Voice recognition systems
RecFaces confirms its participation in Intersec 2025, the world’s largest business event focused on security. RecFaces will feature its pioneering facial recognition solutions, Id-Guard and Id-Gate, at booth SA-F29 in the Security Pavilion from January 14-16, 2025, at the Dubai World Trade Centre. With more than 200 installations worldwide backed by a diversified team with more than 15 years of experience in Facial Biometrics, its flagship products are Id-Guard, for enhancing security ope...
Verkada is sharing 2025 predictions related to each of its various product categories, ranging from how AI will unlock new insights for security teams to how advancements in camera technology will enhance accuracy and decision-making. Here are some comments from Verkada’s security professionals looking ahead to the new year. AI in security "Large language and vision models reduce investigation times and unlock deeper insights. AI is already transforming the ways that security tea...
IDEMIA Smart Identity’s Biometric Recognition System (IBRS) has achieved Open Standards Identity API (OSIA) Qualified status. IBRS is a multimodal automated biometrics identification service. It enables governments to access a full array of biometric recognition-related services. OSIA enables seamless connectivity between the building blocks of the identity management ecosystem—independent of technology, solution architecture, or vendor. The qualification program is working to enhan...
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelengths. Irradiating the human palm with near-infrared light waves yields an image of the vascular pattern. A venous distribution map can be processed and compared to pre-registered data to match and confirm identity. Palm vein biometrics The idea of palm vein biometrics goes back to the 1980s when pa...
iDenfy, a global RegTech company specialising in Know Your Customer (KYC), Anti-Money Laundering (AML), and Know Your Business (KYB) verification solutions, has announced its achievement of SOC II certification with the submission of an independent auditor’s report. New office This milestone confirms iDenfy’s position as a trusted partner in the US market, ensuring that its data handling practices meet rigorous standards of security and confidentiality. The certification coi...
Matrix, a pioneering Indian technology provider, is set to exhibit its state-of-the-art security solutions at Inno Rail 2024. The event, scheduled from November 28 to 30 at the RDSO Stadium Ground in Lucknow, will see Matrix at Booth No. 81, where it will display a range of solutions designed specifically for the rail and transportation sectors. RDSO 6.0-compliant network cameras Matrix is the first Indian company to offer RDSO 6.0-compliant network cameras, aligning with the strict cyb...
News
IN Groupe has entered into a final agreement with Nets, part of Nexi Group, for the takeover of Nets' eID business. In November 2023, Nets and IN Groupe concluded the first part of the agreement for the acquisition, and the two parties reached an agreement on the final terms. MitID operations transferred Nets will formally transfer the responsibility for the development and operation of MitID to IN Groupe which is in charge of further development and operation of the Danish digital identity service MitID and other related eID services. "At IN Groupe, we are proud to be the new operator of MitID, which is an extremely advanced and specialised eID technology," says Agnès Diallo, CEO of IN Groupe Preserving identities "As Europe's identity specialists, it is in our DNA to collaborate with authorities and help them protect citizens' identities and preserve business integrity." "Therefore, the collaboration with the MitID partnership fits perfectly with our expertise and experience in delivering digital identity solutions, biometrics, cyber security, and digital verification services across Europe." International expansion "Together with the recent news of IN Groupe entering into exclusive negotiations for the acquisition of Idemia Smart Identity, today’s announcement shows that the transformation of our Group is accelerating." "Our international expansion and the widening of our capabilities along the identity value chain will help us better serve new and existing customers. We look forward to using our own experience and expertise to further develop and improve MitID for the benefit of both Danish citizens and businesses in the future." Secure digital solutions "We could not think of a more competent owner for our eID business, and we are pleased to have finally reached closing," comments Torsten Hagen Jørgensen, Global Head of Issuing Solutions in Nexi Group. "IN Groupe has years of experience delivering complex and secure digital solutions to states, citizens, and businesses in Europe, which means they are optimally positioned to meet the requirements and responsibilities necessary to operate and develop the solutions that are crucial to Denmark." MitID The continued operation and development of MitID are central to the rationale behind IN Groupe’s acquisition "We are confident that IN Groupe will bring renewed value to MitID and be a strong and trustworthy partner to the MitID Partnership, the Danes, and Danish businesses. The continued operation and development of MitID are central to the rationale behind IN Groupe’s acquisition. eID solution provider MitID will remain formally owned by the MitID partnership, which consists of the Danish Agency for Digital Government (Digitaliseringsstyrelsen) on behalf of the Danish state and Finance Denmark (Finans Danmark) on behalf of the Danish banks. The completion of the acquisition has been subject to customary closing conditions and the authorisation of the Danish government on the suitability and capabilities of IN Groupe as their continued eID solution provider. New offices IN Groupe will open two new Danish offices – the new headquarters for IN Groupe Denmark During the entire process, Nets has been responsible for the stable and secure functioning of the services. IN Groupe will be responsible for the continued operation and development of MitID and related eID services. In connection with this, IN Groupe will open two new Danish offices – the new headquarters for IN Groupe Denmark in Copenhagen and a branch in Aarhus. Additionally, a new office will be opened in Oslo, Norway. Trust and broker services IN Groupe will have 350 skilled employees from Nets on board. These employees will continue to work with eID solutions, ensuring continuity and the necessary expertise to operate MitID. In addition to the operation and development of MitID, IN Groupe will also handle the trust and broker services previously owned by Nets.
Zenitel, a global pioneer in Unified Critical Communication solutions, proudly announces the launch of Zenitel Connect Pro, the industry’s first critical communication solution that unifies all types of audio communication solutions, helping to bring safety, security, operational, and infotainment communication needs under one platform. Zenitel Connect Pro Cybersecurity demands are fundamental to any security specification and the Zenitel Connect Pro platform is built on security by design principles, which ensures that cybersecurity is foundational to the architecture, which minimises potential vulnerabilities and ensures resiliency to cyber-attacks. By adopting open interface standards, Zenitel Connect Pro makes it easier for security system integrators to incorporate audio into the security mix, including video management and access control solutions, enabling a shift from reactive security to proactive and interactive security solutions. A truly unique offering for physical security This unified critical communications approach helps businesses reduce response times in emergencies Zenitel Connect Pro represents a paradigm shift in the way people and businesses communicate, transitioning from traditional, siloed communications to a collaborative communications approach, by seamlessly integrating intercoms, IP speakers, public address, and voice alarm systems under a single platform. This unified critical communications approach helps businesses reduce response times in emergencies while improving communication resilience by allowing seamless transitions between different communications technologies. Addressing key operational challenges Zenitel Connect Pro enables users to set up, deploy, monitor, and maintain communication systems in one place. With a single interface to master, the team spends less time in training. Zenitel Connect Pro is powerful, yet easy to use, with an intuitive interface. This helps the user to reduce setup time while giving them full control over the communication assets. Stay secure and up to date on the latest software patches, with a full overview of device software versions. A new-generation communication platform Zenitel Connect Pro will continue to evolve to meet industry demands for new capabilities and cybersecurity By adopting open interface standards, Zenitel Connect Pro will continue to evolve to meet industry demands for new capabilities and cybersecurity requirements. The platform also allows the partner community to add third-party services on top of functionalities in the core communication platform, further accelerating the development journey. Communication solutions “We are excited to share this news with our partners and the security industry, and we look forward to helping everyone incorporate critical communication solutions into their security infrastructure,” says Lars Paulsson, EVP for Safety and Security at Zenitel. “This new cybersecure platform opens up opportunities for our entire ecosystem of partners by extending their security offerings with safety communication solutions and enabling the addition of functionalities and services tailored to specific end-customer needs,” Paulsson explains.
OSI Systems, Inc. announces that its Security division has successfully commenced operations in Uruguay in collaboration with its Ministry of Economics and Finance to enhance security and efficiency at Uruguay's ports and borders through advanced customs screening applications. OSI Systems CEO Deepak Chopra commented, "We are excited to begin the operational phase and look forward to supporting Uruguay’s customs and border security activity.” Ongoing management training The Company is utilising the EAGLE® T60 high-energy, trailer-mounted vehicle inspection systems, performing security screening and remote image analysis utilising its proprietary CertScan® integration platform, and will also provide ongoing management training and maintenance, service and support. Mr. Chopra continued, "Our team recently participated in a ribbon-cutting ceremony with Uruguay’s government leadership, marking this significant step. With our advanced cargo screening technology and expertise, we're helping safeguard trade routes and foster economic stability in the region." Multiple international customs The Company has turnkey border and port inspection programs in operation with multiple international customs, border, and port authorities. These turnkey inspection programs have proven highly successful, improving public safety and security and increasing the accuracy of customs declarations. Under these programs, the Company, through its S2 Global business, typically manages cargo scanning equipment, supervises inspection site construction and network design, and trains local staff to analyse data on the CertScan platform. This platform integrates images and data like cargo manifests, biometrics, container and vehicle numbers, and customs declarations.
Anviz, a brand of Xthings, a global pioneer in intelligent security solutions, announces the upcoming release of its latest access control solution, the M7 Palm, equipped with cutting-edge Palm Vein Recognition technology. This innovative device is designed to provide superior accuracy, security, and convenience to high-security and privacy-sensitive environments in industries such as banking, data centres, laboratories, airports, prisons, and government institutions. Launching globally today, Anvis is gearing up to revolutionise the way users interact with access control systems. M7 Palm Vein Access Control Device The M7 Palm Vein Access Control Device offers a seamless access experience, allowing users to unlock doors with a wave of the hand. Using Palm Vein Recognition, a top-tier biometric security method, it addresses the limitations of facial and fingerprint recognition by providing a more secure, non-invasive, and user-friendly solution. Palm Vein Recognition Its non-contact nature makes it more hygienic, ideal for environments with strict health protocols Palm Vein Recognition captures the unique pattern of veins inside a person’s palm using near-infrared light. Hemoglobin absorbs the light, creating a vein map, which is converted into a secure digital template through advanced algorithms, ensuring accurate identification. Unlike facial recognition, which may raise privacy concerns, or fingerprint scans, which can be affected by wear, palm vein recognition is discreet, reliable, and harder to forge. Its non-contact nature also makes it more hygienic, ideal for environments with strict health protocols. Seamless and secure user experience The M7 Palm Vein Access Control Device leverages this advanced technology to provide a seamless and secure user experience. With a False Rejection Rate (FRR) of ≤0.01% and a False Acceptance Rate (FAR) of ≤0.00008%, the accuracy of the system far exceeds that of traditional fingerprint or face recognition methods, offering a higher level of protection for critical infrastructure and sensitive information. Device benefits The M7 Palm Vein Access Control Device stands out for its numerous advantages, making it an ideal solution for high-security environments. The benefits of using palm veins are as follows: Security: Palm Vein recognition uses a living biometric, making it nearly impossible for intruders to copy or replicate the pattern. This ensures a higher level of security than external biometric methods like fingerprints or facial recognition. Reliability: The Palm Vein structure remains largely unchanged over time, providing long-term stability and consistency in identification. Privacy: Since the technology scans internal veins rather than external features, it is less intrusive and more acceptable to users who are concerned about privacy. Hygiene: The non-contact nature of the technology allows users to simply hover their hand over the scanner without needing to physically touch any surface, making it an ideal solution for environments that prioritise cleanliness and hygiene. Precision: Palm Vein technology captures a larger surface area than fingerprint or face recognition systems, enabling the scanner to collect more data points for comparison, resulting in highly accurate identification. Moreover, the features of the M7 Palm are designed by meticulously polishing the needs of the users: Enhanced Human-Machine Interaction: Intelligent ToF laser-ranging provides accurate distance measurement, with an OLED display ensuring recognition at precise distances and delivering clear notifications to the user. High-intensity protective design for outdoors: With a narrow metal exterior design, the standard IP66 design ensures the device works well outdoors, and the IK10 vandal-proof standard ensures a robust and stable installation. PoE Powering and Communications: PoE support provides centralised power management and efficiency with the ability to remotely reboot devices, making it a convenient and flexible solution for many network applications. Two-Factor Verification Security: Supports multiple identity combinations, choosing any two of Palm Vein, RFID card, and PIN Codes to complete the identification, ensuring absolute security in special places. Biometric market projections By 2029, the global market for palm vein biometrics is projected to reach $3.37 billion As security becomes a growing priority, demand for biometric solutions like palm vein recognition is surging. By 2029, the global market for palm vein biometrics is projected to reach $3.37 billion, with a CAGR of over 22.3%. The Banking, Financial Services, and Insurance (BFSI) sector is expected to lead this growth alongside military, security, and data centre applications. Smarter, safer, and more convenient security “As a milestone product in the biometrics and security industry, till next June, Xthings will work with more than 200 partners to bring the product to markets such as North America, Western Europe, the Middle East, and Asia Pacific, empowering the clients to enjoy a safer and more convenient experience. $33 Billion market share is there, let's work together!” said Peter Chen, Product Marketing Manager. Though still in the early stages of market adoption, Anviz is committed to advancing palm vein technology. With limited competition, the M7 Palm Vein Access Control Device is poised to make a significant impact. Anviz continues to innovate, delivering smarter, safer, and more convenient security solutions globally.
The British Security Industry Association (BSIA) has appointed Pauline Norstrom and Uzair Osman as new non-executive directors of the Association’s Operating Board. Pauline Norstrom Pauline, the CEO of Anekanta®AI and Anekanta®Consulting, and a former Chair of the Association, has driven good practice for security sector technology for over 20 years. She has a background in leadership, innovation, and commercialisation, and in her current role at Anekanta®, has created the architecture for several AI risk and governance frameworks featured by the UK Government, Organisation for Economic Co-operation and Development, and the Institute of Directors. Uzair Osman Uzair Osman is a corporate executive with over 18 years of experience driving transformational growth and operational excellence across diverse sectors, including construction, security, digital innovation, and consulting. He is a Fellow of the Royal Institute of Surveyors and is a Project Management Professional(PMP) with the Project Management Institute. He is also the Managing Director of Galliford Try Asset Intelligence, an award-winning provider of integrated physical and electronic security, active fire, and artificial intelligence solutions direct to Critical National Infrastructure, high-value assets, and strategic estates within the built environment sector. Invaluable independent insight As non-executive directors, their appointments will add invaluable independent insight into board matters As non-executive directors, their appointments will add invaluable independent insight into board matters, with their respective specialist knowledge offering an invaluable contribution to the Association’s overall strategic direction. Uzair Osman, Managing Director, of Asset Intelligence, said, "I am delighted to join the BSIA Operating Board as a non-executive director and look forward to contributing to enhancing the brand of the BSIA in its mission of advancing the professional security industry." AI and remote biometrics “In this ever-changing landscape, I am excited to work with the Board and our members to navigate the opportunities and challenges ahead,” said Osman.Pauline Norstrom, CEO, of Anekanta Consulting, said, “I am honoured to be appointed as a non-executive director of the BSIA. I look forward to bringing my perspectives to the board regarding the responsible use of AI and remote biometrics in security to influence policy and create opportunities while minimising harm." Video analytics-based AI technologies “I have worked with the BSIA for over 20 years, to pioneer guidance for the safe use of emerging video analytics-based AI technologies including facial recognition software." "It is a pleasure to be working with the Association to continue the journey to promote good practice. I am also delighted to see more women in statutory and senior leadership roles, compared with 20 years ago.” New appointments Martin Watson, BSIA Chair, said, “We are delighted to welcome Pauline Norstrom and Uzair Osman to the BSIA Operating Board as non-executive directors." “With their collective years of expertise and professionalism within the security industry - and the wider business realm - our new appointments will provide a long-term term benefit to the overall direction of the Association and their contributions will be highly valued.” Pauline and Uzair will take up their posts immediately.
The modern digital world relies deeply on the Internet of Things (IoT) and the technologies that come with it. As a prominent result of this rapid transformation, global economies are heavily investing in smart city initiatives to further automate day-to-day operations, specifically transportation. It includes integrated transport networks, centralised traffic control, vehicle movement trajectories, and commuters’ database management, extending to the security and convenience of a unified ecosystem. Role of security technologies Facial recognition is one such technology that has sought centre stage in the smart city landscape According to recent reports, the global smart transportation market size is expected to amount to USD 340 billion by 2032, indicating the reformative role of security technologies to streamline transport operations and ensure commuter convenience. In order to maintain the stability of one of the most critical infrastructures for a state, the footprint of AI and advanced technologies is rising to further strengthen security operations. Facial recognition is one such technology that has sought centre stage in the smart city landscape, unveiling tremendous opportunities for operational unification and fast-paced digitisation. Enhanced smart parking security Facial recognition technology in smart parking systems offers advanced security, revolutionising how they access parking facilities. By registering facial data while entering a smart parking space, routine commuters can enjoy seamless entry and exit, as the system quickly verifies their identity and links their profile with the details of the vehicle. This not only eliminates the need for physical tickets or cards; it also streamlines the parking experience and reduces the cases of vehicle theft. Automated parking solutions The concerned person as well as the security staff are notified, allowing rapid response Facial recognition-enabled access cameras vigilantly identify the individual behind the wheels and raise alarms when a potential breach is committed. The concerned person as well as the security staff are notified, allowing rapid response. The potential for enhanced user convenience and the efficiency of automated parking solutions make facial recognition a compelling technology. Elevate security at smart transport terminals Smart terminals and ports endorse interactions with cloud-based services, allowing access to public transport resources, but remain vulnerable to security threats. In most instances, threats to property, resources, and lives could be prevented if the concerned person was identified at the entry point itself. AI-powered Facial Recognition Systems (FRS) enhance the capabilities of the existing video management system to enable real-time monitoring and accurate identification using face images. It helps deter security infringements and uphold security protocols. By mapping the entire facility into the FRS, specific zones and locations can be monitored by switching between screens. Robust support in security operations Moreover, any unidentified suspected individual can be kept under constant supervision using watch lists FRS allows security personnel to categorise people’s profiles into classified lists, like stop-list, VIP, daily commuters, repeated offenders, etc. It identifies when a person of concern enters the protected transport terminal’s perimeter, so the security staff are able to timely deploy countermeasures. Moreover, any unidentified suspected individual can be kept under constant supervision using watch lists. As and when a breach is committed, the security operator receives alerts, facilitating them to prevent issues from escalating. Convenient travel Facial biometrics-powered solutions not only allow live monitoring but are also exceptionally instrumental in enhancing the commuter experience. Interactions at transport terminals improve as a result of stringent security measures. Additionally, the system translates commuter data into comprehensive reports. So, the visitor statistics for various criteria like gender, age, and healthcare protocols can be easily inferred, enabling data-driven decision-making. This also promotes inclusivity by preparing for the convenience of commuters with special needs, particularly during peak hours. RecFaces’ ID-guard for secure travels Following a critical security incident at the Chong Nonsi Metro Station in Bangkok, the authorities sought an advanced, AI-powered solution to mitigate security risks and accelerate investigations. In response, RecFaces deployed the ready-to-use Id-Guard solution within the Video Management System (VMS) at the station. Id-Guard is a facial biometric solution that performs real-time monitoring of visitors and identification of stop-listed people through their face image It enabled searching for an unwanted person from the archived biometric data and speeding up the investigation process By equipping the video management system with facial biometrics, tourists and residents of Bangkok using Chong-Nonsi station for travel can feel safe The successful implementation of the facial recognition system in one of Bangkok’s busiest metro stations is a classic example of how this new-age technology can enhance security in smart transportation. Smart transportation: Unveiling exponential growth Technology is always permeating lives and altering even routine actions, how they travel Technology is constantly permeating the lives and transforming even routine activities, including how they travel. Rigorous testing is being conducted to ascertain the feasibility of automatic ticketing systems and contactless payment systems using facial recognition technology. The ticket holder can be guided across the terminal, ensuring entry authorisation by ticket class and reducing cases of fraudulent ticketing. Accessible service ecosystem With pilot projects already implemented in Spain, Brazil, and South Korea, biometrics offer promising prospects for enriching commuter interactions, making them more secure and convenient. It augments the transport system to build a more inclusive and accessible service ecosystem. According to Eugenia Marina, Business Development Director, RecFaces, “Smart city initiatives call for reliable technology solutions that are here to stay. And facial recognition systems have unprecedented potential in reinforcing security and convenience within the smart transportation ecosystem.”
Expert commentary
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled the EU’s dedication to individual privacy rights and generated new standards and requirements for an organisation inside or outside of the EU wanting to do business in the region. This privacy stance raises an interesting question: to what extent (if any) will France be utilising AI-assisted security and biometrics - at the upcoming Paris Summer Olympic Games? AI-assisted security systems As France prepares to host this global event, certain AI-assisted security systems like algorithmic video monitoring have been tested and are planned to be in use. The country also passed a law with a legal framework for addressing provisions of hosting the Games in their country, Law No. 2023-380. These technologies will support the police and security efforts to detect sudden crowd movements, irregular vehicle, and pedestrian movements, abandoned objects, people lying on the ground, and more, any of which could indicate an attack. Local connectivity One recent French poll found that an overwhelming number of respondents support the use of smart cameras Such technologies, which can be connected directly to localised command centers and police departments, provide an opportunity to prevent deadly incidents like the bombing at the 1996 Summer Olympics in Atlanta, GA. There are signs that citizens of the EU are becoming more receptive to such measures, with one recent French poll finding that an overwhelming number of respondents (89 percent) support the use of smart cameras in stadiums for this purpose. Biometric technology The general public and private use of biometric technology (face matching, face liveness, and other biometric modalities), on the other hand, continues to run into challenges with adoption in this privacy-focused region. For the most part, laws ban facial recognition, permitting its use only once someone has been convicted or is suspected of having committed a serious crime. Limitations of video surveillance Limiting the utility of biometrics to only video surveillance for an event of the Paris Olympics’ magnitude is not the best approach. The ability to quickly identify or de-identify possible suspects from regular attendees greatly strengthens the activities of the police and helps protect the rights of regular attendees. Consider the example of New York City detectives using facial recognition to identify a man who, in 2019, left a pair of potential bombs in the Fulton Street subway station. Benefits of facial recognition technology Many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy With facial recognition technology, it took only one hour to identify the suspect - a process that previously would have taken several hours or even days, leaving the possibility of further damage unresolved. Citing yet another example, many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy much sooner and more efficiently, aiding investigators who reportedly had to sift through 120,000 photos and nearly 13,000 videos before identifying the perpetrator. Need for real-time video With an estimated 16 million visitors expected to descend upon France for the Games - and an environment that is harder to protect from bad actors - is limiting the use of biometrics to video surveillance the most effective? In our minds, in certain high-urgency cases, such as tracking kidnapping cases or possible terrorism activity, it should be permissible for facial recognition to be applied to recorded video in real-time and without delay. Public safety Beyond this obvious good that biometrics can bring from a public safety perspective, there are other ways that biometrics can be woven into the fabric of the Summer Olympics to support a faster, more enjoyable experience for all. Consider queue management. In a few weeks, an estimated 2.3 to 3.1 million ticket holders will form lines to access Olympic events. Fingerprint scanning technology People could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket If fingerprints were captured at the point of ticket purchase and fingerprint scanning technologies made available on-site, people could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket that may be torn or damaged, or an e-ticket on a phone with a dead battery. This would speed up the processing of queues tremendously. Olympics-focused gambling activity Another area where biometrics can be beneficial is in Olympics-focused gambling activity, which is expected to gain steam as the Games get underway. Biometrics can be used to match facial images with legal documentation for age verification, and then combined with geofencing to ensure gambling participants are of legal age, depending on where they are physically based. Biometrics also makes it possible to identify, beyond the shadow of a doubt, all of the activities of particular individuals, which can help track nefarious activities like money laundering. Evolution of privacy and security We believe biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. It will be interesting to watch both the 2024 Summer Olympics and the ongoing evolution of privacy and security laws and practices in France and the European Union.
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
The adoption of innovative and interconnected door hardware systems can help overcome the challenges associated with building security, explains Daniel May of Consort Architectural Hardware. The security of our built environment and the safety of its people is paramount throughout a building’s lifecycle. While these elements remain a primary focus at each touchpoint of a construction project, today’s design teams are sooner adopting modern access control systems to address this age-old challenge, but why? Modern access control Where systems were once rudimentary, modern access control has evolved into a revolutionary factor of building design, unlocking various benefits for its many users in the process. The Internet of Things (IoT) has enhanced building security as we know it, and as technology continues to advance, more options enter the market. Following more than a decade of innovation and integration, the access control market is projected to grow year on year, from £7.8 billion in 2023 to £11.8 billion by 2028. Modern user requirements have led to several operational and technological advancements Modern user requirements have led to several operational and technological advancements during this period, and decision makers and design teams alike can now choose from a versatile selection of options. Some door hardware products now utilise smart locks, cloud control and even biometrics for example, and most recently, there’s been a substantial change to the way access control systems operate, with focus moving towards end users and ease of use. Modern access control has evolved into a revolutionary factor of building design Smart door hardware From an operational perspective, interconnected access control systems gift users with an intuitive network that improves building security through the use of real-time status updates, while also providing them with the ability to grant instant access approval and denial at the touch of a button. Often, users can operate their building’s various access points through their mobile phone, which has led to improved flexibility and efficiency in most environments - whether at home or in a public access property. The security benefits also become clear when compared to the alternative of physical keys. If a traditional key is lost or stolen, the security of a building becomes at risk until it is found or replaced. Intuitive access control systems are designed to build upon the traditional lock and key methods. By seamlessly integrating smart door hardware into both new and retrofit projects, users can manage access points and improve security across the building - without stifling ease of access, stunting future scalability or unsettling the aesthetics. Users can operate their building’s various access points through their mobile phone Access control system The PSIA standard is one of the widely recognised and respected standards for access control products As many adopt Wi-Fi infrastructures, NFC technology and cloud services into their buildings, decision makers must also consider the need for better standards. While the introduction of IoT may advance security, performance and functionality, it can also introduce new risks which must be mitigated by adhering to both localised and international standards, such as ISO 27001 for example. The Physical Security Interoperability Alliance (PSIA) standard is one of the widely recognised and respected standards for access control products and provides comprehensive requirements for systems by focusing on interoperability, scalability, and functionality. While the introduction of IoT may advance security, it can also introduce new risks Providing comprehensive requirements This standard ensures that access control products from different manufacturers can seamlessly integrate and communicate with each other, allowing for greater flexibility and choice when designing a complete access control system. After all, a one size fits all access control solution simply doesn’t exist and decision makers would be remiss in not selecting a product that aligns with their building’s needs while meeting the required standards.
Security beat
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
PKOC stands for Public Key Open Credential. It is a new standard that will meet a 30-year industry challenge and strip away much of the complexity and cost involved in protecting and administering credentials for access control. It could also accelerate the transition from cards to mobile access control. PKOC is a standards-based mobile credential that is essentially free, vendor-agnostic, and interoperable across multiple devices and systems. It is a highly secure access credential that can live on a mobile phone, in a plastic access card, or in any device capable of generating a public-private key pair. Access control systems PKOC is the newest standard of the Physical Security Interoperability Alliance (PSIA), a tax-exempt organisation created to define, recommend, and promote standards for IP-enabled security devices and systems. PSIA introduced the Physical Logical Access Interoperability (PLAI) specification in 2013 to normalise identity data across disparate physical access control systems. The PKOC specification was introduced in 2021. We’re convinced this is the future A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms “We see the benefit of implementing the PKOC technology and doing it well,” says Sam Siegel, Senior Field Applications Engineer for ELATEC, a manufacturer of credential-agnostic readers/writers. “We wanted to get involved and join the discussion.” ELATEC has been participating in PSIA for more than a year. “This is a better way to do things,” says Siegel. “The PSIA, myself included, are convinced this is the future. The challenge is to get enough people to understand that it is a seismic shift away from what has been in place for so long.” A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms. The explanation spans the concept of public key infrastructure (PKI) and the difference between symmetrical and asymmetrical digital keys. Protecting symmetrical keys A symmetrical key system, which has been used historically in the access control market, involves the use of a single proprietary digital key to both encrypt and decrypt information. This means that digital public keys must be incorporated into each access control reader in the form of a module or a license, which the reader uses to read any compatible cards. Protecting symmetrical keys has been an expensive technology challenge the access control world The need to share these digital keys (in effect, the ability to read every compatible card) securely among access control manufacturers, integrators and end users involves extra administration and costs to ensure the security of the system. Protecting symmetrical keys has been an expensive technology challenge the access control world has borne for decades. The use of proprietary keys also promotes dependence on a single manufacturer or vendor to expand the ecosystem. The use of asymmetrical keys takes away these challenges. Advantages of using asymmetrical key pairs PKOC embraces the principle of PKI (public key infrastructure), a two-key asymmetrical system used to ensure confidentiality and encryption. In effect, there are two digital "keys," one public and one private, that are used to encrypt and decrypt information, in this case, a credential for an access control system. The secure credential standard is generated independently of a third-party credential issuer. It is generated within the device. In the access control scenario, the smartphone generates a key pair in the secure element of the phone, including a private key, which is stored on the smartphone, and a public key, which serves as the user’s ID number in the access control system. Sharing the public key is not a security risk because it is worthless without the private key that is locked away on the smartphone. PKOC-enabled smartphone The smartphone must contain the private key in order to interface with the access control system When a PKOC-enabled smartphone approaches a PKOC-enabled reader, the reader sends a one-time random number (a ‘nonce’) to the smartphone, which then encrypts it using the private key, and sends it along with the public key back to the reader. The reader uses the public key to decrypt the random number, which confirms the authorised access associated with the smartphone. The signals are sent via Bluetooth Low Energy (BLE). Importantly, the private key never leaves the smartphone and is never shared with any other elements of the access control system. Therefore, there are no administrative or technical costs associated with protecting it. The smartphone must contain the private key in order to interface with the access control system using the public key. Mobile credentialing system For ELATEC, embracing PKOC provides a new way to highlight the company’s value proposition and promote it to a new group of companies; i.e., those who adopt the PKOC approach to mobile credentialing. The ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic “PKOC serves as a great way to show off our value and what we do best,” says Siegel. ELATEC provides credential readers/writers that operate in a variety of card and reader environments, incorporating an integrated BLE module to support mobile ID and authentication solutions, including PKOC. Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic and so compatible with any RFID card or mobile credentialing system, all in a small form factor (around 1 1/2 inches square). How readers and smartphones interact The PKOC standard addresses the variables of how the reader and the smartphone share information. Currently, the PKOC standard addresses communication via BLE, but the principle is the same for systems using near-field communication (NFC), ultra-wideband (UWB), or any future protocols. PKOC also defines how device manufacturers can enable devices (readers, locks, control panels, biometric devices, etc.) to securely consume the credential for authentication and access. PKOC can be used with smart cards as well as with smartphones. In the case of a smart card, the public and private keys are contained on the smart card, which communicates via NFC with the reader. The encryption/decryption scenario is exactly the same. PKOC enables users to ‘bring your own credential’ (BYOC). Public key number ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC" BLE offers a broader read range than NFC; the read range can be managed using software and/or by signalling intent or two-factor authentication. Because private keys remain secure inside a smartphone, they do not have to be incorporated into a digital wallet for security purposes, although they could be incorporated for matters of convenience. To simplify administration, the public key number can be used as a badge number. If badge numbers have already been assigned, a column could be added to the database to associate badge numbers with public key numbers. “ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC,” said Paul Massey, CEO of ELATEC, Inc. “End-users should not be limited in their solution mix to one or two vendors due to their proprietary technology. PKOC now provides the ideal combination of security, convenience, interoperability, and cost for industry participants, by industry participants.” ‘Experience PSIA’ will promote PKOC at ISC West ISC West participants include PSIM manufacturer Advancis Software and Services The flexibility of PKOC will be on display at ISC West 2023, where ‘Experience PSIA’ will register attendees and provide them with a PKOC credential that can be used with a variety of readers throughout the show. Also showcasing the PLAI standard, PSIA’s presence at ISC West will include ELATEC along with several other vendors/manufacturers. A special PSIA event will be held from 5:30 to 7:30 p.m. on March 29 at the Venetian Ball Room B&C in Las Vegas. ISC West participants include PSIM manufacturer Advancis Software and Services, which acquired Cruatech software in 2012; and Idemia, specialising in identity-related security services including facial recognition and other biometrics. Integrated security systems Also involved are Johnson Controls (JCI), an integrated security systems provider that offers a range of security products and services; and Siemens, which offers its own range of security solutions and systems. Other participants include Last Lock, which has a unique spin on internet-enabled locks; while SAFR from Real Networks offers accurate, fast, unbiased face recognition and additional computer vision features, and Sentry Enterprises provides the SentryCard biometric platform for a privacy-centric, proof-of-identity solution. Finally, rfIDEAS manufactures credential readers.
Case studies
Matrix client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options, while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. Matrix VoIP Gateway The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs, but also strategically positioned it for future advancements and scalability.
Matrix's client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs but also strategically positioned it for future advancements and scalability.
The university in rural Maharashtra is committed to providing a holistic and inclusive education that focuses on character building, intellectual growth, and community service. Its mission is to develop knowledgeable, compassionate citizens. With an emphasis on interdisciplinary studies, experiential learning, and cultural heritage preservation, the institution aims to foster creativity, innovation, leadership, and responsible global citizenship. Featuring one of the largest campuses in Mumbai, the university offers a diverse range of programmes across nine different disciplines. Challenge/Requirements The client faced considerable difficulties with their current communication system. The wired configuration demanded frequent maintenance and ongoing problems with voice communication quality persisted. The primary challenges they encountered included: Problems with wired communication: The wired system experienced issues like corrosion, causing a decline in communication quality. Call Quality: The communication system faced problems like dropped calls and interruptions during active conversations. Multi-location and Unified Communication Solution: Upgrading the infrastructure was essential to connect and unify various sites across the campus. Integration with Existing Infrastructure: The new solution had to be compatible with their current setup to bring modernisation. Redundancy: To guarantee minimal or no downtime, especially in emergencies, incorporating redundancy was essential. Matrix solution Matrix, in partnership with Shreeji Comsec, designed a solution that greatly improved the university's communication capabilities. The key aspects of this solution are summarised below: The current infrastructure relied on copper PRI lines, which needed to be upgraded to IP. To support this transition, two Matrix VoIP-PRI gateways, the SETU VTEP2P and SETU VTEP4P, were utilised. The VoIP-PRI gateways are now compatible with two Matrix IP Phones: the SPARSH VP510 and SPARSH VP210. The IP connection can now be routed through SIP (TATA) trunks via the Matrix server-based PBX, ANANT. The server-based PBX, ANANT, provided seamless communication with integrated redundancy, effectively eliminating downtime. Results observed The solution enabled the university to consolidate multiple sites into a single communication network. Legacy systems were smoothly integrated with modern VoIP technology, optimising existing investments and enhancing the overall communication infrastructure. This upgrade notably increased operational efficiency. Here is a detailed overview of the solution: Multi-location Solution: Multiple sites were integrated into a unified, comprehensive communication system. Unified Communication Solution: Integrating with the server-based PBX, ANANT, facilitated seamless collaboration and ensured uninterrupted information transfer and reception. Investment Optimisation: The integration of SIP with the Matrix Solution, seamlessly incorporated into the existing network infrastructure. This approach maximised the use of existing resources and avoided the need for additional investments. Operational Efficiency: The redundancy built into ANANT ensured minimal or no downtime, facilitating a continuous flow of information and significantly enhancing workflow efficiency. This feature was crucial for maintaining critical communications and handling emergencies effectively. Modern Features: The office benefits from advanced functionalities provided by Matrix Standard SIP desk phones, including the SPARSH VP510. These features, such as call-back and auto-answer over secure SIP communication, greatly enhance the university’s communication capabilities. The Matrix communication solution allowed the university to both enhance and modernise its communication capabilities, equipping them with advanced, state-of-the-art call features. Products offered Matrix ANANT: PBX Server for Unified Communications Matrix SETU VTEP4P: VoIP - PRI Gateway Matrix SETU VTEP2P: VoIP - PRI Gateway Matrix SETU VFXTH: VoIP - FXO - FXS Gateway Matrix SPARSH VP510E: Standard SIP Phone
Omnilert, a pioneer in active shooter solutions, announced that Sarasota County Schools in Florida is deploying its Omnilert Gun Detect system to monitor over 4,800 security cameras throughout the entire school district, representing the largest deployment of its kind in Florida aimed at thwarting the presence of weapons on school campuses. Omnilert Gun Detect is the most effective and complete AI visual gun detection system available–providing 24/7 monitoring with a near-instant response at the first sight of a gun with rich automation capabilities that can lock doors, notify police and trigger alarms to ensure the best possible outcomes in the event of an active shooter incident. Additional layers of technology Sarasota Schools educates and covers over 45,000 pupils across 56 schools and employs more than 5,200 teachers Sarasota County Schools already completed a successful deployment in one of its high schools the past year, which received overwhelmingly positive results and response from parents and staff. It is now in the process of deploying the system with the entire district’s camera network. Sarasota County Schools educates and protects over 45,000 students across 56 schools and employs more than 5,200 teachers and staff including its own police department and school resource officers. “Maintaining a safe learning environment is paramount for our school district,” said Terry Connor, Superintendent of Schools for Sarasota County. “Our district is fortunate to have a safety conscious School Board and community who understands this need and invests in solutions that will make for safer schools. It is critical to have additional layers of technology such as Omnilert Gun Detect working behind the scenes to ensure the safety our students and staff every day of the school year.” Infrastructure of safety systems “Omnilert Gun Detect clearly fit our requirements for flexible detection verification and response escalation with the ability to activate our existing infrastructure of safety systems,” said Sean O’Keefe, Director of Security at Sarasota County Schools. “Accurate gun detections and fast verifications are only the beginning of a response. It is critical for us to share the intelligence from Omnilert with our safety systems immediately to ensure we maximise as many seconds or minutes as possible for our police and security teams to respond to a potential situation and to protect lives.” Largest deployments of AI gun detection Security cameras can be altered into 24/7 monitors of weapons that never get tired and distracted Omnilert Gun Detect is protecting several hundred schools and other organisations across the country, with many deployments being the largest ever recorded. Sarasota sets the record in Florida and is the second largest in the nation next to Baltimore County Public Schools, the largest deployment of AI visual gun detection in the United States with their 7,500 cameras. These large installations highlight the ease of use and flexibility that customers experience when integrating Omnilert technology with their existing cameras and security infrastructure. Security cameras can be transformed into 24/7 monitors of weapons that never get tired and distracted and can automatically initiate a pre-planned response to save lives in the event a weapon ever came on campus. Activation of safety systems “Sarasota’s comprehensive safety program to enhance school security is a model for school districts across the nation as it combines early detection with an activation of safety systems that speeds response and removes the potential for human error,” commented Dave Fraser, CEO of Omnilert. “We make it a priority to ensure our technology integrates with other safety systems so security teams can capitalise on their existing investments and utilise a full range of capabilities to protect their people.” How Omnilert Gun Detect works Omnilert Gun Detect is an advanced AI system that detects handguns and long guns throughout a campus Omnilert Gun Detect is an advanced AI system that detects handguns and long guns throughout campus, both indoors and outdoors. Once a gun is detected, it sends an alert to a designated person at either Omnilert Monitoring centres or the customer’s security operations centre to verify detections. When a threat is confirmed, Omnilert Gun Detect triggers a series of alerts that sets security systems into motion and police into action to protect those in harm’s way. This solution gives emergency response teams advance warning before shots are fired and delivers precise information on the location and a photo and video of the potential shooter for a much more effective response. Omnilert’s software Unlike other solutions that merely provide weapon identification and verification, Omnilert Gun Detect integrates with video management systems, access control systems, emergency mass notification solutions, audio and video communication platforms and more. Omnilert’s software can easily be deployed with any existing IP-based camera and can monitor spaces that other safety technologies miss such as exterior grounds and parking lots. The software was designed with privacy concerns in mind so there is no use of biometrics like facial recognition and the live video feeds never leave the school premises.
Matrix's client, a key law enforcement body in Gujarat, plays a crucial role in ensuring the city's safety and security. Serving as the central hub for law enforcement, it is equipped with cutting-edge facilities and a highly efficient organisational structure designed for swift responses to security challenges. This agency coordinates multiple enforcement departments to protect citizens effectively. By adopting advanced telecom solutions, it aims to optimise communication, boost operational efficiency, and enhance its responsiveness in safeguarding the city. Challenge For a law enforcement agency, prompt response and effective grievance redressal are essential. The reliability of the communication system is paramount, especially when it comes to dialing an emergency number and registering complaints. However, the previous communication system faced several challenges: Unrecorded missed calls: Calls that were missed were not logged, preventing attendants from returning calls—an issue of significant concern for a law enforcement agency. Lack of IVR/Call Waiting: If all agents were occupied with calls and a user dialed the '100' emergency number, the call would be disconnected instead of playing an IVR message until an agent became available. Lack of Call Routing: Calls to '100' were always directed to the first available agent, causing that agent to be overwhelmed while others remained idle. This imbalance reduced overall efficiency and responsiveness. Solution Matrix developed a Hybrid Communication system with a mobility application tailored for the law enforcement agency. This solution specifically targeted the challenges citizens faced when dialing ‘100’ to reach the control room, to enhance response efficiency and effectiveness. The system was implemented in the following way: When a user dials '100', the call is directed through the ETERNITY GENX system to the control room, where an agent will handle the call. If Agent 1 is occupied, the ETERNITY GENX PBX system will route the call via the PRI line to another available agent or an open control room. If agents are too busy to answer, citizens calling in can leave a voicemail. A report will be generated for all calls, resolving the issue of missed calls not being logged. Results The customer had previously depended on a third-party open platform for managing complaints and faced numerous challenges. After implementing Matrix’s Hybrid Communication system, many of these issues were effectively addressed individually. For example, Collaboration: The unified communication solution facilitated seamless collaboration between headquarters and mobile staff via VARTA, ensuring uninterrupted call transfer and reception for users. Operational Efficiency: Effective call routing prevented calls from being routed exclusively to one agent, ensuring that calls were distributed among agents and maintaining overall efficiency. Citizen Response Time: The responsiveness to calls improved significantly, leading to a substantial reduction in call response times. Features Enabled: The IVR system reduced response times, and missed calls were recorded in the PBX system, effectively addressing the issue of missed call incidents. Citizen response times have decreased, and operational efficiency has improved due to effective call routing. Matrix’s Hybrid Communication system enables the enforcement body to swiftly address citizen grievances.
Cognitec Systems is providing reliable face recognition technology to Brazilian payment solutions provider - Billingpay for use in Rio de Janeiro’s public transport system. Automated face recognition Billingpay has implemented automated face recognition to facilitate digital ticketing via the transport application Jaé, to be used by more than four million users daily. Currently, about 11 thousand capture devices are installed throughout the city’s transportation system. Facial biometrics The process starts with the enrollment of facial images during the registration service The process starts with the enrollment of facial images during the registration service, which is then used to prevent revenue evasion in public transportation. Facial biometrics match the ticket holder to the correct ticket, therefore preventing fraudulent use of subsidised tickets. “The second largest city in Brazil now operates one of the most modern and secure ticketing systems in the world, with added high-performance technology from Cognitec!” comments Marcello Perrotta, CCO of Billingpay. Modern identification services Public transport users can also present their faces to log into the Jaé platform and access buses or trains without the need for a ticket or identification. “This use case is a testament to the countless capabilities of face recognition technologies for modern identification services,” says Alfredo Herrera, Cognitec’s Managing Director, adding “We are excited to be a part of this innovative project, and this successful international partnership with Billingpay!”
Round table discussion
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
The key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
Download5 surprising findings from OT vulnerability assessments
DownloadPalm vein recognition
DownloadPhysical access control
Download