Near Field Communication
FIME launches its new Smartspy+ solution to support the adoption of contact and contactless transaction technologies for payments, transport and access control. Enhanced portability and performance allow product developers and system integrators to check, debug and validate their products wherever they are. This accelerates time to market for smart cards, NFC tags, ePassports, mobile devices and readers by identifying interoperability issues quickly and easily. “Smartspy+ is the best cont...
Identiv, Inc., a provider of physical security and secure identification, will exhibit at the WestPack Packaging Expo February 11 - 13, 2020 at the Anaheim Convention Centre. The company will also showcase its near-field communication (NFC) solutions as part of the Cannabis Packaging Summit, running alongside WestPack as a subset of the show. Expecting approximately 20,000 visitors, ranging from packaging engineers to executives and operations professionals, WestPack provides industry professio...
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall succes...
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home de...
CSM has dramatically improved visibility and control over its security operations with the adoption of employee scheduling and workforce management software SmartTask. Following a period of rapid expansion, the company needed to replace existing paper-based systems, so that it could better monitor and coordinate a team of around 100 security guards that work across Scotland. This has enabled CSM to improve service delivery, enhance duty of care and support business development while reducing it...
SecuX Technology Inc., a blockchain security company, is going to participate in BlockShow Asia 2019 and exhibit at the startups stand of Marina Bay Sands in Singapore on November 14-15. SecuX will launch its new cryptocurrency point-of-sale payment ecosystem and demonstrate how a consumer uses SecuX Merchant Payment App to pay at the physical (brick-and-mortar) stores or on the vending machines via QR Code Scan/NFC/Bluetooth from the mobile phone that using the crypto-coins/tokens for an immed...
PAC & GDX, global provider of access control and door entry solutions, has announced the availability of its new Architect range of readers. By integrating cutting edge radio frequency identification (RFID), near field communication (NFC) and Bluetooth technologies into the Architect range, PAC & GDX has made it possible for smartphones to be used as an access control identification tool, thereby providing the highest level of convenience, flexibility and ease of operation. Integrating radio frequency identification technology PAC & GDX offers a lifetime warranty for all Architect readers on account of their quality In addition, PAC & GDX is so confident in the production quality of these products that it is offering a lifetime warranty for all Architect readers. Offering unrivalled levels of modular scalability, Architect can be configured to suit every application – from a single door to a fully integrated global internet based system – and the range currently comprises two variants. Architect-A readers The ‘Architect-A’ is a compact sized reader, while the ‘Architect-One’ is a Mullion reader, which is specially designed for installation in small spaces. Both variants are available in two options, either with RFID only or with Bluetooth & RFID. “In modern workplaces the vast majority of employees have smartphones, so utilising these devices for access control purposes makes perfect sense,” explained Pete England, Global Product Manager for PAC & GDX. Mobile access He adds, “Put simply, people don’t want to be carrying multiple keys and tokens around when their smartphones can do the same job. Architect is the only solution that provides secure identification modes without the constraint of having to swipe a card.” An access control system needs to perfectly meet the requirements of the environment in which it is installed, and Architect offers five identification modes for a unique user experience. Remote access and control Card Mode allows a smartphone to be used as a classic badge, while Slide Mode makes a user’s hand a card Card Mode allows a smartphone to be used as a classic badge, Slide Mode makes a user’s hand a card, and with Tap-Tap Mode a user taps their smartphone twice and a Bluetooth signal is sent to the reader to unlock. Remote Mode allows a smartphone to be used as a remote control and, last but not least, Hands-Free Mode means a user can simply walk past a reader. In light of the General Data Protection Regulation (GDPR) organisations must do all they can to avoid unauthorised access to personal information. When using an Architect reader, PAC & GDX ensures the process is highly secure thanks to the implementation of encrypted SQL databases and an EAL5+ crypto processor. Security key management AES 256-bit SSL encryption is also employed at server level – the same grade used by banks and hospitals – while master key databases are not stored but regenerated and authenticated after each use. This means that there is no transit of personal data when using Architect. Designed to be used in a wide variety of environments and applications, Architect readers have a rugged design that makes them weather resistant, chemical resistant and able to self-extinguish in a fire. They are also vandal resistant to IK10, which means that they are protected against 20J of impact. This is equivalent to the impact of a 5kg mass dropped from 400mm above a surface. Advanced access control technology With growing demand for access control technology that is intuitive, flexible and secure, products also need to be environmentally friendly. This was an important factor for PAC & GDX when deciding to launch the Architect range and so the entire unit is recyclable, as no resin is used. Using smartphones credentials reduces the need for physical tokens, which reduces inventory, logistical and transport costs Furthermore, the use of smartphones as credentials reduces the need for physical tokens, which reduces inventory, as well as logistic and transport costs. This is not at the expense of style though and bespoke fascia designs are available to complement an organisation’s corporate profile. Smartphone access control solution “PAC & GDX is driven by constant innovation and the desire to push the boundaries of what’s possible with access control,” said Pete England, further adding “Smartphones offer new possibilities and it is estimated that over 20 per cent of people within organisations will be using them for access control by 2022.” Pete concluded, “It’s why we have launched the Architect range, which combines convenience, flexibility, operational ease and efficiency, high levels of security, modular scalability and a vandal-proof design. Anyone with a traditional physical based token and reader system that wants to embrace newer technologies now has the perfect solution within reach.”
Optical transaction technology specialist, MetaSepia, unveils ScreenBeam, a ground-breaking optical alternative to rival mobile near field communications (NFC) services by enabling fast, frictionless and secure transactions between on or offline devices. Unlike mobile NFC, which relies on transformer-based radio frequency (RF) fields to couple devices, ScreenBeam authenticates visually, displaying and capturing authentication data using the devices’ display screens and onboard cameras. Fast and two-way device authentication ScreenBeam uses light-emissive codes which scan quickly and in all manner of conditions" Uniquely, ScreenBeam uses the same interface to enable the instant issuance of a transaction e-receipt, a feature typically unavailable when performing transactions using conventional mobile NFC. ScreenBeam’s patented optical NFC pairing system supports a variety of use-cases where mobile NFC falls short, notably including rapid and legal in-flight device pairing (in aeroplane mode) and data sharing, offline P2P wallet transactions including cryptocurrency payments, the ability to jumpstart apps and to authenticate automatically to Bluetooth and Wi-Fi gateways. “ScreenBeam is a radical evolution of the QR code model that provides secure, fast and two-way device authentication to compete with mobile NFC,” comments David Watkins, CEO, MetaSepia. “ScreenBeam uses light-emissive codes which scan quickly and in all manner of conditions.” Single directional camera “Since device auto-pairing occurs optically, the privacy and security risks associated with radiating a spherical RF field are removed from the pairing process. Barriers to widespread adoption are small; ScreenBeam is lightweight software, deployable across all smartphones and operating systems, including older models with a single directional camera.” We’re excited about the potential for this technology to enable offline face-to-face crypto payments" “The range of use-cases for optical NFC is compelling,” continues Watkins. “In the payments world, we’re particularly excited about the potential for this technology to enable offline face-to-face crypto payments, especially since individuals and micro-merchants can issue e-receipts and loyalty or promotional materials as part of the transaction, providing a new level of non-repudiation in their digital wallets. These are all attributes that are not catered for by conventional mobile NFC.” Commercial possibilities for service providers Through investment, licensing, IP acquisition or technology partnerships, MetaSepia now seeks to expand its R&D capability to establish ScreenBeam as a fully functional, standalone optical file sharing system operating at over 100Kbps. “Most NFC tokens are between 15kb and 50kb,” adds Watkins. “As a pairing interface, ScreenBeam’s UX is already uniquely visual and tactile. Looking ahead, our development roadmap is clear: ScreenBeam will easily rival mobile NFC speeds and open up a variety of new commercial possibilities for service providers.” MetaSepia’s ScreenBeam technology prototype will be demonstrated at DELTA Summit 2019 (2nd - 4th October) where MetaSepia’s CTO, Kerry Brown, will be available for briefings.
Identiv, Inc announced that the company is expanding its partnership with Les Bouchages Delage to deliver Internet of Things (IoT)-ready solutions for near field communication (NFC)-connected bottles in the wine and spirit industry. Identiv and Les Bouchages Delage originally partnered while collaborating on an intelligent NFC bottle cap for a luxury cognac brand. Now, the two companies are expanding their partnership by equipping a wide variety of Les Bouchages Delage cap designs with Identiv’s NFC technology. Near Field Communications technology Identiv and Les Bouchages Delage incorporated a contactless NFC tag into the cork stopper of all decanters While partnering on the luxury cognac project, Identiv and Les Bouchages Delage incorporated a contactless NFC tag into the cork stopper of all decanters. By tapping their mobile device to the cork, consumers are able to register their purchase and become a member of a private club providing exclusive content, unique experiences, and personalised services. The expanded partnership between the two companies will now apply the same intelligent technology to a greater selection of Les Bouchages Delage bottle caps. Custom Near Field Communications tag Identiv has developed a custom NFC tag design that fulfills a variety of unique bottle cap requirements, including high-performance in complex metal environments, maximum durability and readability by both Apple iOS and Android mobile devices at a small tag size, and 100% tested, secured, encoded, and locked variable data. As an expert in closure design and production, Les Bouchages Delage has provided the most reliable industrial production process for tag embedding, ensuring maximum radio frequency identification (RFID) performance and luxury-brand quality control. Radio frequency identification performance “Forty billion devices will be connected to the IoT by 2020,” said Stephane Ardiley, Identiv Director of Product Management. “Identiv’s expanded partnership with Les Bouchages Delage meets the increasing demands of consumers in this NFC-enabled world.” He adds, “people expect to connect to products in new ways, and through this partnership, we’re strengthening our commitment to consumer engagement, asset tracking, and authentication in the IoT.” IoT-connected products We saw a tremendous response to the intelligent corks in the luxury cognac project" “We saw a tremendous response to the intelligent corks in the luxury cognac project,” said Christian Delage, Les Bouchages Delage CEO. “Les Bouchages Delage is expanding its partnership with Identiv to apply this same intelligent technology to our complete line of customisable bottle caps to meet the increasing consumer demand for IoT-connected products. He further said, “Identiv’s tag designs meet each unique requirement in the wine and spirits industry and the team shares our vision for truly trustworthy product authentication.” NFC-compatible electronic devices Identiv’s complete portfolio of NFC-enabled solutions features a catalog of transponders compatible with NFC Forum, created for contactless transactions and connecting electronic devices with a simple tap-and-go model.
At GSX 2019, SilverShield™ Safety & Information Systems will showcase their award-winning visitor and information management system (Booth #1594). The solution is an easy-to-use, cloud-based SAAS approach to security, with several different modules that provide a complete safety solution. “The SilverShield Visitor and Information Management System is the most effective way for users to vet and manage visitors for any size facility,” said Robin Baker, CTO, SilverShield. “We look forward to demonstrating the powerful software to GSX attendees this year.” The SilverShield Visitor Management System enables staffed or unstaffed visitor screening at all types of facilities – schools, medical facilities, or any type of business that screens visitors and maintains visitor records. This cloud-based (SAAS) multi-platform solution allows users to quickly screen a visitor’s credentials against custom watchlists and the national sex offender database, in near-real-time, to decide if the visitor should be welcomed or denied entry. If welcomed, your staff is notified of visitor and VIP arrivals. Register manually or by scanning a valid ID The Virtual Lockdown System alerts users to take immediate action to initiate their lockdown procedures If there is a threat identified at any entrance, the system allows the user to immediately send silent alerts to designated stakeholders via a two-way communication mode. When integrated with the SilverShield ID Badge System, the system can create temporary ID or permanent ID badges for staff, students, and vendors. For organisations with unstaffed entrances, the SilverShield Kiosk System allows visitors to register themselves – manually or by scanning a valid ID. The interactive Kiosk System will also notify staff of VIPs or unwelcome guests, increasing security and safety even in unmanned entry points. In the event of an emergency situation or unwanted guest, the system’s Incident Management module can alert local police, initiate a virtual lockdown, and produce mass emergency notifications via email, SMS/text, mobile and web push notifications. The Virtual Lockdown System alerts designated stakeholders via an audible siren sent to all users’ computers or mobile devices, to alert users to take immediate action to initiate their lockdown procedures. Event Management System The solution pre-screens guests, ensuring that unwanted guests are not invited to events or facility activities SilverShield’s HR & Safety Resource Center enables companies and schools alike to store their Security Plans in a secure Learning Management System (LMS) and share it along with supporting materials with staff and stakeholders. The system also encourages assessments to ensure comprehension of security protocols, procedures and plans. The solution’s Event Management System pre-screens guests against watchlists and the national sex offender database, ensuring that unwanted guests are not inadvertently invited to events or facility activities. The system will manage invitations and RSVPs and can issue parking and visitor passes to approved guests via email and SMS/text, helping to safeguard a safe and secure event.
The new SALTO XS4 One Deadlatch is the perfect electronic escutcheon for retail storefronts, commercial buildings, and healthcare facilities with aluminum-framed glass doors. Stand-alone electronic lock system The SALTO XS4 One Deadlatch is a revolutionary stand-alone electronic lock thanks largely to the level of technology packed inside that brings together the convenience of an offline point – easy installation and no wires – with virtually the same power and performance of an online point. This innovation brings electronic access control and convenience to a number of retail and commercial operations that commonly use aluminum-framed glass doors that previously had limited options for electronic locks. SALTO XS4 One Deadlatch is the evolution of the original XS4 model with a built-in, totally new readerThe SALTO XS4 One Deadlatch is the evolution of the original XS4 model with a built-in, totally new reader. It includes the latest electronic components – MIFARE, Bluetooth SMART (BLE), and NFC – which ensure current and future compatibility. With the reader available in both black and white, the XS4 One Deadlatch has a narrow profile and is designed to fit most aluminum-framed doors. SALTO XS4 One Deadlatch The SALTO XS4 One Deadlatch is packed with a broad range of features that facilitate enhanced performance and high security at all times. These features include - Simple installation is possible on any type of door, including those with narrow frames. Body and escutcheon made of steel. Mechanical or electronic privacy option. The lock can always be opened from the inside (single action panic feature works in conjunction with the relevant mortise lock). Complementary escutcheons without reader available to maintain the aesthetics of doors that do not need to be controlled. ID Technologies MIFARE (DESFire EV1, Plus, Ultralight C, Classic - ISO/IEC 14443) Bluetooth SMART (BLE) NFC
Recognising the need for emerging applications to build on a strong foundation that supports interoperability among all categories of devices, four sponsor members – The ASSA ABLOY Group which includes HID Global, and NXP Semiconductors, Samsung Electronics, and Bosch, leading companies in access, secure connectivity and mobile/CE device solutions – announced the launch of the FiRa Consortium. The new coalition is designed to grow the Ultra-Wideband (UWB) ecosystem so new use cases for fine ranging capabilities can thrive, ultimately setting a new standard in seamless user experiences. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly-formed organisation. Delivers unprecedented accuracy UWB technology outperforms other technologies in terms of accuracy, power consumptionThe FiRa name, which stands for ‘Fine Ranging’, highlights UWB technology’s unique ability to deliver unprecedented accuracy when measuring the distance or determining the relative position of a target. Especially in challenging environments, UWB technology outperforms other technologies in terms of accuracy, power consumption, robustness in RF connection, and security, by a wide margin. “As an industry consortium, we believe UWB technology can transform the way people experience connectivity, and we’re committed to the widespread adoption of interoperable UWB technologies,” says Charlie Zhang, Chair of the FiRa Consortium and VP Engineering, Samsung Electronics. The starting point for UWB technology is the IEEE standard 802.15.4/4z, which defines the essential characteristics for low-data-rate wireless connectivity and enhanced ranging. It is the aim of the FiRa Consortium to build on what the IEEE has already established, by developing an interoperability standard based on the IEEE’s profiled features, defining mechanisms that are out of scope of the IEEE standard, and pursuing activities that support rapid development of specific use cases. Usage of UWB technology in multiple areas The unique capabilities of UWB promise to make it an essential technology in many areas including: Seamless Access Control – UWB can identify an individual’s approach towards or away from a secured entrance, verify security credentials, and let the authorised individual pass through the entrance without physically presenting the credential. Location-Based Services – UWB offers highly precise positioning, even in congested multipath signal environments, making it easier to navigate large venues such as airports and shopping malls or find a car in a multi-story parking garage. It also enables targeted digital marketing campaigns and foot traffic data. Retailers can present customised offers, government agencies can tailor their notifications, and entertainment venues can personalise recommendations during events. Device-to-Device (Peer-to-Peer) Services – By providing precise relative distance and direction between two devices, UWB lets devices find the relative location of each other even without infrastructures such as anchors or access points. This allows people to easily find one another in crowded spaces or find items even when placed in hidden areas. Suited for use with NFC, Bluetooth and Wi-Fi UWB is well suited for use with other wireless technologies, including NFC, Bluetooth, and Wi-FiDue to its low power spectral density, UWB offers little to no interference with other wireless standards, so it is well suited for use with other wireless technologies, including Near Field Communication (NFC), Bluetooth, and Wi-Fi. There are also adjacent markets that leverage UWB in other ways, especially automotive. “The FiRa Consortium’s commitment to a complete ecosystem means we will work with other consortia and industry players to develop approaches and define parameters,” says Charles Dachs, Vice-Chair of the FiRa Consortium and GM & VP Secure Embedded Transactions, NXP Semiconductors. FiRa Consortium members will have the chance to influence industry trends, gain early access to technical details, certify interoperable products, expand the UWB ecosystem, and share expertise. Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global says, “We encourage anyone, from any relevant industry area, who has a vested interest in the success of UWB to join us and contribute to the Consortium’s work.” Fully-integrated UWB test solution Kazuyuki Sakamoto, Senior General Manager, FeliCa Business Division, Sony Imaging Products & Solutions Inc. says, “We believe that UWB technology will bring the new benefit of connectivity to industries along with other wireless technologies.” Device-to-device fine ranging technology without additional equipment is very useful for home or industrial applications""UWB opens up new and complementary wireless connectivity use-cases,” said Adam Smith, Director of Marketing at LitePoint. “We're excited to help establish an ecosystem in which companies can utilise these new technologies by providing a fully-integrated UWB test solution, making it simple to validate the performance of UWB devices. At LitePoint, our mission is to help companies bring cutting-edge UWB products to market and that’s why we’re pleased to be part of the FiRa Consortium team.” Yongbum Park, Vice President, Telecommunications Technology Association says, “Device-to-device fine ranging technology without additional equipment is very useful for home or industrial applications. We believe that FiRa technology will change our lives.”
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
The security marketplace is talking about a lot of different subjects. Our website’s Expert Panel Roundtable discussions in 2018 reflected some of the “hot topics” in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2018 was about privacy issues and GDPR’s impact on physical security systems. Other hot topics that made the Top-10 list of roundtable discussions included obstacles to adoption of mobile credentials, what’s new “on the edge,” and the value of physical security data. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2018, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2018 (including the quotable panelists named and linked below). 1. How do privacy issues and GDPR impact physical security systems? "GDPR specifically restricts the capture and use of EU residents’ personal data and is in direct conflict with the adoption of artificial intelligence (AI) platforms to track individual activities. The challenge for manufacturers will be to design solutions capable of capturing valuable information for security or business intelligence purposes while simultaneously anonymising retained data.” - Peter Strom, March Networks 2. What are the security challenges of the hospitality market? "The primary challenge the hospitality industry faces is the fine balance between the delivery of exceptional customer service and maintaining a safe and secure environment. The industry sees a range of threats, including theft, terrorism and natural disasters, and more modern risks, such as those related to cybersecurity, liability and compliance." - Jumbi Edulbehram, Oncam 3. Where is it inappropriate to install video cameras? "The most obvious examples would be in bathrooms or bedrooms, but the more interesting cases are those that are not so obvious – such as religious institutions like a church or a mosque. An increase in the boldness of would-be thieves has led to a recent rise in surveillance outside of houses of worship." - Stuart Rawling, Pelco by Schneider Electric 4. What technology will impact security most in the rest of 2018? "The hottest trend we are currently seeing in 2018 is the continued adoption of intelligent devices and automation into the security framework. We have embraced a model where our software and hardware components continually get smarter and easier for security and IT teams to manage and deploy." - Stuart Tucker, AMAG Technology 5. What are the obstacles to adoption of mobile credentials for access control? "Mobile credentials have been slow to take off because legacy readers traditionally did not have Bluetooth or NFC capacity. However, upgrade kits will soon be available from some access control vendors, and customers will be able to easily upgrade their readers." - Derek Arcuri, Genetec 6. What’s new “on the edge” of security and video surveillance systems? "As more powerful in-camera chipsets are developed, edge devices are capable of even more powerful analytics that can inform operators in real-time of events requiring attention. Part of this significant evolution is from a form of artificial intelligence (AI) called deep learning." - Paul Kong, Hanwha Techwin America 7. Are integrators and end users overwhelmed by too many choices? "Being proactive in tracking new developments and networking with like-minded professionals are critical. Find out what your colleagues are using or testing, and get their feedback on what is working well, especially if their organisation is similar to yours. Join local groups, attend industry conferences, and connect on social media to compare notes on emerging technologies." - Brandon Reich, Pivot3 8. What role does social media play in promoting security? "Social media can help us reduce false police dispatches by drawing in a personal circle of people that can validate an alarm, whether it be a neighbour looking out their window to see what’s going on, or a family member that knows your travel plans and is taking care of your house." - Wayne Jared, 3xLOGIC 9. How should your security company measure total cost of ownership (TCO)? “When looking at TCO you need to consider the obvious initial capital cost – compared to alternatives – and also the operational costs across the lifespan of the systems, across one, three and five years. On top of this, though, security can add additional value through integration.” - John Davies, TDSi 10. What is the value of physical security data? "While active protection is the primary job of a security system, the data generated by today’s networked solutions can provide a wealth of intelligence to help organisations optimise both their security strategies and their business operations.” - Mark Perkins, Boon Edam
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
As a security service provider with a rich history in manguarding, Allied Universal is launching a new technology platform to increase productivity and accountability of security officers and to transform guard service operations from an ‘observe and report’ mission to a ‘detect and respond’ function. Mark Mullison, Allied Universal’s Chief Information Officer (CIO), says the new Heliaus platform also uses artificial intelligence (AI) to analyse data, predict outcomes, and prescribe optimum responses. The platform includes a smart phone app that guides security officers to ensure post orders are followed and provides a ‘virtual’ coach or supervisor to guide security officers throughout the day. “The walls between technology and people need to come down in the future,” says Mullison. “We need an ecosystem in which people and technology can cooperate well and respond to threats and drive outcomes.” Real-time situational awareness Technology plays an increasing role in security and safety, but it will never replace humans"Heliaus is a step in that direction. It has two components – the mobile app used by security officers; and a cloud-based portal, like a command and control centre that compiles information from the app and other inputs and performs AI analysis of data. Heliaus is an add-on for Allied Universal customers and is offered for a per-device subscription fee of $199 per month. A customer company’s managers can also access the portal for data visualisation tools and real-time situational awareness, or to input data such as ‘approving’ an incident report or action. “Technology plays an increasing role in security and safety, but it will never replace humans,” says Mullison. “It will augment and enhance the workflow and make people more effective.” “We are focussing on delivering better outcomes for safety and security,” he adds. “The impacts are as broad and diverse as the clients we serve.” Customisation of forms enables the system to collect and use any information that was previously collected on paper. Monitoring and Response Center (MaRC) A system is effective only to the extent that it is used, and Allied Universal has engineered the user experience to make the mobile app easy – almost fun – to use, says Mullison. Elements of ‘gamification’ drive greater user adoption. “It is designed to support the work [security officers] do and make information collection a by-product of people doing their jobs.” The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design Effective AI depends on data, and Heliaus pulls data from Allied Universal’s Monitoring and Response Center (MaRC), where a cloud server integrates the company’s managed security services, including access control, video surveillance and video analytics. It also incorporates current weather information and forecasts, and information specific to the industry segment. Additional data is generated as officers enter data through the mobile app. The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design. It provides insight into the drivers of risk, makes recommendations about how to reduce incidents, and, through dynamic workflow automation, ensures that those recommendations are implemented. Location awareness is a combination of the global positioning system (GPS), Bluetooth beacons, and near-field communication (NFC) tags. Improves the accuracy of responses AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response“Information is organised to facilitate AI analysis. If you have the right knowledge representation then problem-solving is easy,” says Mullison, echoing a common principle of artificial intelligence. AI works to analyse data and make predictions and recommendations to guide responses by security personnel. AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response. The AI system also learns and improves the accuracy of responses with more data and over time. Responses come much faster than older ‘trial and error’ models of analysis. Another element of Heliaus is a ‘robust workflow engine’ that ensures recommendations are carried out, either by a security professional on site or by the client. Mullison says implementation of the system can result in a 20% reduction of security and safety incidents. Multiple applications of Heliaus Heliaus is already being used by some Allied Universal customers. For example, a major Hollywood production studio is using it to identify and address workplace hazards such as stray electrical cords, dripping water hoses, etc., across a 50-acre area. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard A manufacturer created a custom compliance application using the platform to track more than 140 unique incident types, such as monitoring elevated temperature in a truck trailer or drivers without proper identification. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard. The flexibility of the platform can enable expansion to incorporate other technologies in the future, too. For example, sources of data for the system could include robots, drones or various Internet of Things (IoT) sensors; or workflow engines could be used to dispatch a robot or drone to handle a situation (rather than a human).
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple colour and infrared cameras that can detect facial features and confirm an identity. Real-time 3D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System helps in tailgating mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy enrolment and deployment Enrolment in the system is easy. Companies can deploy a separate enrolment station, or any reader can be used for enrolment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrolment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting intent from positioning of eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
A futuristic alternative to plastic cards for access control and other applications is being considered by some corporate users in Sweden and the United Kingdom. The idea involves using a microchip device implanted into a user’s hand. About the size of a grain of rice and provided by Swedish company Biohax, the tiny device employs passive near field communication (NFC) to interface with a user’s digital environment. Access control is just one application for the device, which can be deployed in lieu of a smart card in numerous uses. Biohax says more than 4,000 individuals have implanted the device. Using the device for corporate employees Every user is given plenty of information to make an informed decision whether they want to use the deviceCurrently Biohax is having dialogue with curious corporate customers about using the device for their employees. “It’s a dialogue, not Big Brother planning to chip every employee they have,” says Jowan Österlund, CEO at Biohax. Every user is given plenty of information to make an informed decision whether they want to use the device. Data capture form to appear here! “Proof of concept” demonstrations have been conducted at several companies, including Tui, a travel company in Sweden that uses the device for access management, ID management, printing, gym access and self-checkout in the cafeteria. Biohax is also having dialogue with some big companies in the United Kingdom, including legal and financial firms. Österlund aims to have a full working system in place in the next year or so. A Swedish rail company accepts the implanted chip in lieu of a paper train ticket. They accept existing implants but are not offering to implant the chips. Österlund says his company currently has no plans to enter the U.S. market. The device is large enough to locate easily and extract if needed, and small enough to be unobtrusive Access control credential The device is inserted/injected below the skin between the index finger and the thumb. The circuitry has a 10-year lifespan. The device is large enough to locate easily and extract if needed, and small enough to be unobtrusive. The only risk is the possibility of infection, which is true anytime the skin is pierced, and the risk is mitigated by employing health professionals to inject the chip. Use of the device as an access control credential or any other function is offered as a voluntary option; any requirement by an employer to inject the device would be illegal, says Österlund. It’s a convenient choice that is made “based on a well-informed decision by the customer.” Aversion to needles, for example, would make some users squeamish to implant the device. More education of users helps to allay any concerns: Some 10% of employees typically would agree quickly to the system, but a larger group of 50% to 60% are likely to agree over time as they get more comfortable with the idea and understand the convenience, says Österlund. Protection of information The passive device does not actively send out any signals as you walk. It is only powered up by a reader if a user has access rightsIn terms of privacy concerns, information contained on the device is in physical form and is protected. The passive device does not actively send out any signals as you walk. There is no battery. It is only powered up by a reader if a user has access rights. With use of the device being discussed in the United Kingdom, there has been some backlash. For example, Frances O’Grady, general secretary of the Trades Union Congress (TUC), has said: “Microchipping would give bosses even more power and control over their workers.” A big misconception is that the chip is a tracking device, says Österlund. It isn’t. “We love people to get informed,” says Österlund. “If they’re scared or apprehensive, they can just read up. It’s not used to control you – it’s used to give you control.”
Everbridge, Inc., globally renowned provider of critical event management solutions, has announced that it has been selected by Peru’s Ministry of Transportation and Communications (MTC) to power the nation’s Sistema de Mensajería de Alerta Temprana de Emergencia (Sismate), Peru’s Early Warning Emergency Messaging System. The news marks the completion of contract negotiations with the MTC that Everbridge had initially disclosed in September, without naming the country. The win reinforces Everbridge’s position as the global leader in population warning systems with contracts in the Americas, EMEA, and APAC regions. Critical messages to mobile phones After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident. The system, powered by Everbridge Public Warning, will send critical messages to mobile phones before, during and after the emergency. Sismate alerts can also be used in drills and to provide support in search and rescue operations. The Sismate is designed to serve over 37 million people including Peru’s 33 million residents and 4 million annual visitors. “This technology marks a milestone in risk and disaster management at the national level, which will be consolidated by combining joint efforts between various institutions and citizens,” explained Deputy Minister of Communications, Virginia Nakagawa to El Economista. National warning system “Everbridge is honoured to support Peru with its national warning system,” said David Meredith, Chief Executive Officer at Everbridge. “Peru joins a growing number of countries that have chosen to partner with Everbridge to implement a nationwide system to protect their population and visitors amid an escalating threat environment.” The Everbridge Platform has been deployed by more local, state, and national governments across the globe than any other solution, offering the ability to reach over 500 million people in more than 200 countries. In addition to Peru, Everbridge Public Warning has been deployed to reach the mobile populations on a country-wide scale in Sweden, Iceland, the Netherlands, Singapore, Greece, and a number of the largest states in India, and is currently being implemented in Australia. Everbridge Public Warning system Everbridge is the first population alerting provider to support four EU countries in conjunction with the recent EU mandate requiring member countries to have a population-wide alerting system in place by June 2022. Everbridge Public Warning represents the only multi-channel solution which allows countries to deploy their preferred combination of emergency communications methods. The Everbridge population warning system communicates across all phases of an incident, leverages location intelligence (static location, last known location, and expected location). It provides directed two-way communications, and enables countries to combine both speed of delivering alerts with the broadest reach to cover the full population and visitors.
Cognitec maintains a successful partnership with WorldReach to facilitate remote identity verification during self-service ID issuance processes via their smartphone app. Applicants for passports, visas, residency/settlement programs or digital on-boarding services are required to take a selfie during the enrolment process. An automated back-end process verifies the claimed identity, validates the ID document via NFC and chip reads, checks for watch list alerts, completes a liveness check, and forwards the application for completion of assessment. Uninterrupted digital services “We chose Cognitec’s market-leading face matching technology to achieve consistently high accuracy rates for the verification process,” says Gordon Wilson, President of WorldReach. “Government agencies require proven, reliable technologies for each step in the application process, as they aim to build the community’s trust in these new digital application methods. This partnership gives our companies a pioneering role in advancing e-government services.” Using the app eliminates the visit to an office facility and allows for uninterrupted digital services. Users welcome the app’s straight-forward design and the quick application process. WorldReach is currently applying this solution with passport and border control agencies in Canada, the UK, Ireland, and other organisations pursuing seamless travel initiatives. “The WorldReach solution brings the advantages of face recognition to modern ID management systems,” says Alfredo Herrera, Cognitec CEO. “We look forward to contributing our expertise as WorldReach evolves this trend-setting technology.”
Located in the South East of England, Basingstoke and Deane is a local government district and borough in the county of Hampshire. With Basingstoke as its largest town, the area is known for family-friendly living and is home to over 175,000 people. Basingstoke and Deane Borough Council consists of 60 elected members who discuss local politics, municipal budgets and taxes at regular meetings. For full transparency with the members of their constituency, the council streams live video of all its meetings, including public votes, on their YouTube channel. Automatic camera control To ensure a high level of video production, the Borough Council decided to upgrade their conference system. After discussing their requirements with Andover-based system integrator VP Bastion, a fully IP-based DICENTIS Conference System from Bosch was installed. The system meets the council’s key priorities by offering the highest audio quality, full integration of live voting, built-in automatic camera control and direct streaming with speaker-name indication. Council members wanted the freedom to sit anywhere in the council chamber during council sessions Additionally, council members wanted the freedom to sit anywhere in the council chamber during council sessions – while still being automatically identifiable on camera – and the installation needed to accommodate for the limited desk space and cabling voids. The system includes 63 DICENTIS Discussion devices with touchscreens (to support the required voting and identification capabilities for council members), nine DICENTIS discussion-only devices for guest speakers, and automatic camera control software. High directive microphones All the discussion devices are mounted on raised brackets to maximise desk space and are equipped with high directive microphones to deliver crystal-clear audio. Council members have the freedom to sit at any seat in the meeting room, as the system automatically registers their presence at a specific location thanks to the NFC (Near Field Communication) card registration on the discussion devices. When a speaker activates its microphone, the system’s automatic camera control points the camera towards their location, zooming in and displaying their image on the big screen. Additional features were added to the installation thanks to DICENTIS’ compatibility with third-party software. Two companies – Arbor Media, European market leader in conference recording and streaming services, and MVI Engineering, expert in creating conference software solutions – worked together to create a webcasting and conference control software package that was integrated with the DICENTIS system. Integrated conference system The new DICENTIS system has supported a seamless and transparent democratic process This solution helped to fulfil all the Borough Council’s requirements, including report generation via live image feed and identification by name and party affiliation on the council’s YouTube channel. In addition to displaying the DICENTIS-enabled voting results on the council chamber’s big screen, it is now possible to share the voting results on the YouTube Live feed. Since the installation, the new DICENTIS system has supported a seamless and transparent democratic process at Basingstoke and Deane Borough Council. “Having a fully integrated conference system with audio-video feeds from meetings automatically streamed to the council’s YouTube channel was a must,” says Iain Steele, Director of VP Bastion. Behind the scenes, via the third-party MVI Engineering application, the system automatically upgrades to the latest software versions. These centralised updates save time and operating costs. With the potential to increase the system’s functionality and size in the upcoming years, the council has a future-proof and expandable conference solution from Bosch, which already supplies around 50 percent of councils in the United Kingdom and Ireland.
Mobile-device and application-security technology company Trustonic announces that Hyundai Motor America will demonstrate its new Digital Key app, secured by Trustonic Application Protection, at the New York International Auto Show 2019. The Digital Key will launch with the all-new 2020 Hyundai Sonata in the fall. Hyundai’s Digital Key is a downloadable smartphone app that can replace a traditional car key by leveraging Near Field Communication (NFC) to detect an authorised smartphone. An NFC antenna is located in the driver’s door handle for locking and unlocking while a second antenna for starting the engine is located in the wireless charging pad in the centre console. Seamless vehicle sharing The Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication Once authorised, the Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication. A user can lock and unlock the vehicle, activate panic alert and start the engine within a range of about 30 feet of the car. The new Digital Key can be utilised by up to four authorised users, facilitating seamless vehicle sharing. Users’ preferred settings are also stored in the car, meaning that when a user is recognised, the vehicle automatically adjusts settings for side mirrors, radio presets, sound settings, and seat positioning. Hyundai is using Trustonic Application Protection (TAP) to secure the Digital Key. TAP ensures that Digital Key transfer requests are securely displayed to and approved by a real, authenticated user on a trusted device. Cybersecurity approach TAP utilises a multilayered industry-recognised security approach for communication to and from the customer’s phone. “Hyundai has been a leader in connected car technology for a long time now, with new features like Apple CarPlay, Android Auto, Smartwatch and Smart-speaker integration into our vehicles,” said Manish Mehrotra, director of digital business planning and connected operations, Hyundai Motor America. “Digital Key adds convenience for 2020 Sonata owners and allows us to be ready for future shifts in the mobility space, such as car sharing. We chose Trustonic because of their multilayered, industry recognised cybersecurity approach.” Vehicle-function permissions Hyundai’s Digital Key will enable easy car sharing and improved user experiences" Car owners have a deeper level of access than other authenticated users, enabling them to set vehicle-function permissions and the duration of access for each shared user. This enables uses beyond car sharing, such as enabling couriers to access the trunk within a pre-agreed window of time to deliver a package. Future uses that the app could enable include car rentals, triggering an alarm when a vehicle travels outside a designated area and remote control of features, such as autonomous parking. Ben Cade, CEO, Trustonic, adds, “Consumers expect to be able to manage their lives on their smartphones, and this includes their vehicles. Hyundai’s Digital Key will enable easy car sharing and improved user experiences for drivers—and as international leaders in app security, it’s up to us to ensure this can happen in a scalable and secure way.”
HID Global, a global provider of trusted identity solutions, announced that Tasmania’s Old Kempton Distillery (OKD) has deployed its Internet of Things (IoT) enablement platform, HID Trusted Tag Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against grey market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. Taking measures to prevent counterfeiting HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience"“Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognised the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery. “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag Services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalised communications that helps the distillery build brand loyalty in a privacy-preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC. “HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” Working of the system The distillery’s solution incorporates HID Trusted Tag Services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. A HID cryptographically secure Near Field Communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. Combining cloud authentication with NFC tags The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied“HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focussed on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global. “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.” HID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
HID Global, a worldwide provider of trusted identity solutions, was selected by Skanska, one of the world’s project development and construction groups with operations in Europe and North America, to incorporate HID’s mobile solution for secure access to its new office complex in Warsaw. Powered by Seos, HID Mobile Access improves the user experience and increases security throughout the entire building – from the parking lot and elevators to areas with limited access to the public. Located at 173 Solidarności Avenue in Warsaw, the new Spark office complex is not only the new headquarters of Skanska, but a large part of the 70,000 square-meter office building has also been set aside for other tenants. Because the building is intended to be a mixed-tenant space, it was crucial to restrict access to secure areas from unauthorised visitors. Using smartphones for access The Spark building was designed to enable mobile access so that employees can now use their smartphones to open doors and enter secure areas. Skanska, with help from system integrator Sharry Europe, created a new system for building occupants that integrates numerous building applications, including HID Mobile Access. As a result, all building applications have been incorporated into an integrated mobile app, which marked an advancement in creating a more streamlined and convenient experience for the users. HID Mobile Access enhances the security for accessing our entire building" Both Spark building employees and their guests can now move throughout the building with nothing more than a smartphone, without the risk of them gaining access to restricted areas – unless the proper access rights are granted. When users arrive at the door, they simply tap their iOS and Android devices to an iCLASS SE reader using Near-Field Communications (NFC) or Bluetooth Low Energy (BLE) and HID’s ‘twist and go’ feature to gain access from a distance. Any changes to the user’s access rights are remotely managed by the administrator through a cloud-based portal. Integrating all building applications into one “HID Mobile Access enhances the security for accessing our entire building. In one application, we have integrated all building applications, such as parking, virtual reception and other Internet of Things functionality, bringing the whole user experience to a new level,” said Renata Nowakowska, Innovation Manager at Skanska. “One of the most pressing objectives for facility managers in smart buildings is to crack the code on how to enable as many building applications and services on mobile devices as possible in order to simplify how occupants move through a facility and interact with building services,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control. “Skanska’s integration of HID Mobile Access into their mobile platform is a perfect example of how organisations are leveraging the power of mobile credentials and the cloud to realise the full potential of creating a connected and more intuitive experience for their users, while increasing security at the same time.”
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly play a role in security. We asked this week’s Expert Panel Roundtable: How are smartphones impacting technologies in the physical security market?
Near Field Communication: Manufacturers & Suppliers
Reducing the cost of video surveillance system deployment and operationDownload
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals