiple buildings on campus. Faster processing and superior software interface The new platform offers faster processing, a superior software interface, more features and greater flexibilityThe installation of new Princeton Identity hardware and software are an upgrade to the University’s legacy Princeton Identity system, which was installed in 2011. Since that time, the system has required almost no maintenance. The new platform offers faster processing, a superior software interface, more features and greater flexibility. Older readers will still be supported, allowing the University to preserve the value of earlier investments. Jeff Steele, Associate Director of Facilities and Operations, says “Reaction to the PI system has been overwhelmingly positive. When we give campus tours to prospective students and their parents, the moms and dads are most impressed with it – especially if they are parents of a female student-athlete. They can see that it’s a much stronger system than key or card access.” Jeff Kohler, Business Development Director at Princeton Identity, says “We are honoured to have Auburn University as a long-term partner and customer. Their adoption of Princeton Identity’s technology demonstrates a team committed to offering both security and convenience to its student-athletes and staff members.”
Bluffton Self Help, a non-profit organisation providing food, clothing and financial assistance to low-income residents of Bluffton, S.C., has gone high tech with an Iris ID iris recognition system tracking the hours of paid staff and volunteers. An Iris ID iCAM R100 camera replaces mag stripe cards, said Tony O’Brien, president of Sourcecode LLC, a South Carolina-based software development firm. He designed the iris system, as well as a computer network and telephone system for Bluffton Self Help. Saving the cost of purchasing ID cards “When I started working with the group it was still using sign-in sheets for its patrons to receive benefits,” he said. “I helped move them to a swipe card system about seven years ago. Then last summer I suggested to the executive director we could use iris identification to eliminate the cards.” The iris-based system saved Bluffton Self Help from purchasing and printing new and replacement ID cardsAccording to O’Brien, the iris-based system saved Bluffton Self Help from purchasing and printing new and replacement ID cards for the five paid staff members and more than 250 volunteers who regularly use the system. The Iris ID system paid for itself in about five months, O’Brien said. After staff inputs a new volunteer’s data, it takes seconds to enrol the person in the system. The person stands in front of a camera which takes a picture of both eyes (irises). Software turns the photo into a digital template stored on the organisation’s computers network. The same camera is later used to identify volunteers arrive and leave in a process that takes less than two seconds. Monitoring volunteers’ working hours Kimberly Hall, executive director, Bluffton Self Help, said the volunteers, many of them senior citizens, tell her the system is easy and fun to use. “Our volunteers love it,” she said. “And with the touch of a button on our computer we can see how many hours our volunteers have worked.” With the touch of a button on our computer we can see how many hours our volunteers have worked"Hall estimated volunteers annually provide about $1.2 million worth of services. That’s important to know when the privately funded group seeks contributions from donors who often want to make sure the organisation has the manpower to ensure those in need are receiving services. Hall said patrons still use the swipe card system as many are undocumented residents and fearful of new technologies. She hopes education will change that as Iris ID’s stored digital templates cannot be reconstructed to identify a person. Accurate and easy to use systems Mohammed Murad, vice president global sales and business development, Iris ID, said the Bluffton Self Help system shows how iris recognition technology is appropriate for virtually any organisation needing identity verification for security or time and attendance. “Systems from Iris ID are affordable, accurate and easy to use,” he said. “They’re no longer just for government organisations or Fortune 500 companies. The company is excited to be a technology provider to many non-profit organisations around the world.”
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition this week in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organisations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric high-throughput system The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility entry control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless iris authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
Ask a student, or pretty much anyone, what they think about “access control” and you’ll get a shrug. Conversely, all of us are enthusiastic about security and convenience. Students across Europe are discovering SMARTair wireless access control gives them both. Adding SMARTair access control to a door involves just replacing a standard cylinder or escutcheon with a digital, smartphone- or smart-card–operated electronic lock. It’s hassle-free to make the switch to SMARTair. And with a system design focused on user experience, SMARTair takes some of the everyday pain out of student life. Wherever you fit SMARTair, it’s easy to configure access cards to enable payments in the canteen or at vending machines; for changing room locker locks; and for the photocopier or library loans. You can’t do that with a metal key. MIFARE RFID cards At Madrid’s prestigious Colegio Universitario de Estudios Financieros (CUNEF) students now open doors with smart MIFARE RFID cards instead of keys At Madrid’s prestigious Colegio Universitario de Estudios Financieros (CUNEF) students now open doors with smart MIFARE RFID cards instead of keys. CUNEF fitted escutcheons to monitor and ease access to different areas of the university for 1,600 students, without the need for expensive wired door locks. If a student loses their card, there’s no threat to campus security. A manager issues a new credential which automatically cancels the lost card — much faster than changing a lock. When Mezzino took ownership of Rialto Court — apartments for students attending Durham University and Teesside University — they replaced a mechanical master key system with SMARTair. From the company’s point of view, the high annual tenant turnover and a need for scheduled cleaning and summer shutdown were becoming difficult to manage with physical keys. Students also reaped the benefits of their new, user-friendly access system. They have the confidence no previous resident of their flat has copied a physical key. At Funway Academic Resort in Madrid, student rooms are also locked with SMARTair escutcheons. Energy-saving wall devices inside rooms regulate electricity use, and students each have their own safe locked with a SMARTair cabinet lock. The Funway gym, study rooms, games rooms, swimming pool and changing rooms, spa and staff areas are also locked with SMARTair escutcheons — and open with the same smart-card. SMARTair Openow solution The recent launch of the SMARTair Openow solution puts credentials on a mobile phoneThere’s more to come from SMARTair. The recent launch of the SMARTair Openow solution puts credentials on a mobile phone. With SMARTair and the Openow app, students can open their rooms and authorised doors with a smartphone. If you have your phone, you’re already carrying your keys. Student services or facilities managers issue virtual keys over-the-air — and can revoke them whenever they choose — so there’s no need for a key-card handover meeting, at the beginning or end of term. A time-limited virtual key arrives ahead of the first day and automatically expires when it’s time to vacate your halls. Mobile credentials Mobile credentials will be a big hit. Student life goes on inside the handset, as much as IRL (“In Real Life”, for the uninitiated). Last year’s Deloitte Mobile Consumer Survey found a fifth of 18- to 24-year-olds even check their phone for messages in the middle of the night*. From a security standpoint, phone-based credentials have another advantage. Checking our phones is “habitual”, “unconscious” and “repetitive”, according to one study**. We know very quickly if it is missing. How soon would you notice a missing plastic card, especially if you were enjoying yourself on a night out? Biometric security Plus, a virtual key on every student’s smartphone potentially provides an extra layer of biometric protection for every controlled university door Plus, a virtual key on every student’s smartphone potentially provides an extra layer of biometric protection for every controlled university door. Fingerprint, and even face and iris, scanners are commonplace on smartphones. ”Generation Z students were raised as digital natives,” says Felix Moran, SMARTair Product Manager at ASSA ABLOY. ”They expect convenience as a standard feature, not a mechanical solution used in Ancient Egypt. In Europe’s increasingly international, marketized higher education ecosystem, attracting these tech-savvy students is critical, as is keeping them satisfied with the campus experience.” SMARTair TS1000 software The complete SMARTair solution includes wireless escutcheons, cylinders, wall readers, locker locks and more; the intuitive SMARTair TS1000 software; and the enhanced new Openow app functionality. It works out the box and is easy to install — and even easier to operate.
Princeton Identity Inc., provider of the fastest, simplest and most secure biometric security systems on the market, announced that its customer, Brevillier Village, is reporting a huge increase in brand awareness resulting from publicity of its status as the nation’s first senior residential and healthcare facility to deploy iris recognition technology as part of a comprehensive physical security system. Located just outside Erie, PA, Brevillier Village has been the subject of local and international press coverage during the past year due to public fascination with its cutting-edge approach to security. The Princeton Identity IOM Access solution allows staff and residents with normal mental acuity to unlock exterior doors to exit the building by gazing into wall-mounted iris readers positioned near each exit, while restricting residents with dementia from opening the doors and leaving the building unsupervised. Two reader ‘heads’ are located at each monitored doorway – one positioned for standing residents and the other for those in wheelchairs Easy registration of iris credentials The system makes it possible for both non-dementia and dementia residents to live comfortably in the same building as part of a mixed population. Non-technical personnel at Brevillier Village can easily register new residents to the system and, if a resident begins to experience cognitive decline, his or her iris credentials can be deactivated, allowing them to remain living in the familiar surroundings of their own apartment rather than move to a fully locked facility. The Princeton Identity solution piggybacks onto the Assa-Abloy Securitron access control infrastructure that was already in place at Brevillier Village, with each iris scan logging as an ‘event’ within the access control system. Two reader ‘heads’ are located at each monitored doorway – one positioned for standing residents and the other for those in wheelchairs. These are connected to integrated control units that communicate over Ethernet cabling back to the server room. Brand awareness for Brevillier Village has skyrocketed and, in 2017, it was honoured for the first time with the region’s prestigious Erie’s Choice Award for Best Retirement Facility Better access control system than keypad Dan Desrocher, the facility’s Director of Development, says that “If there’s any question about who left the building at a given time, we can look at who had their iris scanned and then check surveillance video to make sure that they are the only person who went through the door. From a security standpoint, this is far more information than was available using the keypad system we had in place, for which everyone shared the same code.” Brevillier administration places a high value on security, regarding it not only as an operational imperative but as a point-of-differentiation in the highly competitive senior living and healthcare market. The investment in technology is paying off. Brand awareness for Brevillier Village has skyrocketed and, in 2017, it was honoured for the first time with the region’s prestigious Erie’s Choice Award for Best Retirement Facility, beating out a much larger facility that had won for the past ten years in a row. No need to remember keypad codes Mark Clifton, Princeton Identity’s CEO, says, “This project highlight some of the advantages in deploying iris recognition in healthcare and assisted-living facilities. There are no keypad codes to remember, it doesn’t require a free hand and it’s touchless, making it completely sanitary.” Brevillier’s Dan Desrocher adds, “We’re using the technology to keep people in, rather than keep people out, but we could definitely use the other way too. With an iris reader, residents would no longer have to fumble for a key fob to get into a building. The convenience factor is huge.”
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-world solutions that can prevent terrorist attacks? We presented the question to this week’s Expert Panel Roundtable, and received a variety of interesting responses. Specifically, we asked: How is the recent rise in terrorism impacting the physical security market (e.g., higher demand, different mix of products, etc.)? How should the physical security market respond? What solutions are needed?
The general public often has misconceptions about security systems. How should security industry experts educate the general public to better understand security systems and their capabilities? As security industry professionals, our panellists are more than used to explaining security systems to customers and other members of the general public. As experts in the field, it is their prerogative to help set the records straight when it comes to what people understand about security systems. Sometimes people expect security systems to be able to do more than they actually can, or think that they infringe on our privacy when they don't in reality. Having a better and clearer understanding of security systems is important not only on an organisational level from an end-user's perspective, but also for the general public - everyone has the right to know what measures are in place to ensure their safety and that these particular measures are not infringing on their privacy. We asked our panellists how security systems are misunderstood by the public in their experience, what unrealistic expectations they find that people have, and what they think security industry professionals can do to educate the public.