Radio frequency Identification
SALTO (SALTO Systems) has announced that the company will exhibit its latest access control innovations, at the International Security Expo 2021, taking place at Olympia London, in London, United Kingdom, on September 28 - 29, 2021. International Security Expo 2021 “With a welcome return to live exhibitions, after the COVID-19 pandemic, we’re looking forward to showcasing our latest access control products that deliver an unrivalled keyless experience,” said SALTO UK’s...
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?
HID Global, a globally renowned company in trusted identity solutions, has announced that it is the world’s first ticketing solution provider with a software development kit (SDK) that is fully certified and compliant to Calypso HCE standards, for secure and convenient mobile ticketing on smartphones. SDK certified to Calypso standards The certification specifies how to protect ticket data stored in the mobile device’s wallet, helping transport operators to effectively fight fraud,...
Radio Frequency Identification (RFID) provides new and profitable opportunities for increasing organisational, financial and operational performance. For instance, the retail and logistics industries can benefit from the superior RFID technology. RFID readers and solutions DENSO WAVE EUROPE (Denso Wave), member of the Toyota Group, has developed and deployed various RFID readers and solutions, which are used for inventory management, in-store product movements at the POS, for warehouse managem...
Internationally renowned company in next-generation auto-ID and labelling solutions, SATO (SATO Europe) has partnered with Xerafy, to bring pioneering metal skin radio frequency identification (RFID) labels to the automotive, manufacturing and healthcare global markets, through its range of RFID-enabled printers. Xerafy Metal Skin RFID labels The Xerafy Metal Skin RFID labels, which provide real-time traceability and asset management visibility, are easy to print from a SATO RFID-enabled print...
ELATEC Inc. has announced that its U.S. production facility in Palm City, Florida, has shipped its first 100,000 RFID systems, as of July 30, 2021. “The ELATEC Inc. team is proud to announce this exciting milestone for our new U.S. production facility and our customers,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC Inc., adding “I am very proud of the team and honoured to be part of the great things that are happening here.” Global production expansion&...
Sensor solutions provider HENSOLDT is supplying new radars to the German Armed Forces to modernise their airspace surveillance and build up Ballistic Missile Defence (BMD) capabilities. The Federal Office of Bundeswehr Equipment, Information Technology and In-Service Support (BAAINBw) has placed an order for the delivery and installation of four long-range radars as part of the "Hughes Air Defence Radar Nachfolgesystem" (HADR NF) programme. For this purpose, Hensoldt has entered into cooperation in the field of BMD-capable long-range radars with ELTA Systems Ltd, a 100% subsidiary of Israel Aerospace Industries Ltd. (IAI). Provides integration and certification The HADR NF system operates in the S-band, which allows more precise target acquisition in space than other systems. Due to the cooperation with ELTA, the German customer can be supplied with a combination of a national partner for integration, certification, and long-term support, as well as market-available systems that have been tried and tested in the field. Since the threat to Europe from long-range weapons has existed for years, there is agreement among the European countries that a protective shield consisting of their own and NATO systems must be established or expanded.
HID Global, a globally renowned company in trusted identity solutions, has announced two new additions to its broad family of RFID asset-tracking tags. The HID SlimFlex Ultra technical label is optimised for the strongest durability compared to other labels, and the HID Seal Tag edTamper Aura is designed to securely track and trace highly sensitive materials and digitally detects unauthorised access to sealed containers like boxes or crates. “We continue to solve customer challenges across a variety of RFID applications, from monitoring individual items under harsh conditions to ensuring that the seal integrity of secured inventory or high-value commercial shipping goods has not been breached,” said Jean-Miguel Robadey, Vice President of Industrial Smart Components with HID Global. HID SlimFlex Ultra RFID tags HID SlimFlex Ultra RFID tags’ special construction increases durability The HID SlimFlex Ultra RFID tags’ special construction increases durability when mounted to non-metallic flat or slightly curved surfaces. It joins HID’s comprehensive family of High Frequency (HF) and Ultra-High Frequency (UHF) RAIN RFID tags that withstand exposure to harsh elements, chemicals, and extreme temperature for waste management, food distribution applications, and other asset tracking applications. Custom colours are available, as well as 1D/2D barcode and laser-engraving options for special branding or other identification needs. HID Seal Tag edTamper Aura tags Affixed to metal, non-metal items or containers, HID Seal Tag edTamper Aura tag combines tamper-evident fasteners with RFID technology that transmits item ID, seal status, and a digital notification when a seal is compromised. They can be used for scanning large sets of sealed items such as weapons, racks, controlled medications, or other assets needing protection. The main advantage of the new tag is that users can itemise and detect the status of the assets, without opening the storage container during security checks, using RAIN RFID hand-held or stationary readers. HID’s diverse line of RFID tags HID offers one of the industry’s most diverse and flexible lines of RFID tags and transponders for tracking objects, monitoring activity, and improving processes. Its offering is backed by more than two decades of RFID development and manufacturing expertise.
A research report has revealed the innovative new ways that retailers are using RFID technology in-store, in order to improve profitability. Authored by Emeritus Professor, Adrian Beck from the University of Leicester and the ECR Retail Loss Group and supported by Checkpoint Systems, ‘Utilising RFID in Retailing: Insights on Innovation’ research report highlights how companies are employing the technology for a broader range of purposes. Benefits of RFID in retail The research report demonstrates the value that technology is bringing to their businesses and ultimately, the impact it is delivering to their bottom line. Crucially, it also shows that more retailers now more than ever are recognising the benefits of RFID and driving uptake within their organisations. The report claims that as businesses are becoming more established in their use of RFID-generated data, they are gradually incorporating more use cases into their business-as-usual practices. Rising use of RFID technology It also found that using RFID technology was having a significant impact on store processes In particular, more and more retailers reported using RFID to streamline the audit process (as an alternative to infrequent organisational stock takes), which not only delivers considerable cost savings, but also provides more regular insights into the status of inventories. It also found that using RFID technology was having a significant impact on store processes. While RFID has always been the key to inventory accuracy, some companies are now using this data to further improve business activities, such as reducing phantom out of stocks, improving rapid stock search and find tasks and developing an efficient ship from store (SFS) capability. Delivering omni-channel retailing Beyond the more traditional retail model, RFID was seen as a key facilitator in delivering omni-channel retailing, by all those questioned. Without the inventory accuracy offered by RFID, few retailers believed that they could reliably use their stores as fulfilment centres to output online orders. Indeed, one retailer admitted to only making RFID-enabled store stock available for this purpose. The use of RFID to improve online order accuracy is also becoming more common place, to reduce errors in the picking and packing process, and therefore, improving customer satisfaction. One retailer reported a 90% reduction in incorrect orders and customer complaints, since introducing RFID into the process. Tested in self-checkouts (SCO) Looking to the future, one area where the benefits of RFID are starting to be tested is self-checkouts (SCO). While currently limited due to the need to have a 100% SKU tagging strategy in place, retailers are starting to recognise the benefits that the technology could offer, including increased speed of checkout, reduced likelihood of double scanning and thereby, improved customer service. Another area where retailers also reported reaping the benefits of RFID was loss prevention. While none of those interviewed argued that reducing loss was the primary reason for investing in RFID technology, many acknowledged that they were benefiting from it, by using the technology to tackle refund frauds, enable dynamic loss product profiling, manage e-frauds and identify stolen products. Inventory accuracy and provision of valuable data RFID technologies can deliver clear-cut benefits in terms of inventory accuracy and the provision of valuable data" Commenting on the report, report author Adrian Beck stated, “Previous research has shown that in the appropriate retail context, RFID technologies can deliver clear-cut benefits in terms of inventory accuracy and the provision of valuable data.” Adrian adds, “In this study, we wanted to find out how its use evolved over time, understand what innovation looks like, as well as delve into the benefits and limitations of the technology. While some retailers are certainly pushing the boundaries, when it comes to RFID usage, others have adopted a much more incremental and gradual approach to its application.” RFID key to deploying omni-channel strategy success Mariano Tudela, Vice President of Europe Sales, from Checkpoint Systems, said “It is great to hear that companies are looking beyond the traditional benefits of RFID, to find new and innovative ways to use the technology and it will be very interesting to see how this develops over the coming years. One of the key evolutions for RFID recently has been in omni-channel retailing, and particularly following the COVID-19 pandemic, it is an area that we expect to see taking off in the future.” Mariano adds, “RFID technology is the only way to ensure a successful omni-channel strategy, and retailers that don’t adapt their offering are likely to be left behind. With decades of expertise, Checkpoint Systems is market leader in RFID technology making it any business’ strategic partner of choice.”
With 13 participating companies and organisations, Israel will make an impressive presence in DEFEA Exhibition, in Athens, Greece. It should be noted that the close strategic relationship developed between Greece and Israel, now also expands in the field of defence industry. DEFEA Exhibition SIBAT, the International Defense Cooperation Directorate of the Israel MOD, will co-ordinate the country’s participation in a National Pavilion. SIBAT is positioned within the IMOD, while having a close, ongoing relationship with Israel's defence industry. This ensures that SIBAT maintains in-depth and updated knowledge of the defence world’s concepts, as well as a clear understanding of the Israel Defense Forces' (IDF) operational needs. SIBAT's facilitates international cooperation through various services: Generating Government–to-Government agreements. Initiating visits of official foreign delegations. Identifying cooperation opportunities and joint ventures with Israel defence industries. Locating technological solutions for specific requirements. Marketing and sales of IDF inventory. Organising the Israel national pavilions at international exhibitions. Israeli companies participating in DEFEA include: Aeronautics Group - Aeronautics Group, a globally renowned developer and manufacturer of defence solutions, based on unmanned-aerial systems and advanced ISTAR systems. The group provides integrated turnkey solutions, based on unmanned solutions payloads and communications for defence, HLS and civil applications. Aeronautics broad product portfolio offers combat proven solutions for intelligence, surveillance and reconnaissance (ISR) missions, with demonstrated excellent performance and operability. Sustained by continuous research and development, these systems are on the outcome of three decades of technological and operational experience aeronautics group offers a one-stop shop, cost-effective solutions, for defense, HLS and civil missions. Aitech Systems Ltd. - As a pioneer in the field of computing technologies, Aitech provides reliable, rugged COTS boards and embedded systems on industry-standard, open architectures VMEbus, VPX, CompactPCI and high-speed serial fabric-based computers and subsystems for use in defence, aerospace and space flight applications. Their products address the design challenges that system engineers face, by balancing the need for more computing performance and tighter system integration, with the appropriate risk mitigation and reliable system operation requirements. They offer cost-effective COTS boards and systems that meet the industry’s ever-evolving requirements, by offering design flexibility, optimal cost-to-performance ratios and continued technological advancements. Astronautics C.A. Ltd. - Astronautics C.A. Ltd. Israel, established in 1971, is a hi-tech defence systems company, working directly with end customers, integrators and OEMs. Their solutions for aviation include integrated avionics systems, civil-certified glass cockpit avionics, multi-function cockpit displays, avionics & mission computers, engine data systems, air data systems, navigation solutions for GPS denied environment, and embedded-cyber protected systems. Their systems are used onboard the most advanced fighters, transports, and helicopters. Their solutions for land systems include automated tactical artillery fire control systems for various artillery platforms, artillery battle management systems, combat vehicle computers, displays, & controllers. Their solutions for naval platforms provide highly accurate onboard navigation systems with advanced real-time data distribution solutions, including predictive algorithms that improve overall system accuracy, prevent jamming and spoofing, and provide cyber-attacks protection. In addition, we supply Operator control stations with WECDIS / ECDIS applications. Their systems are used onboard the most advanced surface vessels and submarines. Bet Shemesh Engines Ltd. (BSEL) - Bet Shemesh Engines Ltd (BSEL) has been Israel’s leading jet engines house since 1968, manufacturing & casting jet engine parts, providing MRO services, as well as delivering small jet engines self - developed for UAV’S. The maintenance repair & overhaul (MRO) division of BSEL, being OEM, FAA & EASA certified, provides overhaul, repair & engineering services to complete P & W F100 and PT6A engines, and Rolls Royce (Allison) M250 engines; as well as to modules, components and accessories. Elbit Systems Ltd. - Elbit Systems Ltd is an international high technology company engaged in a wide range of defence, homeland security and commercial programs throughout the world. The company, which includes Elbit Systems and its subsidiaries, operates in the areas of aerospace, land, and naval systems, command, control, communications, computers, intelligence surveillance and reconnaissance (‘C4ISR’), unmanned aircraft systems, advanced electro-optics, electro-optic space systems, EW suites, signal intelligence systems, data links and communications systems, radios and cyber-based systems and munitions. The company also focuses on the upgrading of existing platforms, developing new technologies for defense, homeland security and commercial applications and providing a range of support services, including training and simulation systems. EMTAN KARMIEL LTD. - EMTAN, is an Israeli manufacturer of small arms, guns and weapons with over 40 years of experience and knowledge. EMTAN employs over 120 skilled personals in a sophisticated computerise facilities that ensure optimised manufacturing and quality assurance all this in order to deliver the end-user a reliable robust weapon within budget. They manufacture the MZ Rifle range, which includes MZ-4 Fully Automatic rifle in caliber 5.56 NATO, MZ-4 P Piston operated Fully Automatic rifle in caliber 5.56 NATO, MZ-47 Fully Automatic rifle in caliber 7.62X39 to suite AK47 magazine and accessories, MZ-10/25 S Semi-Automatic rifle in caliber 7.62 NATO for snipers, MZ-300 Fully Automatic rifle in caliber 300 Blackout for operations with silencers, MZ-9 Fully Automatic sub machine gun in Caliber 9mm NATO, MZ-15 Sami Automatic DMR rifle in caliber 5.56 NATO and RAMON Pistol 9mm. Nir-Or Israel Ltd. - Nir-Or Israel Ltd. designs develops, manufactures, and integrates innovative electronic systems and products for a vast range of military applications at land, air, and sea. Developing ideas into prototypes and prototypes into fielded, operational products, the company's wide-ranging capabilities cover all aspects of electronic-based military and para-military solutions. Nir-Or line of solutions includes Multi-dimensional Situational Awareness, AI-powered, Video System (Video Servers, Ruggedised Displays and Camera Clusters) for APC and designated military platforms. Nir-Or is also an important defence solutions provider of the IDF, providing its video systems to the new Namer APC. Israel Aerospace Industries (IAI) - In a fast-evolving world, where adversaries constantly challenge national defense, you need experienced and skillful allies to rely on. A trusted partner, courageous and innovative to deliver the capabilities you need and afford. That's IAI – Where Courage Meets Technology. A renowned company in defence, aerospace, and commercial markets, IAI leverages state-of-the-art technology and decades of combat-proven experience, delivering solutions for national defence and security challenges. Delivering large turnkey projects, IAI acts as a prime contractor, subcontractor, and team members in dozens of large programs for the aerospace, land, sea, and cyber domains and multi-domain applications. They offer a vast portfolio producing air and missile defense, unmanned aerial systems (UAS), ground robotics, precision-guided weapons, and loitering munitions. They deliver special-mission aircraft, modernise military aircraft and helicopters, and convert passenger jets into cargo aircraft. Their technology expertise features systems and solutions from reconnaissance satellites and radars, to all aspects of command, control, and communications, computing and cyber, intelligence, surveillance, and reconnaissance systems. Israel Weapon Industries Ltd. (IWI) - IWI has been a globally renowned company in the production, marketing, design and development of unrivalled weapons for over 85 years. Their weapon systems include the new CARMEL & ARAD AR, X95 (AR & SMG), TAVOR & GALIL ACE AR, NEGEV LMG, GALIL SNIPER, DAN Bolt Action Sniper Rifle, UZI PRO SMG and the JERICHO & MASADA pistols. IWI also provides Riot-Control solutions, including offensive and defensive products, top-level methodology, tailored training and integration of cutting-edge technologies. IWI customers are: Governmental, Military and Police Entities, as well as Law Enforcement Agencies around the world, along with commercial markets. JV Plasan SK (Plasan) - Founded in 1985, JV Plasan SK is a global company in offering safer vehicle environments and survivability solutions for defence and security forces. Their solutions offer high-end protection and mission readiness for defence and security vehicles, while reducing operational costs. With extensive battlefield experience and expertise in automotive systems, and materials, Plasan deliver solutions to support even the most complex vehicle and team missions. Plasan offers a variety of vehicle protection solutions, including advanced kitted armor hulls, the Guarder and SandCat armored tactical vehicles, and a wide range of survivability and personal protection solutions. Plasan, a recognised innovator and international provider of state-of-the-art lightweight ballistic protection and survivability solutions for the war fighter, the peacekeeper and law enforcement personnel alike, provides customised survivability suites that offer a unique optimisation between protection, mission adaptability, payload and cost. With its many design wins, Plasan has emerged as a global company in providing the right solution at the right price. With three decades of experience and over 32,000 vehicles across the globe fitted with our protection solutions, Plasan has a unique understanding of the challenges found on the modern battlefield. They translate operational needs into high-end protection solutions. With a comprehensive and creative approach to vehicle protection and armored vehicles, and the ability to provide customised solutions for a wide variety of missions, Plasan’s expertise in engineering, manufacturing, and system integration has been a major differentiator for their customers and partners. The company offers comprehensive solutions for the optimal balance of performance, survivability and safety. Plasan helps create a safer, mission-ready vehicle environment for defence and homeland security forces. RAFAEL Advanced Defense Systems Ltd. - RAFAEL Advanced Defense Systems Ltd. is synonymous with Dynamic Defence, Daring Innovation, and Technological Ingenuity. For over 70 years, the company has pioneered advances in defence, cyber and security solutions for air, land, sea, and space. Their innovations are based on extensive operational experience and understanding of evolving combat requirements. They enable the rapid development of effective solutions for complex battlespace challenges. Always ahead, they ensure an ongoing advantage for their worldwide client base. They are dedicated to continuously enhancing their customer service, as well as expanding their global industrial cooperation programme. Smart Shooter Ltd. - Smart shooter develops intelligent fire control systems for small arms that significantly increase weapon accuracy and lethality, when engaging static and moving targets, on the ground and in the air, day and night. With proven ‘one shot - one hit’ precision, their SMASH product line empowers defence and security forces, by maximising rifle effectiveness against enemy targets, while minimising friendly casualties and collateral damage. Based on artificial intelligence (AI), computer vision and machine learning technologies, SMASH is also designed to interconnect with other operational resources to form a micro-tactical network that delivers real-time situational awareness.
Built to withstand all access control needs, the tough new SALTO Neoxx electronic padlock takes security beyond normal expectations. SALTO Systems has invested years of working with some of the best minds in the security industry, their community of security specifiers and installers, to build the most reliable and smartest electronic padlock on earth. SALTO Neoxx Padlock With exceptional attention to detail, premium materials, and all SALTO technology inside, their latest padlock, SALTO Neoxx, looks great while packing technological power. The SALTO Neoxx Padlock is a versatile locking solution that enables users to benefit from the advantages of electronic access control, where previously it was only possible to use a mechanical locking solution (i.e., perimeter or fire access gates, industrial equipment yards and residential storage areas). Smart padlocks for enhanced security Smart padlocks offer more security, easier maintenance and flexible access methods Smart padlocks offer more security, easier maintenance, flexible access methods, and a better overview of the lock’s and user’s activity. As portable as conventional padlocks, security is enhanced by removing any lock’s most vulnerable part, the mechanical key and adding the benefits of being operated with a mobile app and contactless smart key, managed by an advanced web-based access control technology platform. The SALTO Neoxx Padlock offers a unique solution, ideal for utility providers, electric power stations, telecom network services, industry applications, and more, along with property services that need an additional level of security to control specific doors, like gates or storages, without losing a piece of convenience and control. Advanced electronic access control technology These industries often require equipment and facilities on the perimeter or out in the field that, even though they are in a remote location, require the latest in electronic access control. And because they are often outdoors, the electronic solution they need has to include a product that can weather the extreme elements from rain and dust to snow. Built to withstand the most extreme weather, the Neoxx is IP68 certified for waterproof performance and high durability. Remote management of keys, locks and access rights Together, with the most complete locking platform on the market (electronic locks and cylinders, online readers, and locker locks) and SALTO core technology (SVN, BLUEnet, and JustIN Mobile system features) inside, the SALTO Neoxx padlock enables managing keys, locks, and access rights on-the-go, remotely from a single, highly visual and easy-to-use web-based interface. SALTO Neoxx G4 electronic padlock’s main features include: High-security padlock made of hardened steel with a removable shackle model option, which can be completely detached from the padlock body. Shackle: Width 11mm - Length 50mm. Security chain non-demountable model with safety chain to protect the padlock from burglary/dropping. Cover case with double-layered structure 70mm x 115mm x 32mm guarantees the ultimate protection from falls, shocks, and the most extreme environments or usage. RFID, BLE (Bluetooth Low Energy) and NFC technologies onboard. Users can easily operate the electronic padlock with their smart card or with an iOS or Android smartphone. Compatible with SALTO Space – Data-on-Card– and the SALTO KS – Keys as a Service – cloud-based technology, it can be switched to any of SALTO’s technology platforms at any time without changing the hardware. Tested up to 130,000 operations on a standard set of batteries (4 x LR1). Monitor battery status (to optimise maintenance and battery life). Changing or removing batteries is simple and secure – users only need standard LR1 batteries and a special tool. IP68 certification: Waterproof performance and high durability. Tested against extreme temperatures: Including freezing conditions (-35ºC) and high heat (+65ºC). Fully certified according to CE, FCC, MIT, Mechatronic certification EN 16864:2018 and IK09.
Airspace security technology solutions provider, Dedrone has been awarded certification from the U.K. Centre for the Protection of National Infrastructure (CPNI) for its counter-drone technology platform, DedroneTracker for the second time, following Dedrone’s successful certification in 2019. DedroneTracker DedroneTracker detects, identifies, and locates drones by using multi-sensor capability combining radio frequency, radar, and optical sensors. The CPNI counter-drone standard enables organisations deemed to be of critical national importance, including refineries, data centres, airports, and ports, to adopt drone detection technology with the assurance that it has been tested rigorously. Dedrone’s continued participation and certification with CPNI reflects Dedrone’s efficacy and performance in detecting, tracking, and identifying different drone types for its customers. Dedrone technology Dedrone technology was evaluated to detect drones within a specific launch time Dedrone technology was evaluated to detect drones within a specific launch time, consistent and reliable tracking, timely alerts, and notifications, with DedroneTracker software showing reliable information on drone heights, speeds, and ranges. “Dedrone is pleased to report that DedroneTracker platform has successfully met CPNI’s rigorous testing standards for the second time in row,” shares Amit Samani, Vice President of Enterprise Sales, Americas & UK at Dedrone. Standard for global counter-drone technology testing He adds, “The challenge of unwanted drones at critical infrastructure sites is complex and unique, and will continually evolve as more drones come to market and as drone regulations and laws advance.” Amit Samani further stated, “CPNI has set the standard for global counter-drone technology testing, and any organisation protecting against drone threats can take comfort in knowing that Dedrone’s technology has successfully been evaluated, tested, and proven to deliver smart airspace security.” Software and radio frequency sensors DedroneTracker 4.5 automatically synthesizes sensor data and provides immediate alerts of unauthorised drone activity, enabling security providers to safeguard their premises. Dedrone’s software and radio frequency sensors provide detection, identification, and drone flight paths. Additionally, third-party sensors may be added to the Dedrone system, including Pan-Tilt-Zoom (PTZ) cameras and radar systems, providing additional layers of drone information, enabling the user to visually verify the drone and its payload.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modelling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organisations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What does this mean for the security or facility manager today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example benefits of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example benefit of reality capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorisation before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious use of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects). The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” Federal rules Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government. Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking. “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment. Limits and prohibitions The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems. Security Industry Association (SIA) The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.” Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. Easing compliance burdens The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess. The 'blacklist' The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts. A growing threat Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.” SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.” SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.” The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimetres. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focusses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organisation. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localise devices and objects to 10 centimetres of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilised by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance to stop secret surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating facial recognition technology Although the facial recognition aspects of the ordinance have been the most publicised, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilising an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes biometrics, RFID scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport security not part of ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding privacy of citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance technology policy Banning use of facial recognition just when its capability is being realised is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realised is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
Cumbria Police have refreshed their fleet of frontline TETRA radios, deploying Sepura SC21 hand-portable radios to police officer roles and SCG22 mobile radios in vehicles. In total over 1,400 radios have been deployed to enable the force to upgrade to the latest standard of TETRA radio capability. Enhanced mobile communication Aware of the need to refresh their radio fleet, the force organised field trials for new radios. Feedback from officers using the new Sepura SC21 TETRA radio was overwhelmingly positive. A vital advantage for the SC21 over the previous Airwave estate being the powerful TETRA engine and receive sensitivity. These combine to allow Cumbria Police officers to maintain Airwave coverage and keep communicating in the county’s many rural locations, where less powerful handsets frequently lose coverage. This deployment was further supported by the ability of the SCG22 to act as a Gateway, extending Airwave coverage where it might not otherwise reach and further enhancing the overall critical communications solution. Minimised training required The radios were programmed with a bespoke user interface designed to offer officers a familiar user experience The mobile radio was chosen as it has comprehensive deployment options, including car, van, motorcycle, and desk mount options, and shares a common interface to the SC21 meaning officer training is minimised. The transition to the new Sepura devices was undertaken during the COVID pandemic in the UK, with the Sepura team working with Cumbria Police to identify safe and effective ways to support an accelerated transition. This included Sepura supporting the force with a provisioning service, meaning the radios were pre-programmed and delivered to force headquarters ready to deploy. In addition, the radios were programmed with a bespoke user interface designed to offer Cumbria Police officers a familiar user experience, minimising officer training. Secure communication solution Adrian Johnson, ICT Operational Change Business Lead at Cumbria Police said, “Our officers require reliable secure communications with the easy-to-handle, reliable kit. Our old terminals were no longer supported by the manufacturer and were starting to fail. Our officers have been providing Policing services to our citizens and visitors to Cumbria throughout the COVID pandemic.” “The Sepura rollout has occurred during this global pandemic, during which the team had to learn new ways of doing things safely. The project team worked effectively with Sepura’s support teams to successfully deliver this new equipment to our teams.” “It is imperative in a mission-critical environment that we have excellent relationships with suppliers and immediate access to subject matter experts when our technicians need help or advice. Sepura understands Cumbria Police’ requirements and willingness to work together was key to achieving the agreed solution.” Providing effective solutions Dawn Griffiths, Business Development Manager for Sepura said, “We are delighted to support Cumbria Police in upgrading their hand-portable radios to the SC21.” “The expectation for modern radios is much greater than it was previously, and Sepura’s SC range can support these demands with powerful data applications, intelligent connectivity, and advanced features such as wireless Over The Air Programming which will enable the force to keep evolving their TETRA solution for many years to come.”
Adani Group is an Indian multi-national conglomerate, with its headquarters located in Ahmedabad, Gujarat, in India. The group’s diversified businesses include resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with the Mundra port, located in Gujarat, the largest commercial port in India. Having multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units in India. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders, across 25+ business units. Attendance and shift record maintenance Adani Group is widely engaged in multiple business units and ports, with strength of 50,000+ workers, who are engaged under 900+ contractors employed at various locations. Maintaining and managing the entire attendance details, diverse shifts and leave policies for the various locations and numerous workers at a central place was critical for the multi-national conglomerate. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management to deal with on a regular basis. To provide approved and appropriate induction of each worker, at a defined level, monitor progress status of each work order and its segregation, based on reports were quite challenging. COSEC Contract Workers Management solution Report generation to eliminate the fraudulent and erroneous payment of wages, at contractors' end, had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was to improve overall productivity. After a comprehensive discussion, with regards to the problems and requirements of the Adani Group’s management, Matrix offered its COSEC Contract Workers Management solution for their 50,000+ workers, who are working under 900+ contractors, spread across the enterprise’s four locations in India. Centralised attendance management solution Matrix’s COSEC Contract Workers Management solution offers a centralised attendance management solution Matrix’s COSEC Contract Workers Management solution offers a centralised attendance management solution for various branches that are spread across multiple locations, which automates all processes right from recording entries and exits, up to processing salaries. The COSEC Contract Workers Management solution facilitates enrolment of the worker credentials, along with photographs, documents and induction details. It helps contractors to manage workers efficiently, using contractors’ self-service portal. The solution provides multiple connectivity possibilities, via Ethernet, Wi-Fi and Mobile broadband. Seamless integration with SAP The solution also eases the tracking of work order progress. It offers seamless integration with SAP, using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations, via Email and SMS. Results: Enhanced security with effective worker’s enrolment process, abiding by various induction levels. Increase in productivity of administration by 20%. Easy decision making, due to the generation of customised reports. Smooth and effective monitoring of work orders. Improved security with centralised control and monitoring, with reduced time spent by the security department. Error-free man hours’ computation for quick & effective wages’ calculation. Minimised manual interventions. Products offered by Matrix include: COSEC CENTRA LE - Application software platform, expandable up to one million users. COSEC LE CWM - Contract Workers Management module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF card-based door controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare card, and NFC-based door controller. COSEC VEGA FAX - Fingerprint and RF card-based premium door controller with Touch Sense LCD, IP65, Wi-Fi and POE connectivity options. COSEC DOOR FOP - Fingerprint and RF card-based premium door controller with LCD and keypad.
Customers shopping in Scotch & Soda clothing will have soon a much stronger chance of finding and purchasing the right trousers, skirt, jacket, or shirt, thanks to the retailer’s new three-year partnership with renowned RFID solutions provider, Checkpoint Systems. RFID labels for inventory accuracy Checkpoint Systems will tag, on average, 10 million Scotch & Soda garments with the latest generation of RFID labels per year, providing it with improved inventory accuracy across its estate. By utilising this technology, the retailer will gain full, real-time visibility of its entire stock holding, ensuring its omni-channel services, including ‘click & collect’, are optimised. Scotch & Soda has been using Checkpoint Systems’ clothing labels for more than 10 years Scotch & Soda, which operates 166 stores in more than 70 countries, has been using Checkpoint Systems’ clothing labels for more than 10 years. Now, the fashion brand is going a step further in its collaboration, by incorporating the latest generation of RFID labels, featuring the high performing Njord label with the Impinj M750 Chip, onto all its merchandise worldwide. Scotch & Soda and Checkpoint Systems partnership Scotch & Soda has expanded the relationship with Checkpoint Systems, as they are a trusted partner that could deliver this project, within just 8 weeks’ time. With the implementation of this new technology, Scotch & Soda will be able to match its stock to the demands of its consumers. This means that the retailer will be able to have the right stock, at the right place, at the right time, in order to serve its customers, regardless of the channel they chose to shop. To be able to optimise stock holding to this level results in omni-channel retailing becoming seamlessly coordinated, enabling stores to optimise services, such as click & collect. Checkpoint RFID labels Rik Kok, the Global Director of Procurement and Real Estate for Scotch & Soda, said “Thanks to Checkpoint Systems' latest RFID labels, we know exactly how many medium blue trousers are still in our distribution centres in Belgium, the Netherlands or Germany, for example, or how many extra jackets our shops in Japan need from our summer collection.” Rik adds, “In this way, we are not left with a large surplus of unsold items, at the end of a season and we can provide every consumer with the garment he or she wants, through his or her most preferred sales channel.” Getting the right garments online and in shops faster Thanks to Checkpoint Systems’ RFID labels, shop staff can now replenish stock quickly Imagine shopping and wanting a garment, but are told that the size or colour is no longer available. Scotch & Soda believe this should never happen and thanks to Checkpoint Systems’ RFID labels, shop staff can now replenish stock quickly and coordinate it with the entire supply chain, right from manufacturer to distribution centre, to shops and pick-up points. Rik Kok said “Thanks to RFID technology, we know how many garments we have of what size and colour, and where they are in our chain. This means, we can immediately help the consumer find the right garment. This also applies to when they buy clothes from us online. We refer the customer to the nearest click & collect, or buy & pick up point, where the desired garment is located, or they pick it up in our shop that is on their daily route.” Change in customer buying trends Geert den Hartog, the Key Account Director - Apparel at Checkpoint Systems, said “2020 has changed the buying behaviour of consumers worldwide. Shoppers no longer just buy clothes in a physical shop or online. They buy through their preferred channel, as and when it is convenient for them. If retailers want to grow, they will have to accommodate their consumers with this omni-channel behaviour.” He adds, “RFID ensures that shops can perfectly align e-commerce, click & collect and other online services. This improves customer loyalty by ensuring that the experience in enjoyable, from mobile/desktop browsing through to collection or delivery.”
To keep an automotive manufacturing operation running 24 hours a day, auto manufacturers have utilised Kanban systems, lean manufacturing and just-in-time manufacturing (JIT) however these business processes require tracking of the inventory and materials within a manufacturing facility. Manufacturers that truly want to automate the replenishment process utilise automatic identification such as RFID to create real-time visibility into their manufacturing and inventory management process. One such automatic RFID replenishment system is from MSM Solutions called PortalTrack. This automated RFID and customisable software solution provides real-time visibility without disrupting workflow and can be seamlessly integrated into current manufacturing processes. Accurate inventory control The end result also provides for more accurate inventory control and will prevent lost revenue in mission-critical applications. MSM's PortalTrack system was successfully implemented in an automotive production site of a premium car manufacturer. MSM Solutions was able to work within the existing process flows without disrupting work in process and tailoring its PortalTrack Software to provide the required reporting and metrics that enabled real-time visibility for more informed decision making. As an automotive manufacturer, maintaining production without interruption is paramount As an automotive manufacturer, maintaining production without interruption is paramount. Having accurate real-time visibility allows the customer to know exactly what they have on hand, along with its precise location. PortalTrack enables visibility throughout the entire internal supply chain, thus enabling employees to make smarter decisions faster to insure production keeps running. Integrated RFID solution The goal of the premium car manufacturing project was to provide an automated real-time visibility solution utilising RFID to track and visually report work in process replenishment inventory to maximise uptime for a mission-critical 24x7 automotive manufacturing operation. The manual processes currently in place relied too much on human intervention resulting in production delays, inaccurate inventory counts and lost revenue. After an initial site assessment of a premium car manufacturer, MSM Solutions provided the customer with a completely integrated RFID solution. What drove this integration was finding a durable metal mount hard tag that provided reliable read ranges up to 20', develop a network strategy that entailed not directly interfacing the hardware and software components with the customer's network but utilising an IoT Network solution to manage the RFID read data, reduce deployment time, and provide a secure independent network. Cloud-based software MSM Solutions was able to overcome all of these challenges using their cloud-based software Also, it is important to note that the traditional ways of running hardware and software solutions directly on a customer's network are becoming increasingly more stringent due to security concerns, infrastructure costs, lack of IT resources and complexity of deployment. However, MSM Solutions was able to overcome all of these challenges using their cloud-based software and IoT network technology which takes the burden off of internal IT support, reduces costs, has zero maintenance for the end-user, along with providing security and allowing for rapid deployment. With a new car rolling off the line roughly every 80 seconds it is imperative that the right parts and the right counts be at each designated work station in the process. The parts replenishment process flow for the production facility works in a continuous cycle with parts flowing from the supply side of the facility to the manufacturing lines. Target inventory level Parts are placed on racks and assigned to a specific part number with a specific count per rack. The racks are equipped with durable metal mount RFID tags that identify the part number. Once the racks are loaded, multiple racks are then hooked to an automated tug which moves the parts from the supply side to the manufacturing lines. Each part number has a target inventory level that must always be on hand in the manufacturing facility As the tug travels, it passes 2 sets of RFID fixed readers and antennas; one set of RFID readers monitors inbound inventory to the manufacturing lines and another set of RFID readers monitors empty racks returning from manufacturing back to the supply side to be reloaded. Each part number has a target inventory level that must always be on hand in the manufacturing facility. As items enter the manufacturing side via the automated tug, the RFID tags are read and the inventory is automatically increased. Flat-panel monitors On the other hand, as empty racks exit the manufacturing side the RFID tags are read again, and the inventory is automatically deducted. The real-time inventory counts are displayed on large monitors throughout the facility and on a web-based dashboard for viewing on any device. Once a date was determined for the physical install of RFID, MSM Solutions installed all the readers, cabling, mounts, cellular devices and flat-panel monitors in a 2-day period. The PortalTrack customised software solution was live within 24 hours of the hardware installation. One key metric that was uncovered by MSM Solutions during this process was that once the system was in place, they were able to provide some travel and real-time analytics that drastically changed the customer's stated expectations. Real-time visibility The return on investment for the system was less than three months For example, the customer's perceived expectation for a particular parts cycle rate from supply-side to manufacturing was deemed to be on the replenishment cycle of ‘X’ when in reality the system showed the real cycle rate was ‘Y’. This was a key discovery in that MSM Solutions found parts that were not being replenished at the required cycle rate, parts that were not moving at all, and others that were traveling on paths that went against the workflow. The net gain of having real-time visibility into the production flows instantaneously allows management to react and institute the corrective measures so that production stays on schedule and replenishment efforts remain focused on the most critical parts at any given time. The return on investment for the system was less than three months and the project continues to expand to more applications within the facility. Internal security protocols A few key requirements for this installation were that the entire solution needed to operate independent of the customer's network based on internal security protocols, limited available IT support, infrastructure concerns and the need for rapid deployment. MSM Solutions bundled the company's new RFID module with its existing solutions MSM Solutions was able to customise a cloud-based Cradlepoint IOT Network coupled with the PortalTrack software that provided a solution that was secure, completely manageable outside the 4 walls, reduced the infrastructure costs, required no internal IT support and was easily deployable and expandable. By eliminating the manual data entry system, MSM Solutions bundled the company's new RFID module with its existing solutions. The result provided a fully automated system of goods receiving, automatic inventory updating, real-time visibility of production line consumption, and automated warehouse and vendor replenishment. Target inventory level The products and technologies suggested to the premium car manufacturing company included Zebra FX7500 readers, Times 7 5010 flat panel antennas, CradlePoint IoT devices, Xerafy Cargo Trak RFID hard tags, and 50" flat-panel commercial monitors. In many cases, customers have asked about dashboards that can easily display a real-time visual inventory report. The visual inventory report created by Portal Track is represented by 3 columns. Column A shows the actual real-time inventory count for a part on hand in manufacturing and provides a visual representation with a real-time count and a colour code of either green (target level met or exceeded) or red (inventory level low) when compared to the target inventory level. Column B displays the target count for an item to always be maintained in manufacturing, and column C displays the total count of all the racks available for an item. Improving inventory accuracy RFID adoption rates in the auto industry are steadily increasing and the applications are expanding RFID adoption rates in the auto industry are steadily increasing and the applications are expanding. Traditional barcode technologies rely too much on human interaction and are no longer sufficient in today's data-driven global economy. Having access to real-time information and analytics drives informed decision making that results in less downtime, increased sales, improved inventory accuracy and knowing an item's location instantly. RFID and PortalTrack enable connectivity that allows companies to identify, track, count and manage all of their assets from point of origin to point of sale. Due to the success of this initial project, MSM Solutions is piloting a new supplier-level project with the same automaker. For this project, MSM's PortalTrack software manages the printing and encoding, reading and analytics for an estimated 500,000 supplier totes that will be read at the receiving dock doors at the automotive manufacturer.
Hong Kong Aircraft Engineering Company (HAECO), one of the globally renowned independent aircraft engineering and maintenance companies, implemented a solution for full tool control and prevention of Foreign Object Detection (FOD) occurrences. HAECO selected Xerafy for its track record in the aviation industry, as well as the strong market experience and capabilities that the company has demonstrated in RFID tool control for MRO and FOD. MRO services HAECO provides maintenance, repair and overhaul (MRO) services for more than 200 aircrafts each year HAECO provides maintenance, repair and overhaul (MRO) services for more than 200 aircrafts each year. Since its inception in 1950, the company has continuously grown to become one of the largest players in the fast-growing global aircraft MRO market, valued in excess of US$ 67 billion. Over the next ten years, the Asia Pacific and China market will see the fastest and largest global MRO demand growth and spend. Combining data and technology solutions With MRO companies eager to increase efficiency and productivity, HAECO’s Patrick Wong, Executive General Manager, Line Services and his teams leveraged their operational experience and best practices, in order to identify how combining data and technology can deliver significant improvements. Each MRO company’s mechanics use its own tools and tool boxes, and at the end of each shift, the mechanics have to conduct a full inventory, to ensure that they didn’t leave any tools on the aircraft. This process is typically done manually, which is both inefficient and inaccurate. Manual tool control can also result in duplicate or lost data, as well as inaccuracies in the tool management database. Management tool with user-friendly system interface The project team’s vision was to automate the control process, using a solution with a user-friendly system interface and technology that could incorporate existing tooling and toolboxes, without additional investment in new equipment. “We needed a solution that would deliver inventory checks with a single scan, quickly and with 100 percent accuracy,” said Patrick Wong, adding “The interface had to be easy-to-use, while the wide variety of tools to track meant, we wanted the flexibility to be able to tag tools and devices of any size.” Hand-held RFID readers deployed Using Xerafy’s solution, HAECO has reduced inventory checks from 20 minutes to less than three minutes The pilot project was completed in November 2017, at HAECO’s Hong Kong main operations site, with a full control solution, featuring a mobile app connected to the company’s back-office system, to track and trace 3,200 tools using hand-held RFID readers. Using Xerafy’s solution, HAECO has reduced inventory checks from 20 minutes to less than three minutes, an 85 percent reduction that saves 17 minutes per mechanic, per day. HAECO achieved this fast return on investment (ROI) based on the time savings alone. Efficient inventory checking and management In addition to making the mechanics more productive, the inventory checks are more accurate and automatically reconciled with the reports. By ensuring that tools aren’t left on the aircraft, HAECO is able to reduce the possibility of Foreign Object Damage (FOD) to its client’s aircraft. The company can also better manage the maintenance and upkeep of expensive tools and can use real-time inventory data, in order to create comprehensive reports and conduct data analysis, and business forecasting.
German manufacturer, Rittal deployed Xerafy's durable, high-temperature RFID tags in its paint shop operations, in order to track Work-In-Process (WIP) and automate stock tracking, and re-ordering with SAP. Rittal manufactures switch cabinets, air conditioning systems, and server and network cabinets. The lack of Work-In-Process (WIP) visibility into its painting processes led to manual stock checking and sub-optimal employment of its resources. Material purchases were based on historical estimates, rather than real-time usage and the company lacked information on temporary material stock. The company wanted 100% WIP visibility, along with automated material tracking. Rittal also wanted the ability to generate purchase orders, based on real-time data, while eliminating manual processes associated with stock checking and inventory management. RFID technology It was clear from the start that RFID would be Rittal's first choice for achieving its operational goals It was clear from the start that RFID would be Rittal's first choice for achieving its operational goals, but it needed transponders that could withstand the high temperatures and chemicals utilised in its production processes. RFID would provide a more robust solution than barcode labels (that would not withstand its manufacturing processes), without requiring line-of-sight reading. The company turned to IdentPro, the German RFID/RTLS integrator and solution provider, with broad experience in deploying the technology in challenging environments. IdentPro provided a complete software solution, SAP integration and rugged RFID tags from Xerafy. “Rittal chose IdentPro because IdentPro would deliver a complete solution, including the required control software and integration with our SAP systems, rather than selling just the RFID components,” said Denise-Anabel Gomolla, Supply Chain Manager - Works Management, Rittal, adding “RFID readings were 100% from the first day.” Xerafy Micro X-II On-Metal RFID tags For the rugged tags, IdentPro turned to Xerafy. Xerafy has an unparalleled range of tags for the type of unique and specialised requirements present at Rittal. The Xerafy Micro X-II On-Metal RFID tag was the perfect fit for Rittal's solution. The tags are designed for exposure to extreme heat and repeated exposure to caustic fluids. Prior to RFID, Work-In-Process was not tracked down to the single item. Raw material purchase orders were based on historical data, rather than actual need. Stock visibility was also limited. The target of the project was to install an automated feedback system, for the painting process that would allow for precise data on WIP and subsequently, also provide real-time data for need-based material purchasing. Enhanced stock transparency An additional benefit of the RFID system would be improved stock transparency. Rittal has deployed Xerafy Micro X-II tags at one of its facilities, along with IdentPro identMX readers with integrated antennas, the IdentPro RFID Control Unit (which serves as the middleware), and the IdentPro RFID Server for business logic and SAP interface functions. All of the readers are connected via Ethernet with the RFID Control Unit, IdentIQ, which consolidates the data and forwards it to the RFID server. The server comprises a web-based front end for managing and monitoring the RFID readers, business logic for monitoring dialogues, and the interface to Rittal's SAP system. Tags mounted on product hangers The Xerafy tags are able to withstand the 200°C process temperatures and have provided 100% read rates The tags are mounted on product hangers and married to the production order number of each product, via a barcode scan. As the hangers pass through 22 RFID read points, on the nearly 10-km-long production line, the data is forwarded to SAP. This integration automatically generates purchase orders, based on real-time production data, as well as updating interim stock and product location data. The Xerafy tags are able to withstand the 200°C process temperatures and have provided 100% read rates. Rittal has been able to optimise materials planning, as a result of the RFID deployment, which has saved time and reduced costs. Reader integrated with antenna and PoE Using a reader with an integrated antenna and PoE kept installation costs and effort to a minimum, and made the system maintenance free, both factors that significantly reduced the total cost of ownership (TCO) of the system for Rittal. The company now plans to implement the solution at additional plants. “We love Xerafy's range of special metal tags, which never let us down in any of our projects,” said Michael Wack, the Chief Executive Officer (CEO) at IdentPro, adding “Especially for demanding production environments, the extended heat resistance and extra robustness of their tags come in handy. We have also experienced a very good size/performance ratio with tags from Xerafy.”
Round table discussion
Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerised systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting critical infrastructure?
In the past few weeks, the light at the end of the COVID-19 tunnel has brightened, providing new levels of hope that the worst of the pandemic is behind us. Dare we now consider what life will be like after the pandemic is over? Considering the possible impact on our industry, we asked this week’s Expert Panel Roundtable: Which security technologies will be most useful in a post-pandemic world?
Radio frequency Identification: Manufacturers & Suppliers
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download