Voice recognition systems
HID, a worldwide pioneer in trusted identity and physical access control solutions, announces the 2024 State of Physical Access Control Report, identifying five key trends that are shaping the future of access control. Produced by IFSEC Global in partnership with HID, the report surveyed over 1,200 security professionals across the globe to paint a picture of an industry that has been going through considerable transformation. Conducted between November 2023 and January 2024, the survey reveals...
Telaeris, Inc., a pioneering provider of handheld solutions for Physical Access Control Systems (PACS), announces its new XPressEntry handheld badge and biometric reader support for all HID Mobile Access® solutions including HID employee badge and Student ID in Apple Wallet. Traditional credentials are easily lost or forgotten creating a variety of physical security risks. In response to these challenges, organisations can now improve physical security and convenience by issuing m...
Being the catalysts of growth, smart cities are founded on a technology-powered infrastructure. Digitisation in global economies has led the way to a transformative shift to smart security, universal convenience, and accelerated advancements. By 2026, smart cities will be expected to generate an economic benefit of USD 20 trillion globally. Reliable technological solutions Unfortunately, crimes and offences are also becoming high-tech, challenging the balance in the socio-economic ecosystem....
Iris ID, the global pioneer in iris recognition technology and research for over 25 years and uClockit, the provider of a cutting-edge cloud-based platform revolutionising HR and administrative management have partnered to humanise the approach that organisations have towards administering workforce management. Iris ID and uClockit realise that a high-quality workforce management user experience and organisational efficiency are not mutually exclusive. Together these two companies will de...
The evolving digital state of economies is also witnessing an evolution in corresponding threats and risks. And in the new era of digital banking, online fraud has emerged as the most concerning threat to transactions and banking security. Losses in online fraud According to a 2022 report by the Association of Certified Fraud Examiners (ACFE), a whooping USD 4.7 trillion is lost to online frauds out of the total global corporate revenue every year. This alarming number is expected to rise man...
IDEMIA Public Security North America, the biometrics solutions pioneer for law enforcement agencies, announced that it has implemented its cloud-native, fully functional Automated Biometric Identification System, STORM ABIS, in Volusia County, Florida to support its latent print unit. The Volusia Sheriff’s Office is the first law enforcement agency in the nation implementing a cloud-native ABIS that can search county, state, and federal databases from a single application. Volusia County,...
News
The 23rd edition of the Airport Show was the venue to showcase and introduce new technologies and services in ground handling, cargo movements, and airport operations to foster agility as well as sustainability. More than 30 new innovators joined the Airport Show to introduce their cutting-edge technologies and services. Innovations introduced were a major draw at the Show, which attracted thousands of trade visitors and stakeholders. Helipad Systems Supplies Ground handling service providers and air navigation service providers, participating in the Airport Show received overwhelming response from the industry as well as trade visitors. Global Air Navigation Services (GANS), the only private sector air navigation services provider in the region certified by the UAE’s General Civil Aviation Authority (GCAA), displayed its capabilities in the engineering of Heliport Facilities and Helipad Systems Supplies and Installation. GSE Zone, in partnership with dnata, witnessed the showcasing of innovations presented by ground-handling equipment manufacturers. GSE Zone at Airport Show 2024 Mallaghan trucks This innovative choice aligns seamlessly with Dnata's dedication to environmental responsibility Big players like dnata showcased Mallaghan's cutting-edge trucks for catering operations, highlighting its commitment to sustainability. By opting for Mallaghan trucks equipped with EURO 6 technology, dnata achieves an impressive 80% reduction in emissions compared to EURO 5 standards, along with a 66% reduction in permitted particulate mass. This innovative choice aligns seamlessly with dnata's dedication to environmental responsibility and engineering excellence. Tisabas Operation, Towbarless tractor dnata also showcased ‘Tisabas Operation’, a folding baggage conveyor system for loading and unloading bags, cargo, and mail in aircraft. This system is created to help prevent back injuries caused by working in confined spaces, repetitive lifting, and twisting of loads. It also helps to reduce damage to aircraft and to customer baggage with fewer claims. dnata also displayed the Towbarless tractor, an electric vehicle for towing aircraft at airports. SDX 10060 XDi Smith Detection showcased SDX 10060 XDi, a groundbreaking advancement in security screening technology. The system accurately identifies molecular structures by utilising X-ray Diffraction (XRD), revolutionising object detection even among items with similar densities. Smiths Detection Stand at Airport Show 2024 Key features include automated alarm resolution for hold baggage screening, enhancing both security and operational efficiency. Screening accuracy SDX 10060 XDi elevates screening accuracy for narcotics and contraband, bolstering security measures Additionally, in-line automatic air cargo screening is streamlined, improving security and operational speed for small parcels and mail. The SDX 10060 XDi also elevates screening accuracy for narcotics and contraband, bolstering security measures at international checkpoints. Panel discussion The Airport Show 2024 hosted a high-profile panel discussion titled “Elevating Passenger Experience: Investing in Innovation to Capture Traveler Hearts.” At a time when the travel industry is facing unprecedented changes and challenges, the session explored the critical importance of passenger experience in today’s competitive landscape and the pivotal role of innovation in shaping it. Experts and pioneers from the industry shared their insights and strategies for elevating the passenger experience through innovative solutions and technologies. Critical nature of passenger experience The panelists highlighted innovation as the driving force behind enhancing and transforming this experience The session, moderated by Dr. Nikhil Kilpady, Director - Aerospace & Defence, Frost & Sullivan, featured Nagy Abu Zeid, Vice President of Strategy and Planning at Oman Airports, Alpros Mohammad Hamzouq, Quality, Safety and Risk Management Director, Airport International Group (AIG), Anurag Shandilya, Head of Operations, Noida International Airport in India, Ismail Issa, Manager Innovation - Web 3.0, Futures & Innovation at Emirates Group, and Ioana Apintei, Head of Product at AirportLabs. The panelists emphasised the critical nature of passenger experience as a key differentiator in the competitive travel industry. They highlighted innovation as the driving force behind enhancing and transforming this experience. Data-driven insights and feedback mechanisms The speakers discussed the importance of continuously adapting to the evolving expectations and preferences of travelers through innovative approaches, leveraging data-driven insights and feedback mechanisms. They also explored innovative passenger-centric solutions and advanced technologies that have significantly improved passenger experiences across different travel modes, including biometrics, AI, IoT, and seamless travel journey solutions.
Interface Systems, a renowned managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, has announced the launch of an enhanced intelligent voice-down system. This updated solution now seamlessly integrates with Interface Systems’ Interactive Security Operations Centre (iSOC), allowing for immediate intervention by remote specialists to augment AI-powered automated deterrents. Voice-down system As quick-service restaurants (QSRs) and retail establishments continue to battle loitering, vandalism, and burglaries, they are looking for effective solutions to automatically detect and discourage loitering and other suspicious activity. Interface’s intelligence voice-down system can proactively detect individuals and vehicles loitering or behaving suspiciously by leveraging state-of-the-art AI-enabled cameras. Live video and audio feeds If the threat persists even after delivering automated voice-down commands, the system will escalate the issue It uses customisable audio messages, auxiliary lighting, and sirens to effectively alert potential troublemakers to the security presence and possible law enforcement response. If the threat persists even after delivering automated voice-down commands, the system will escalate the issue to remote intervention specialists at the iSOC. Using live video and audio feeds, intervention specialists can quickly assess the situation and take appropriate action, including notifying law enforcement. Proactive security measures "Interface Systems remains committed to delivering innovative solutions that enhance security, streamline operations, and provide peace of mind for businesses nationwide," said Steve Womer, SVP of Engineering at Interface Systems. He adds, "Our upgraded intelligent voice-down solution represents a significant step forward in proactive security measures for our customers." AI-detection technology Steve Womer continues, "By integrating remote intervention capabilities directly into our intelligent voice-down system, Interface is responding faster than ever to potential threats, safeguarding customer premises and ensuring the safety of their customers and staff." The enhanced voice-down solution can also be deployed for retail, restaurant, and car wash chains that are already leveraging Interface’s Virtual Security Guard services. This integration offers a comprehensive security solution that combines cutting-edge AI-detection technology with expert human oversight.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, concluded its “Powering Innovation 2024: A Genetec Empower 360 roadshow” in Saudi Arabia. The roadshow took place on 13 May at the Narcissus Hotel Riyadh and showcased the company’s latest innovations and strategic vision for the future. Genetec roadshow As Saudi Arabia continues to prioritise smart city initiatives, physical security assumes paramount importance within the nation's overarching security infrastructure. Echoing this dedication, the Genetec roadshow delved into critical topics impacting security professionals. In collaboration with Axis Communications, HID Global, and Ipsotek, the event explored biometrics, video analytics, and access control solutions that transcend conventional boundaries. Central to the discussions was the exploration of a unified approach to seamlessly integrate these solutions. Regional physical security Attendees gained exclusive insights into the latest Genetec technologies, upcoming product launches The event covered important themes around the state of regional physical security and the evolving trends and best practices for safeguarding assets and infrastructure. Attendees gained exclusive insights into the latest Genetec technologies, upcoming product launches, and strategic initiatives shaping the industry landscape. Additionally, they had the opportunity to engage in live demonstrations of solutions and connect with both industry experts and partners to explore emerging trends and technologies. Innovation and collaboration "At Genetec, we're committed to shaping the future of physical security and public safety through innovation and collaboration," said Firas Jadalla, Regional Director – Middle East, Turkey & Africa, Genetec Inc. “Our goal is to equip our customers in with the resources and knowledge they need to effectively navigate the complex world of physical security. The roadshow was a testament to our dedication to empowering professionals with cutting-edge solutions. In collaboration with our long-standing partners, we hope this event in Riyadh paves the way for a safer, smarter tomorrow." SaaS solution The “Powering Innovation 2024: A Genetec Empower 360 roadshow” also showcased Security Center SaaS, a massively scalable, open, and unified software as a service (SaaS) solution. The new offering combines access control, video management, forensic search, intrusion monitoring, automation, and many other advanced security capabilities.
Money Carer, a UK-based national social enterprise focused on providing secure money management services for vulnerable people, has partnered with global card manufacturer Tag Systems and biometrics company Fingerprint Cards AB (Fingerprints™). The companies have created and launched a biometric-enabled ‘carer card’, addressing barriers that have traditionally restricted vulnerable people in the UK from accessing financial services. Carer card In 2010, Money Carer invented and launched the first ‘carer card’, a secure shopping card solution that enables carers to make purchases for those they care for. The card system has since evolved, offering balance limits, a sweep system, free ATM withdrawals, and spending controls. The Money Carer Card supports hundreds of care providers and thousands of individual carers across the UK and is also used by many local authorities and law firms who are responsible for managing the finances of their vulnerable clients. PIN for authentication Vulnerable cardholders, or their carers, no longer need to remember and enter a PIN Before incorporating Fingerprints’ technology, the Money Carer Card relied on the PIN as a means of authentication. Vulnerable cardholders, or their carers, no longer need to remember and enter a PIN to make a payment. They simply place their selected thumb or finger on the sensor and tap to make the payment at the point of sale. This simultaneously simplifies the checkout process while enhancing security. Inclusivity and autonomy Sean Tyrer, CEO of Money Carer, comments, “At Money Carer, we are committed to promoting inclusivity and autonomy." "For many of our clients, especially those with memory or visual impairments, the PIN on a payment card is a barrier that restricts financial inclusivity. With biometrics, our clients will never have to remember or input a PIN again, opening doors to financial autonomy that were previously closed.” T-Shape® (T2) sensor module BCaaS allows Money Carer to issue the next generation of cards seamlessly The next-generation carer cards come from Tag Systems, which incorporate Fingerprints’ second-generation T-Shape® (T2) sensor module, software platform, and algorithm. Tag’s unique Biometric Card as a Service (BCaaS) offering which includes payment processing, allows Money Carer to issue the next generation of cards seamlessly. The cards will be available soon through the Money Carer website and app. For each account with Money Carer, up to five biometrics-enabled cards can be issued. Simple authentication Adam Philpott, CEO of Fingerprints, comments, “Our primary objective at Fingerprints has always been to make strong authentication simple." "We’re extremely proud to be part of a project directly addressing barriers that have traditionally restricted vulnerable people from accessing financial services. This is a perfect example of how technology can be used to drive inclusivity.”
The future of retail security and customer experience is here, and it's powered by facial recognition technology! RecFaces, a provider of facial biometric software solutions, in collaboration with, the Shopping Centre Association of India (SCAI) is ready to host the ‘Face Forward: Revolutionising Safety and Ease at Shopping Centres’ virtual discussion. 22 May 2024 is the date on the agenda for this virtual discussion which will be the engine of change for the APAC and MENA retail sector, giving the best experts and innovators the much-needed platform to discuss the limitless opportunities. Aim for efficiency The session will be headed by experts in facial biometrics and the shopping centres industries. RecFaces is happy to be a part of this conversation with the industry and to explore the immense possibilities It will shed light on the major problems of shopping centres, from security operations to customer experience. And how facial recognition systems can be applied to strike these challenges with an aim for efficiency. RecFaces is happy to be a part of this conversation with the industry and to explore the immense possibilities that facial biometrics can unlock in the retail sector. Facial biometrics "With an added layer of security, Facial Biometrics facilitates frictionless identification," says Sukrit Varma, Global Marketing Partner, APAC and MENA regions, RecFaces. "In the era of fast and personalised services, facial biometrics helps enhance the customer experience by decreasing the average handling time per customer, enabling higher efficiency and increased profits." Enhancing customer experience "We are thrilled to partner with RecFaces through this event," adds Anjeev Kumar Srivastava, Chief operating officer, of SCAI. "Together, we aim to explore innovative solutions that will shape the future of shopping centres and enhance the overall customer experience."
Financial landscape is growing expeditiously, offering new opportunities of economic and commercial growth. And experts suggest that facial recognition can be uniquely profiting to lever and protect this growth. RecFaces, an international facial recognition software vendor, is excited to announce their upcoming webinar focusing on the transformative role of Facial Recognition Systems in the Banking Sector. The webinar, titled ‘Facial Recognition In Banks: A Win-Win Game To Improve Security And Customer Experience’ will be held at 12:00 PM GST on May 14th, 2024. New arenas of banking transformation The rapidly paced banking growth allows the implementation of unconventional solutions The undeniable importance of technology to support and uplift the banking sector comes as an opportunity for exploring new arenas of banking transformation. The rapidly paced banking growth allows the implementation of unconventional solutions that strengthen the smart approach towards banking processes like KYC, customer verification authentication, etc. However, it is equally important not to turn a blind eye to the many challenges technology poses, identity threat being the most crucial of them. Exploring the best solutions that can help tackle this and numerous other concerns, facial biometrics outshines traditional security systems. Another layer of protection Automation and digitalisation of KYC, identity verification and unified financial management has become the new way of things. The prime goal remains the same-protection of users’ information, identity and experience. Facial recognition technology is such a solution that stretches across physical, digital and experience security. For example, it provides a distinctive mechanism that functions in real-time, reducing false positives during the verification process. Rather than just adding another layer of protection, it can offer commendable benefits to save resources and efforts required for detecting frauds, identity theft and data breaches. Financial ecosystem Facial recognition contributes to the safety of banking and also matches with the growing trend By adopting a touchless mechanism, facial recognition contributes to the safety of banking and also matches with the growing trend that young users are keen about, which is digital banking. Touching upon these benefits of facial recognition technology in the banking sector, the potential this unification offers is far-reaching and futuristic. As the financial ecosystem evolves towards online banking, RecFaces is among pioneers facilitating this evolution. Reliable system for security and convenience “Facial recognition is not a novel technology. It has been around for years and is continuously evolving to be the best security solution out there. It has incredible security, scalability and accuracy features, which makes it a power-packed and reliable system for security and convenience. The webinar is extremely important to attend for those seeking to upscale their financial infrastructure." said Eugenia Marina, Business Development Director, MENA Region, RecFaces. “The financial industry is booming and is expected to grow exponentially. To keep pace with the environment and support its growth, technologically affluent facial recognition systems can revolutionise the financial landscape,” said Sukrit Varma, Global Marketing Partner, APAC and MENA regions, RecFaces.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
The adoption of innovative and interconnected door hardware systems can help overcome the challenges associated with building security, explains Daniel May of Consort Architectural Hardware. The security of our built environment and the safety of its people is paramount throughout a building’s lifecycle. While these elements remain a primary focus at each touchpoint of a construction project, today’s design teams are sooner adopting modern access control systems to address this age-old challenge, but why? Modern access control Where systems were once rudimentary, modern access control has evolved into a revolutionary factor of building design, unlocking various benefits for its many users in the process. The Internet of Things (IoT) has enhanced building security as we know it, and as technology continues to advance, more options enter the market. Following more than a decade of innovation and integration, the access control market is projected to grow year on year, from £7.8 billion in 2023 to £11.8 billion by 2028. Modern user requirements have led to several operational and technological advancements Modern user requirements have led to several operational and technological advancements during this period, and decision makers and design teams alike can now choose from a versatile selection of options. Some door hardware products now utilise smart locks, cloud control and even biometrics for example, and most recently, there’s been a substantial change to the way access control systems operate, with focus moving towards end users and ease of use. Modern access control has evolved into a revolutionary factor of building design Smart door hardware From an operational perspective, interconnected access control systems gift users with an intuitive network that improves building security through the use of real-time status updates, while also providing them with the ability to grant instant access approval and denial at the touch of a button. Often, users can operate their building’s various access points through their mobile phone, which has led to improved flexibility and efficiency in most environments - whether at home or in a public access property. The security benefits also become clear when compared to the alternative of physical keys. If a traditional key is lost or stolen, the security of a building becomes at risk until it is found or replaced. Intuitive access control systems are designed to build upon the traditional lock and key methods. By seamlessly integrating smart door hardware into both new and retrofit projects, users can manage access points and improve security across the building - without stifling ease of access, stunting future scalability or unsettling the aesthetics. Users can operate their building’s various access points through their mobile phone Access control system The PSIA standard is one of the widely recognised and respected standards for access control products As many adopt Wi-Fi infrastructures, NFC technology and cloud services into their buildings, decision makers must also consider the need for better standards. While the introduction of IoT may advance security, performance and functionality, it can also introduce new risks which must be mitigated by adhering to both localised and international standards, such as ISO 27001 for example. The Physical Security Interoperability Alliance (PSIA) standard is one of the widely recognised and respected standards for access control products and provides comprehensive requirements for systems by focusing on interoperability, scalability, and functionality. While the introduction of IoT may advance security, it can also introduce new risks Providing comprehensive requirements This standard ensures that access control products from different manufacturers can seamlessly integrate and communicate with each other, allowing for greater flexibility and choice when designing a complete access control system. After all, a one size fits all access control solution simply doesn’t exist and decision makers would be remiss in not selecting a product that aligns with their building’s needs while meeting the required standards.
If you were to ask people outside our industry what door and access security entails, chances are their answers would reflect their common encounters with locks, security guards, cameras, and maybe metal detectors, badges, or automatic doors. But if they were curious enough, they’d probably be astounded to learn how extensive, intricate, and interesting the business can be and, of course, how vital it is to life safety, physical security, and cybersecurity. Integrated, interoperable solutions They’d also discover that it’s not just about levers, deadbolts, and other products. Instead, it’s a system of many systems, integrated, interoperable security solutions that cover everything from access control, video surveillance, fire alarms, and communications to server rooms, IT networks, energy efficiency, and more. Partnerships to keep up with changing needs A manufacturer’s support of their customers is how prepared they are to respond with high-quality advice Integral to the future success of the openings solutions industry is how well manufacturers and security experts keep up with the changing threat landscape and their customers’ evolving needs. Part of a manufacturer’s support of their customers is how prepared they are to respond with high-quality advice, service, and innovations that address the questions and concerns that arise. That’s why more developers, designers, and end-users alike are leaning on partnerships with visionary manufacturing companies and systems integrators who proactively keep their ear to the ground and an eye on the future. Caution: curves ahead As we look toward that future here in North America, there will always be forces of change to contend with and the accompanying impact on people’s safety, security, health, and livelihoods that our industry will need to address. The forces range from the incessantly unfolding threat scenarios in our country and the world’s geo-political dynamics to climate change and a host of other shifting factors, including the ways we want to work post-pandemic. Bypassing tailored approach Commoditisation poses risks to customised systems integration, good design, the environment Like many industries, ours has seen a change in the level of commoditisation in recent years. While this may give some customers access to cheaper door products in the short term, it usually means bypassing a tailored and more effective approach to security solutions that better meet risk assessment needs for the long haul. It can also get in the way of fulfilling a customer’s forward-thinking requirements for sustainable and aesthetic building materials. In other words, commoditisation, with its tendency toward “sameness” and dependency on less sustainable, corner-cutting materials and processes, poses risks to customised systems integration, good design, the environment, and potentially security itself. Change for the better Fortunately, change has its upside, especially as it applies to innovation, the counterforce to commoditisation. It’s the primary reason why progressive architects, integrators, and security professionals in North America keep gravitating to manufacturers with the instincts and resources to make bold investments in people, new ideas, and processes that produce advanced, planet-friendly solutions. From our view of the door security industry, sustainability will be a central component of innovation from here on out, where the development of new solutions and products is guided by practices and values that reduce their environmental footprint and increase their positive impact. Sustainably-made solutions Transparency in the form of documentation and third-party certifications to back up sustainability claims Along with being a top-down priority for certain manufacturers, sustainably made solutions and products are in higher demand than ever from the design, building, security, and end-user communities. They want to know about the carbon footprint and health impact of product ingredients, their recyclability, and how responsibly things are being made, packaged, and delivered. And they expect transparency in the form of documentation and third-party certifications to back up sustainability claims. Resilience Along with sustainability, a greater focus on resilience has emerged. Climate change is being looked at as a key contributor to the increase in wildfires and the intensity of windstorms and flooding. There will continue to be an expanding need moving forward for FEMA-rated storm shelters, fire- and water-resistive doors, and even blast-resistant openings for certain locations. On the near horizon Facial recognition has long been in use in government and other high-security applications The door security industry is also seeing a fusion of technologies, including newer touchless/contactless opening solutions that incorporate improved biometric access credentials like facial recognition. Facial recognition has long been in use in government and other high-security applications, and we’re starting to see more adoption and willingness to use advanced biometrics devices for door access. Video sensing data and analytics Fortunately, there are new strides regarding the transparency of the algorithms relating to facial recognition. Reassurances about the prevention of bias will help further that adoption. Voice and video will also soon become more prevalent for building and security management by using video sensing data and analytics to inform door security solutions. These developments often stem from the convergence of application engineering and systems integration. Application engineering It also advances the de-commoditisation of security and access control solutions Openings solutions innovators and manufacturers receive vital feedback and insight from both channel partners and customers about the characteristics of a vertical market and/or region. Not only does this partnership require trust and close working relationships, but it yields near and longer-term advantages to all participants. It also advances the de-commoditisation of security and access control solutions. Serving underserved communities Smaller businesses need to manage the security and safety of their personnel and assets just as larger operations do. The challenge has been how to offer the right fit of robust door security solutions that also fit these organisations’ budgets. Historically, they’ve been caught between having to choose an enterprise system that would provide the security they need but comes with a high price tag or settling for mechanical locking doors and a fire alarm system that will at least satisfy a certificate of occupancy requirement. Smart lock system Many small business owners want technology that’s simple to install, even DIY in some cases Many small business owners would like to add a smart lock system to enhance their company’s security which also gives them the flexibility to issue mobile credentials and manage employee and visitor access remotely. Ultimately, they’re looking for a higher level of functionality than what’s available at the low end but something with far less infrastructure and at a lower cost than what’s inherent with higher-end solutions. They also want technology that’s simple to install, even DIY in some cases. Scalable electronic access control Supporting these underserved customers requires developing scaled solutions to match the fewer doors, employees, and amount of space that smaller businesses need. This unique approach to electronic access control is new, but it’s already proving to be successful in helping organisations better manage their time, resources, and security. Training The need for expanded solutions awareness, product knowledge, and installation training is also growing The need for expanded solutions awareness, product knowledge, and installation training is also growing. Retirements and other changes within the locksmithing, systems integration, and facilities management sectors continue to affect how our industry needs to recruit, develop, and retain talent. So do technological advancements in electronic access control and door security hardware overall. Change, innovation, and learning A manufacturer or organisation that can offer comprehensive training led by seasoned professionals will go a long way toward expediting the onboarding of new hires and providing continuing education for experienced professionals at all levels and from all disciplines connected to safety and security. Ultimately, door security experts and companies who embrace change, innovation, and learning will gain the extra edge customers are always looking for to add value to their investments in security.
Security beat
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
PKOC stands for Public Key Open Credential. It is a new standard that will meet a 30-year industry challenge and strip away much of the complexity and cost involved in protecting and administering credentials for access control. It could also accelerate the transition from cards to mobile access control. PKOC is a standards-based mobile credential that is essentially free, vendor-agnostic, and interoperable across multiple devices and systems. It is a highly secure access credential that can live on a mobile phone, in a plastic access card, or in any device capable of generating a public-private key pair. Access control systems PKOC is the newest standard of the Physical Security Interoperability Alliance (PSIA), a tax-exempt organisation created to define, recommend, and promote standards for IP-enabled security devices and systems. PSIA introduced the Physical Logical Access Interoperability (PLAI) specification in 2013 to normalise identity data across disparate physical access control systems. The PKOC specification was introduced in 2021. We’re convinced this is the future A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms “We see the benefit of implementing the PKOC technology and doing it well,” says Sam Siegel, Senior Field Applications Engineer for ELATEC, a manufacturer of credential-agnostic readers/writers. “We wanted to get involved and join the discussion.” ELATEC has been participating in PSIA for more than a year. “This is a better way to do things,” says Siegel. “The PSIA, myself included, are convinced this is the future. The challenge is to get enough people to understand that it is a seismic shift away from what has been in place for so long.” A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms. The explanation spans the concept of public key infrastructure (PKI) and the difference between symmetrical and asymmetrical digital keys. Protecting symmetrical keys A symmetrical key system, which has been used historically in the access control market, involves the use of a single proprietary digital key to both encrypt and decrypt information. This means that digital public keys must be incorporated into each access control reader in the form of a module or a license, which the reader uses to read any compatible cards. Protecting symmetrical keys has been an expensive technology challenge the access control world The need to share these digital keys (in effect, the ability to read every compatible card) securely among access control manufacturers, integrators and end users involves extra administration and costs to ensure the security of the system. Protecting symmetrical keys has been an expensive technology challenge the access control world has borne for decades. The use of proprietary keys also promotes dependence on a single manufacturer or vendor to expand the ecosystem. The use of asymmetrical keys takes away these challenges. Advantages of using asymmetrical key pairs PKOC embraces the principle of PKI (public key infrastructure), a two-key asymmetrical system used to ensure confidentiality and encryption. In effect, there are two digital "keys," one public and one private, that are used to encrypt and decrypt information, in this case, a credential for an access control system. The secure credential standard is generated independently of a third-party credential issuer. It is generated within the device. In the access control scenario, the smartphone generates a key pair in the secure element of the phone, including a private key, which is stored on the smartphone, and a public key, which serves as the user’s ID number in the access control system. Sharing the public key is not a security risk because it is worthless without the private key that is locked away on the smartphone. PKOC-enabled smartphone The smartphone must contain the private key in order to interface with the access control system When a PKOC-enabled smartphone approaches a PKOC-enabled reader, the reader sends a one-time random number (a ‘nonce’) to the smartphone, which then encrypts it using the private key, and sends it along with the public key back to the reader. The reader uses the public key to decrypt the random number, which confirms the authorised access associated with the smartphone. The signals are sent via Bluetooth Low Energy (BLE). Importantly, the private key never leaves the smartphone and is never shared with any other elements of the access control system. Therefore, there are no administrative or technical costs associated with protecting it. The smartphone must contain the private key in order to interface with the access control system using the public key. Mobile credentialing system For ELATEC, embracing PKOC provides a new way to highlight the company’s value proposition and promote it to a new group of companies; i.e., those who adopt the PKOC approach to mobile credentialing. The ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic “PKOC serves as a great way to show off our value and what we do best,” says Siegel. ELATEC provides credential readers/writers that operate in a variety of card and reader environments, incorporating an integrated BLE module to support mobile ID and authentication solutions, including PKOC. Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic and so compatible with any RFID card or mobile credentialing system, all in a small form factor (around 1 1/2 inches square). How readers and smartphones interact The PKOC standard addresses the variables of how the reader and the smartphone share information. Currently, the PKOC standard addresses communication via BLE, but the principle is the same for systems using near-field communication (NFC), ultra-wideband (UWB), or any future protocols. PKOC also defines how device manufacturers can enable devices (readers, locks, control panels, biometric devices, etc.) to securely consume the credential for authentication and access. PKOC can be used with smart cards as well as with smartphones. In the case of a smart card, the public and private keys are contained on the smart card, which communicates via NFC with the reader. The encryption/decryption scenario is exactly the same. PKOC enables users to ‘bring your own credential’ (BYOC). Public key number ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC" BLE offers a broader read range than NFC; the read range can be managed using software and/or by signalling intent or two-factor authentication. Because private keys remain secure inside a smartphone, they do not have to be incorporated into a digital wallet for security purposes, although they could be incorporated for matters of convenience. To simplify administration, the public key number can be used as a badge number. If badge numbers have already been assigned, a column could be added to the database to associate badge numbers with public key numbers. “ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC,” said Paul Massey, CEO of ELATEC, Inc. “End-users should not be limited in their solution mix to one or two vendors due to their proprietary technology. PKOC now provides the ideal combination of security, convenience, interoperability, and cost for industry participants, by industry participants.” ‘Experience PSIA’ will promote PKOC at ISC West ISC West participants include PSIM manufacturer Advancis Software and Services The flexibility of PKOC will be on display at ISC West 2023, where ‘Experience PSIA’ will register attendees and provide them with a PKOC credential that can be used with a variety of readers throughout the show. Also showcasing the PLAI standard, PSIA’s presence at ISC West will include ELATEC along with several other vendors/manufacturers. A special PSIA event will be held from 5:30 to 7:30 p.m. on March 29 at the Venetian Ball Room B&C in Las Vegas. ISC West participants include PSIM manufacturer Advancis Software and Services, which acquired Cruatech software in 2012; and Idemia, specialising in identity-related security services including facial recognition and other biometrics. Integrated security systems Also involved are Johnson Controls (JCI), an integrated security systems provider that offers a range of security products and services; and Siemens, which offers its own range of security solutions and systems. Other participants include Last Lock, which has a unique spin on internet-enabled locks; while SAFR from Real Networks offers accurate, fast, unbiased face recognition and additional computer vision features, and Sentry Enterprises provides the SentryCard biometric platform for a privacy-centric, proof-of-identity solution. Finally, rfIDEAS manufactures credential readers.
Case studies
Biometrics company, Fingerprint Cards AB (Fingerprints™), has upgraded the physical access security of its Gothenburg HQ. S-Key biometric access cards from Freevolt Technologies Limited, which embed Fingerprints’ own T2 sensors, have been implemented across the entire Gothenburg site. The updated authentication system further strengthens Fingerprints’ workplace security and enables role-based access control, whilst ensuring a convenient and easy-to-use experience. Role-based access control Fingerprints’ Gothenburg HQ has security gates to enter and exit the building, and restricted areas for hardware and software R&D. By replacing access keyfobs with biometrics access cards, site-wide security has been enhanced and role-based access control has been enabled to better control access to sensitive areas of the site. By replacing traditional security methods based on something they know/have with something they are, multi-factor authentication has been enabled while maintaining convenience for employees. Fingerprints’ latest ‘T2’ sensors Solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs Caroline Krüger, CHRO of Fingerprints comments: “The workplace has evolved significantly in recent years. At Fingerprints, we offer hybrid working whilst still ensuring our workforce has 24/7 access to HQ. Amidst this dynamic working environment, it is essential our team feels the workplace is accessible and safe. This requires a flexible, secure and convenient access control solution.” Fingerprints has implemented Freevolt’s flagship biometric access card solution, S-Key. The solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs. The card incorporates Fingerprints’ latest ‘T2’ sensors which deliver optimised image quality, processing speed and power efficiency. Traditional security methods Adam Philpott, CEO of Fingerprints comments: “To meet today’s security challenges we must move away from traditional security methods. And, as a biometrics company, it is important that we lead the way in ensuring robust, frictionless security in our own operations." "There is an opportunity here too; what can we learn, what innovations will we identify by using these systems day to day? I look forward to continuing our strong and innovative collaboration with Freevolt technologies.” Energy harvesting technology Gonzalo de Gisbert, Head of Product & Business Development at Freevolt Technologies, adds: “Fingerprints are pioneers in biometrics, with sensors in billions of products, so they know what makes a good biometric solution. We’re therefore thrilled that Fingerprints has chosen S-Key to strengthen security at their global headquarters, in Gothenburg." "Our pioneering radio frequency energy harvesting technology combined with Fingerprints’ ‘T2’ sensors, known as FPC 1323, enables S-Key to be completely battery-less, lasting for many years. Roll-out was seamless, with everyone set up in less than 1 hour. That’s simple, safe, and secure biometrics, powered by Freevolt.”
In a landmark achievement for air travel technology, Zayed International Airport has successfully processed over one million passengers through Abu Dhabi’s new terminal since its inauguration on 15 November 2023. This marks a significant milestone in the journey towards enhanced travel efficiency and security, showcasing the power of cutting-edge biometric technology. Building on a long-term commitment to advancing airport capabilities, IDEMIA has been at the forefront of innovation in the UAE since 2011. The deployment of a comprehensive border management solution at Abu Dhabi Airport, featuring the world’s first multi-biometric entry/exit system, has significantly bolstered border security while simultaneously enhancing the passenger experience and throughput. The success of this groundbreaking project has led to its extension to the country’s four other international airports. Rollout of cutting-edge biometrics STJ solution uses advanced facial recognition technology to simplify the passenger venture The Single Token Journey (STJ) solution, a highlight of this collaboration, employs advanced facial recognition technology to streamline the passenger experience. By assigning a unique digital identifier to every traveller, the STJ solution eliminates the need for multiple documents, enabling passengers to move from curb to gate, including the border clearance step, in a record time of just 12 minutes. "The initial rollout of cutting-edge biometrics at Zayed International Airport underscores our dedication to enhancing airport experiences through innovation and technology, ensuring efficiency, convenience, and superior service. Once fully implemented, Abu Dhabi will pioneer as the world’s first airport with biometrics integrated at every stage, ensuring travellers enjoy a seamless, safe, and secure journey," Elena Sorlini, MD and CEO, Zayed International Airport. Efficiency of the STJ solution "We are thrilled to witness the transformative impact of our biometric solutions at Zayed International Airport’s new terminal. This milestone is not just a testament to our successful collaboration with Zayed International Airport but also a clear indicator of our commitment to enhancing the travel experience through innovation." "The processing of over one million passengers since November is a significant achievement for us, and it underscores the scalability, security, and efficiency of the STJ solution. Together, we are setting a new global standard for passenger facilitation," Osama Al Makhamreh, Vice President, Sales – Middle East & Africa, IDEMIA Public Security. Zayed International Airport’s commitment This innovative approach not only enhances security but significantly improves the overall passenger experience. The success of the STJ solution at Zayed International Airport marks a pioneering step towards transforming air travel across the Middle East and potentially the world. The initiative aligns with Zayed International Airport’s commitment to adopting cutting-edge technologies that streamline the travel process, reinforcing the UAE’s position as a pioneering hub for technological advancement and superior passenger facilitation.
GX-MAX-DT35B Smart Care Medical Alarm comes with a brand-new case design. The battery level and the cellular signal strength will be indicated through the white bar on the top cover. The system supports VoLTE (voice over LTE), offering better quality of voice communication and calling experience. In addition, the current status of the system, for example, in learning mode or alarm reporting, will be also indicated through the LED backlight of the large Help button. Users can always be informed of the system status and have peace of mind. GX-MAX-DT35B GX-MAX-DT35B Smart Care Medical Alarm is an all-in-one wellness and personal safety medical alarm solution GX-MAX-DT35B can be compatible with Bluetooth medical devices, like blood glucose/blood pressure monitors, pulse oximeters, etc., to track medical data and remote monitoring directly from caregivers/physicians; and also has telecare alarm features, including emergency monitoring, inactivity monitoring, voice control, and home automation capabilities to assist seniors to have a more secure, healthy living. GX-MAX-DT35B Smart Care Medical Alarm is an all-in-one wellness, and personal safety medical alarm solution, bridging medical health monitoring and emergency alarms to keep seniors safe in their own homes. Functions Bluetooth Medical Device Pairing GX-MAX-DT35B is compatible with BluetoothMedical devices, like blood pressure/blood glucose monitors, pulse oximeters, thermometers, etc., to track health and medical data and allow caregivers/physicians to remotely monitor and provide treatment as needed. Wi-Fi Hotspot GX-MAX-DT35B can serve as a Wi-Fi hotspot, allowing users’ computers, smartphones, or other devices to connect and access the Wi-Finetwork. Smart Home Automation ZigBee, Z-Wave, or Bluetooth automation devices are incorporated into GX-MAX-DT35Bcreates a smarter and safer home, by autotuning on hallway lights at night to decrease the chance of a fall; or auto turn on the heater if there’s a sudden temperature drop. Location Tracking GX-MAX-DT35B can be paired with the BRPD-1 Bluetooth pendant, a small wearable panic button that partners with a smartphone application for GPS location reporting and triggers a help alarm with one button press, whether the user is at home or out for a walk. Connected for Healthier, Secure Living Voice Control GX-MAX-DT35B is compatible with Google Home and Amazon Alexa voice control to control home electronic devices, allowing seniors to use their voice to make their environment more suitable without lifting a finger. Pivotell ® Advance Automatic Pill Dispenser GX-MAX-DT35B is compatible with Pivotell ®Advance Automatic Pill Dispenser, keeping secure of all pills, reminding users to take their medication, keeping track of their medicine intake, and allowing caregiver/physician to monitor pill-taking results/records, and keeping an eye on user needs. Voice over Internet Protocol (VoIP) &DECT GX-MAX-DT35B’s built-in VOIP function allows users to initiate two-way voice calls to contact CMS and family members during alarms and emergencies. With a built-in DECT module (forGX-MAX5/8 models) or plug-in EX-1 DECT module (for GX-MAX15/18 models), GX-MAX-DT35B can pair with voice extenders, talking pendants, call points, etc., placed around the home to create a safety net and peace of mind. Visual Monitoring and Verification GX-MAX-DT35B can integrate Camera PIR Motion Sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and the Monitoring Centre to verify the event and send immediate assistance as needed. Safety & Inactivity Monitoring GX-MAX-DT35B can support wireless sensor devices, allowing users to add in smoke detectors, water leakage sensors, and gas sensors to monitor emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build a healthier, safer independent living. Features Communication Path Options: IP (Ethernet), LTE. Support for VoLTE (Voice Over LTE). Built-in Module: RF (for all models), DECT (for GX-MAX5/8 models). Optional DECT Module (for GX-MAX15/18 models). Protocol Module Options: Zigbee, Z-Wave, Bluetooth. Wi-Fi hotspot capability. Support external antenna capability (GX-DT35B-EX only). Able to support multiple Communication protocols with Monitoring Centres for Alarm Reporting. Compatible with Bluetooth (BLE) medical devices. Voice over Internet Protocol (VoIP) capabilities. World-class certified RF range, reliability, and performance. Supports Pivotell ® ‘Advance’ Pill Dispenser integration. ZigBee or Z-Wave compatible home automation features. Compatible with Amazon Alexa & Google Home voice control. 24/7 Environment Safety Monitoring. Energy Management Capabilities. Voice Prompt feature alerts the user upon designated events and status. Comprehensive help/nurse arrival function. Multi-colour of the Help button backlight to indicate the current status of the system. Multi-party emergency intercom system capability. Supports multiple programming methods. Automatic check-in reports. Remote firmware update capabilities.
Chopin Airport in Warsaw, named after the famous Polish composer Frédéric Chopin, has recently undergone an impressive improvement in acoustic technology. System features The installation of an extensive Praesensa system from Bosch Building Technologies marks a turning point in the way information and music are transmitted and played in the airport building. The new system features advanced loudspeaker technology and a high level of automation, providing outstanding sound quality and clear, crisp voice transmission, which is of great benefit to the operator, passengers, and ground staff. Innovative technology for precise communication It uses LS1-OC100E-1 hemi-directional ceiling loudspeakers and LC1-UM12E8 built-in loudspeakers The new passenger information system is based on the Praesensa solution from Bosch. It uses LS1-OC100E-1 hemi-directional ceiling loudspeakers and LC1-UM12E8 built-in loudspeakers, which ensure that passengers at every gate are addressed with pinpoint accuracy and excellent intelligibility. Text-to-speech solution By integrating a text-to-speech solution from a third-party provider, the flight number, airline, destination, and boarding information are automatically retrieved from the central computer at Chopin Airport and reproduced in synthesised voice information. These are output in Polish and English as well as other available languages, achieving a previously unattainable sound quality. The result is a significant reduction in the workload of airport staff. Overcoming old challenges The modernisation of the public address and voice alerting system was urgently needed The modernisation of the public address and voice alerting system was urgently needed, as the old analogue system had reached its limits. Information was often lost in an indistinct fog of sound, and manual announcements of boarding information were both time-consuming and labour-intensive. Enthusiasm for efficiency and quality The integration of the new system into the airport's existing infrastructure went smoothly, which significantly shortened the installation time. The automation and increased efficiency provided by the Praesensa system is appreciated by both staff and passengers alike. The scalability of the system ensures its suitability for future developments and requirements. “Chopin Airport now has a state-of-the-art public address system. The fact we could build on the existing IP infrastructure significantly reduced the amount of time for the installation work,” says Jósef Bycul, Project Manager at Bosch Building Technologies.
A multinational corporation, headquartered in Mumbai, ranked among the Fortune 500, is sustained by an exceptional workforce exceeding 187,000 individuals from 100 different nationalities. The corporation is founded on the principles of creating value for stakeholders, with a history of over seven decades of responsible business practices. Need for a modernised solution Their enterprises have evolved into global pioneers in various sectors including metals, pulp and fiber, chemicals, textiles, carbon black, telecom, cement, financial services, fashion retail, and renewable energy. The financial services arm of this conglomerate, to expand its business, needed a well-crafted, modernised Telecom solution, thus bringing them to the forefront of Matrix. Conglomerate's challenges The Financial services arm of this multinational corporation in Mumbai was facing issues ranging from modernisation to optimisation of communication. The challenge of telecommunication without laying Telephone cables for their new office was prominent. An arrangement had also to be made for utilising existing PRI lines and modernising them to meet their demands for new establishment. To elaborate on their challenges: Adoption of modern communication with existing Infrastructure: Their investment in existing infrastructure needed protection, and a provision had to be made to modernise the communication using existing infrastructure. Scalability: They required a Telecom solution that was future-proof, that is, easily scalable to fulfill the needs of future applications. Additionally, it had to be ensured that the operations were flawless, especially during critical work hours. Requirement of modern phone features: They required advanced features like Global Abbreviated Dialing, Auto Redial, Call Pick Up, and Internal Call Restriction, to become efficient in day-to-day operations. Managing different protocols: Interface with existing and different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Stipulated Time-frame: The transition and modernisation, simultaneously, had to be completed within a stipulated time frame. Solution The solution was based on the prelude of utilising existing infrastructure and amalgamation of Matrix solutions Matrix Comsec in partnership with SMB Automation analysed the challenges of communications and crafted a Telecom solution that was the best fit. The solution offered was based on the prelude of utilising existing infrastructure and amalgamation of Matrix Telecom Solutions within a stipulated time frame. VoIP-based communication This included employing Embedded IP-PBX to empower VoIP-based communication, and simultaneously integrating VoIP-PRI Gateway that optimised the feasibility of communication and helped the firm become more efficient by terminating PRI lines. The Telecom solutions include: The Embedded IP-PBX, PRASAR UCS - SPARK200, enabled them up to 2100 IP users. Additionally, features like up to 550 Concurrent calls, Concurrent 21 Calls Tapping, etc. took them to a notch above through a uniquely crafted telecom solution. The VOIP-PRI gateway included SETU VTEP 2P, which comes with features of 125 SIP Trunks and 120 simultaneous calls. The gateway enabled them to terminate 8 Copper PRI lines and thus transition towards IP. The VARTA Extensions enabled them to access Real-time UC features like one-touch access to Extension numbers, Instant messaging, monitoring the Real-time status of employees, etc. The IP phones included SPARSH VP510E and SPARSH VP210. This came with features like an LCD Graphical display, Context-sensitive keys, Built-in 16 DSS Keys, Polyphonic ring tune, and more. Results and benefits The implemented Telecom solutions enabled them to reap the benefits of modern communication while also enabling them to make the best out of the existing infrastructure. Matrix engineered a Telecom solution with our Embedded IP - PBX, PRASAR UCS enabling them to transit towards wire-free and modern communications, addressing the challenge of telephone cabling. The VOIP-PRI gateway, SETU VTEP, provided much-needed Least-cost routing ensuring that the call is always placed on the most appropriate network resulting in the optimisation and feasibility of calls. Access to the gateway was secured through PIN Authentication, while Digest Authentication ensured verification and protection of user credentials during the authentication process. The Real-time UC features were provided in the form of soft IP extensions through the VARTA UC Client. A complete Collaboration solution was made possible through Laptop/Desktop extensions to work remotely. The IP desk phones helped provide advanced features like Call Pick up, Call Forward, Call Waiting, and Call Transfer along with an Intuitive interface, that enabled employees to become efficient while simultaneously, enhancing user experience.
IDEMIA has been selected by ACSA to implement its solution in South Africa’s three main international airports: OR Tambo, Cape Town, and King Shaka including the border clearance process using the latest e-Gates technologies. Interconnected with all the major airlines in the world, South Africa is a key country when it comes to air transportation in Africa. ID2Travel The four-year project started in October 2023 and will be deployed in three phases. As soon as 2026, nine South African airports will be equipped with IDEMIA’s end-to-end PFF solution: ID2Travel. IDEMIA’s win was made possible by the long-standing relationship with South Africa and in particular the successful implementation of the ABIS program with the Department of Home Affairs (DHA). Biometric solutions IDEMIA’s expertise and solutions regarding its biometric technologies, combine efficiency, accuracy, and equity The biometric solutions deployed in these airports (three international and six domestic) will enhance the quality of services offered to passengers all along their journey, from the check-in to the boarding of the plane. IDEMIA’s expertise in biometrics, repeatedly recognised in industry rankings, enables it to offer advanced fingerprint, facial, and iris biometric technologies that enhance passenger security while making their experience more seamless. The National Institute of Standards and Technology (NIST) latest test results underscore IDEMIA’s outstanding expertise and solutions regarding its biometric technologies, combining efficiency, accuracy, and equity. Facial recognition technology This partnership with ACSA builds on IDEMIA’s long-standing expertise in equipping world-class airports around the globe with its cutting-edge technologies. From Singapore’s Changi airport, which facilitates passenger flow from baggage check-in to boarding the plane, to India’s Delhi, Hyderabad, and Goa airports where facial recognition technology verifies the identity of domestic flyers, to trials at Lyon-Saint Exupéry and Paris-Orly (France), IDEMIA’s solutions are proven to be highly accurate, thereby offering the best security and an efficient and smooth passenger journey. Passenger facilitation solution This new solution will offer our passengers a seamless, unique, and secure new airport experience" "We are thrilled to be launching a new passenger facilitation solution at our nine ACSA airports, and for the first time in Southern Africa. Based on biometrics, airport processes will be automated using state-of-the-art technology from our partner IDEMIA," said Mthoko Mncwabe, Chief Information Officer, ACSA. "This new solution, which we are currently deploying in our airports, will offer our passengers a seamless, unique, and secure new airport experience. In line with our Sustain, Grow, and Digitise strategy, this solution positions ACSA as the pioneering airport management services company in Africa." Safe and smooth passenger experience "We are delighted to have been awarded this landmark contract for IDEMIA in Africa, which demonstrates the competitiveness and quality of the solutions that we provide to our clients worldwide," said Matt Cole, IDEMIA Executive Vice President of Public Security and Identity. "We are looking forward to working with ACSA on this historic and ambitious partnership, which will ultimately ensure a safer and smoother passenger experience at these nine South African airports."
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?