Showing posts with label HID. Show all posts
Showing posts with label HID. Show all posts

Friday, January 1, 2021

Upcoming Trends in security & surveillance for 2021

Upcoming Trends in Security & Surveillance for 2021 

It’s fair to say 2020 has not been the year any of us were expecting. It has been challenging, we have all made sacrifices, and there are still further obstacles in our path as we try to get back to “normal”. SARS-CoV-2, the coronavirus strain that causes COVID-19, is a highly contagious respiratory illness that is affecting lives worldwide. Epidemics and pandemics have been threatening the human race time and again. SARS, H1N1, Ebola, and more have shown their teeth in the past, but with each such outbreak, we are learning new ways of fighting and managing such unexpected diseases that can potentially kill millions of people. Technology cannot prevent the onset of the pandemics; however, it can help prevent the spread, educate, warn, and empower those on the ground to be aware of the situation, and noticeably lessen the impact. The pandemic of 2020 has certainly changed the landscape for us all, not just the security industry. It has made us a lot more aware of touch points, crowded gatherings and personal space. It is inevitable that technology will adapt as our lives do. We have already seen manufacturers race to bring us solutions such as body temperature management, face mask detection and crowd control etc. It’s time to change. It’s time to get better. It’s time to learn more and sharpen our skills.’

During pandemic Webinar is boom through Zoom. Google meet, Gotowebiner etc in security safety automation industry. System Integrator, End Users, professionals are learn many things through OEM direct Webinar. US already ban China made surveillance product. In india Atmanirbhar Bharat (self-reliant India) is the vision of the Prime Minister of India Narendra Modi of making India a self-reliant nation. The first mention of this came in the form of the 'Atmanirbhar Bharat Abhiyan' or 'Self-Reliant India Mission' during the announcement of the coronavirus pandemic related economic package on 12 May 2020. Known china CCTV OEM are thrown out. Yes, it’s true, India don’t have much infrastructure to generate Camera manufacturing plant, it will take time at list 5 year. Within this time, we can follow BIS website to get information about selected camera / NVR model are china factory make or not. Low cost and high cost both option camera you can found. If you found that model belongs to china factory immediately change with Closest or Alternative Substitute. Now we check what will be next in 2021 for Security Safety & Automation.

OSHA new Policy:

The COVID-19 outbreak has caused almost all firms to deploy the work from home practice for employees. While some may be used to this, others may feel lost in the exercise. While not all Indian are able or fortunate enough to work from home, many have transitioned to telecommuting and virtual work over the last week or two.

While employers’ responsibilities for the safety and health of their at-home workers is less than those in the office or onsite, some do still exist. OSHA distinguishes between home offices and other home workplaces.
OSHA’s compliance directive on home offices is pretty clear:
·     “OSHA will not conduct inspections of employees’ home offices.
·     “OSHA will not hold employers liable for employees’ home offices, and does not expect employers to inspect the home offices of their employees.
·   “If OSHA receives a complaint about a home office, the complainant will be advised of OSHA’s policy. If an employee makes a specific request, OSHA may informally let employers know of complaints about home office conditions, but will not follow-up with the employer or employee.”
What about recording injuries while working at home? If an employee is working at home, when could the injury be considered work-related? OSHA answers the question:
How do I decide if a case is work-related when the employee is working at home? Injuries and illnesses that occur while an employee is working at home, including work in a home office, will be considered work-related if the injury or illness occurs while the employee is performing work for pay or compensation in the home, and the injury or illness is directly related to the performance of work rather than to the general home environment or setting.

Video Intercoms:

One of the newer phenomena we’ve faced in the world has been the concept of physical distancing, brought to light by the global coronavirus pandemic. This has created challenges not only socially, but for technologies that were not designed to accommodate what may be the new norm. Video intercoms are really going to be playing a bigger part in the way facilities are organized and processes are organized. We’re seeing some customers that are using this to limit having to actually go inside a room in a healthcare facility, for example, to limit the chances of transmitting something all while maintaining that frequency of checking. One of the main benefits of door intercoms is, simply put, the ability to limit — or even eliminate — human contact at the door. In this pandemic, an immediate need is providing [the customer with] a way to create physical distancing upon entry. This can also be applied to healthcare workers. Integrators have to understand this greater demand for security at the door and deliver solutions to their customers. Everybody is having food, groceries and other things delivered to their door. Demand for that is very high right now. Additional security at the door or the gate is something people want and need.

Home Over IP:

Amazon, Apple, Google and the Zigbee Alliance announced a new working group that plans to develop and promote the adoption of a new, royalty-free connectivity standard to increase compatibility among smart home products, with security as a fundamental design tenet. Zigbee Alliance board member companies such as IKEA, Legrand, NXP Semiconductors, Resideo, Samsung SmartThings, Schneider Electric, Signify (formerly Philips Lighting), Silicon Labs, Somfy and Wulian are also on board to join the working group and contribute to the project. The goal of the Connected Home over IP project is to simplify development for manufacturers and increase compatibility for consumers. The project is built around a shared belief that smart home devices should be secure, reliable and seamless to use. By building upon IP, the project aims to enable communication across smart home devices, mobile apps and cloud services, and to define a specific set of IP-based networking technologies for device certification.

Video Surveillance:

The global CCTV camera market is anticipated to generate substantial revenue of more than to USD 38 billion till 2021. Asia Pacific and America holds the largest share of the global market and act as one of the main driver for the market. According to “India CCTV Camera Market Outlook, 2021”, the India CCTV Camera market is expected to grow with a CAGR of more than 26 % in the period from 2016 to 2021. Technology wise non-IP dominates the Indian market but in the coming years IP is expected to take the lead soon. Non -IP technology constitutes of analog and HD CCTV cameras. Analog is technology which is in a depleting stage and it share is expected to be taken by the IP technology and the HD type CCTV camera. Dome typed cameras are the most widely used cameras in any sectors. Commercial segment is the driver of the CCTV market in India with the increasing count of SOHO’s and SME’s. With the increasing security concerns, residential sector would also be one of the factors for the increasing market. As criminal activities are more in the northern region of India, North dominates the market in terms of revenue.

Facial Recognition:

Facial recognition is the common theme of the week’s top digital identity news with retail applications, new edge servers, and biometric border control deployments around the world. A new software partnership on biometric cryptography has also been announced, a report shows the importance of selfie biometrics in fraud reduction published, and the industry, as well as society more broadly, continues to contend with the issue of algorithmic bias. Facial recognition solutions identify a person by forming a unique code built on algorithms from multiple points on a person’s face, including nose, chin, lips, eyes and jaw. However, when a person wears a mask, many of these key points are not visible. Faces were often completely missed, and unsuccessful or false identifications were high. Those are know this wearing masks can reduce the accuracy they avoid to take Facial recognition

Video Verification:

The city currently has over 1,000 video surveillance cameras deployed across the metropolitan area and is expected to reach over 1,700 security devices. Now it’s very difficult to watch every moment on comment control center. It’s very important to see what camera saw. Through Video Auditing software the task are easy. Day by day its increase.

Rise of Mobile Credentials:

There has been a tremendous uptick in the popularity of mobile credentials. Research firm IHS Markit has reported that mobile-based credentials are the fastest-growing access control product. Globally they have experienced nearly a 150 percent growth between 2017 and 2018. Estimates show that more than 120 million mobile credentials will be downloaded in 2023 by end users. A 2019 survey by HID estimated that 54% of businesses had upgraded or would upgrade to a mobile access control system in the next three years. Though access cards still play a powerful role in the access control market, we are seeing a strong shift towards mobile access control like various companies. The use of mobile-based credentials is the logical next step for the physical security and access control industry. The fact that people are always with their smartphone helps popularise this trend. Phones aren’t just phones anymore. They play a bigger role in day-to-day life and this also includes access control. Mobile credentials can revolutionise the industry, eliminating the need to carry and wipe a card. Instead, a phone’s technology can be used to authenticate identity and grant entry. This gives greater flexibility, improves privacy and can also lower the maintenance costs of credential management for end users. Additionally, a clear advantage is that employees are more likely to carry their smartphone with them and less likely to lose them compared to NFC transponders.

The advantages of using virtual access control cards, which are stored on smartphones, are obvious: less logistics when distributing, revoking or replacing cards and many more ways to integrate with technology on the phone or other hosts and devices in the network. Often also the user experience of mentioned as a benefit of mobile access: users do not have to fill up their wallets with a pile of RFID cards but can conveniently carry them around in their phone. The networking capacity of smartphones would even be a great way to overcome the limitations of offline access control installations where access rights would be stored on smartphones instead of cards.

Security in the cloud:

After the entrance of IP-networking in security around twenty years ago, it is one of the major current trends in our industry: cloud based security systems. In the context of physical security one could define cloud based systems as those systems with a topology that looks like this:
·       A server that is ‘in the cloud’ and can be accessed from virtually anywhere;
·       Devices that connect over an IP-network to that central server;
·       Web based administration of the system;
·       Commercially based on a service or transaction model with recurring fees.
Variations exist. But in general this pretty much sums up what to expect when reviewing a cloud based system.
We see this set-up currently already in several categories:
·               Video Intercom Systems, like the systems from Akuvox, which are based on video intercom stations that connect to a cloud based server, which also enables use of apps as virtual door phones.
·   Mobile access systems that enable the use of virtual credentials on smartphones. and that are managed from a cloud based server.
·               Video management software now also is offered by several vendors as a cloud service, for example: 3dEYE, Open Eye, and VIVOTEK.

IoT security topologies:

The Internet of Things idea has been around for ages. It was predicted over a decade ago that billions of device will connect to the Internet. Sensors all around us will deliver data to the cloud. Feeding data into ‘big data’ processing applications that will give us access to a wealth of information. Devices also connect the cloud. To be part of applications that can be used and managed from virtually any location. For security it would mean that it very much is related to cloud based security applications. The additional step here would be that camera’s, readers, intercoms, intrusion detection sensors and biometric stations would connect directly to the cloud based service. Installations would be easier and more scalable. Access control systems could be deployed at any door and still be real online access control systems. Video surveillance would be available at any location that would require security monitoring. Security sensors and devices can be rolled out everywhere.

Smartphones and wearables

Using smartphones or other wearable devices in security has been a popular idea for many years. Smartphones and tablets often can be used to access the administration Interface (GUI) of the access control, video management or PSIM systems. That hardly is considered an innovation. Smartphones can also be used as virtual access control and identity cards in mobile acess systems. In addition it appears that also biometrics like facial recognition and fingerprint identification are now available on smartphones. It appears logical that smartphones with their native connectivity features are an interesting extension of security systems.
Mobile credentials enable both multimodal and multi-factor authentication. Multimodal means proving identity and/or gaining access using at least two separate biometrics, or permitting access through any one of various credentials, such as a smartcard or PIN. Multi-factor authentication involves proving identity and/or obtaining access via at least two methods or credentials. Multi-factor authentication is widely used in digital access. For example, when an employee logs onto a company’s system, he or she must use a secondary method to verify identity via a one-time token via SMS or other app. It is also burgeoning in physical access applications. Although two-factor authentication has been mandated in regulated industries, it is emerging in unregulated verticals as well. The development of multimodal readers will continue to fuel this trend.
Believers say that people prefer carrying around their smartphone over additional cards. They refer to the technical possibilities that smartphones offer in areas like user convenience and integration of systems.

Identity analytics and AI

A relatively new field in security is identity analytics. Seeing through identity and security related data in an automated way. To monitor use of access priviliges and consequently alter those access rights. The idea comes from the IT industry and that is where you will see it deployed mostly now. Recent research indicates that this is an emerging market with high anticipated growth potential. It would make sense to include physical security into these applications.
Believers will say that, like with video analytics, many more security related events can be actively monitored, more incidents can be detected and a tighter security regime can be implemented without hindering users unnecessarily.
It remains to be seen what the future will bring exactly. But intelligent security related data analytics certainly will have a place in modern enterprise security management applications.

Centralized Control of Fire Detection:

The principle of networking involves connecting several panels together to form a system. Inputs on one panel may activate outputs on another, for example, or the network may allow monitoring of many systems. Networking is often used in situations where one panel is not large enough, or in multiple-building situations. Networking is also an effective way to decouple systems to reduce the risk of a large portion of a facility going offline at any time due to system failure or maintenance requirements. Sub-Networks can be created using either hardware or software architectures. Networked systems normally are more costly and involve additional training and system configuration for successful implementation.


From this year many customer implement centralised monitoring & controlling of Fire Panel through creating WLAN communication with Graphic software. Due to cost effective graphical monitoring control software only industrial & Enterprise business implement the same. Also it will possible if same brand panel is there in all location.

BMS Workforce:

The growth of IBMS market is observing hindrance due to lack of availability of skilled workforce. The Intelligent building management systems are usually complex and require skilled personals to operate. The cost of training operators to handle complex equipment such as HVAC control, outdoor controls, security and access control, energy management systems and smart meters is quite high. Owing to which, small scale companies cannot afford to invest large capital to train their operators. This factor is likely to affect the growth of the IBMS market in the country.
But due to COVID-19 many OEM & society presence webinar program to educate more. This will be effect in this 2021-22. The region segmentation for the IBMS market has been done by South IndiaWest IndiaNorth IndiaEast India. Which include general lighting controls, communication systems, security controls, HVAC controls, access controls, outdoor controls entertainment controls and others. The India IBMS market is segmented by application into: hospitality, residential and retail, life science, office space, manufacturing, and energy and infrastructure. All these segments have also been estimated on the basis of geography in terms of revenue (USD Million).

The goal of building management systems was—and still is—to help optimize building performance by

·       Providing data on core building operational systems, specifically HVAC. 

·       Enabling the automatic control of a building’s main operating functions. 

IoT for buildings has the same goal of performance optimization (and by extension, saving money) through data and automatic control, but advanced technology takes these aspects many steps further than a traditional BMS system can. 

We wish you all the very best for 2021 and we look forward to working with you for many years to come.


Thursday, October 15, 2020

Contactless Access Credentials & Egress

Contactless Access Credentials & Egress 

THE business landscape changing so dramatically over the past few months — possibly irrevocably — the task for many in security, including for consultants, integrators, dealers and manufacturers. As businesses and organizations begin to reopen, many are rethinking the way they budget for security, including access control, video surveillance and intrusion Alarm.

It’s amazing that a microscopic virus from China could virtually bring the world to a standstill. The 2020 global pandemic has reshaped the way people work, learn and play on every conceivable level. In addition to the devastating impact on global health and safety, COVID-19 has infected the health of the global economy.

The growing call to return to work will surely accelerate many of the physical (not social) distancing, sterilization and occupancy issues that we are currently facing. Hopefully, modern medicine will rise to the challenge sooner than later with a COVID-19 vaccine, but this may take some time even with accelerated testing and approvals.

Commonly touched items that can cause the spread of coronavirus (and other infectious disease) can include things like elevator buttons, ATM and checkout keypads, door knobs and handles, keyboards and mice, and door/entry access control panels — just to name a few. When you think about all of the “touchable” items that you interact with each day it becomes a daunting task to stay away from them and feel safe, clean and virus-free. Well, it's no surprise that right now, businesses are feeling the need to provide solutions and upgrade their safety and security as the workforce begins to come back to the office or plan for that to happen soon.

Contactless credentials are the most common component used in an access control system and while many look alike externally, important differences exist. “Contactless credentials and touchless access control can help reduce the number of surfaces that people touch on campus and can help reduce contact transmission” said Arindam Bhadra founder SSA Integrate.

Credentials Overview

While other credential options exist, the most common choice is RFID 'contactless' types. Nearly 90% of systems use contactless cards or fobs built as unpowered devices that are excited and read when brought close to a reader unit. This 'wireless power' process is called resonant energy transfer.

In Proximity Reader technology the reader itself emits a field collected by the card, eventually reaching enough of a charge that temporarily powers a wireless data transfer between the two. The image below details typical internal components of the type, where the wire antenna collects energy, the capacitor stores it, and when full discharges ICC chip (credential) data back through the antenna to the reader:

In general, all contactless credentials work this way but the exact parameters like operating frequency, size of credential data, encryption, and format of the data greatly vary in the field. In the sections that follow, we examine these parameters in depth.

Contactless Credentials Dominated by Giants

One of the biggest differences in contactless credentials is the format of the data it contains, typically determined by the manufacturer. Upwards of three-quarters of contactless credentials use formats developed or licensed by HID Global and NXP Semiconductor.

HID Overview

Since the market began migrating away from 'magstripe' credentials in the early 1990's, HID Global gained marketshare with its 125 kHz "Prox" offerings. Now part of ASSA ABLOY, HID has become the most common security market credential provider, and OEM of products for access brands including Lenel, Honeywell, and Siemens. The company's best-known formats include:

·     "Proximity": an older 125 kHz format, but still regularly used and specified even in new systems

·      iClass: an HID Global specific 13.56 MHz 'smartcard'

HID is the most common choice for credentials in the US. Because of commanding market share, HID is able to license the use of its credential formats to a variety of credential and reader manufacturers. Even when marketing general 'ISO 14443 compliant' offerings, HID strictly follows "Part B" standards (vs Part "A" - described in more detail later).

NXP Overview

Formerly Phillips Semiconductor, Europe-based NXP offers a number of 'contactless' credential components used in a number of markets - security, finance, and industrial. With widespread adoption of ISO standards in credential specifications, NXP offers a catalog of types built to spec, including:

·    MIFARE PROX: NXP's 125 kHz format built on early drafts of ISO standards, but not as widely adopted as HID's "Proximity" lines

·  MIFARE/DESFire: an ISO Standards-based NXP 'smartcard' format, also operating on 13.56 MHz the 'DESFire' moniker was introduced in the early 2000s to distinguish the format from 'MIFARE Classic' credentials. DESFire credentials feature stronger encryption that required higher performing chips. The 'Classic' format fell under scrutiny for being vulnerable to snoop attacks, and DESFire countered this threat. Because these improvements were made only to credentials, and existing MIFARE readers could still be used, the new format became known as 'MIFARE/DESFire'.

Unlike HID, NXP's credential formats are 'license-free' and the according standards are available for production use for no cost. NXP manufacturers all ISO 14443 product to "Part A" standards. NXP's market share is largest outside the US, mostly attributed to the early (starting in ~1990's) adoption of HID Global formats inside the US, but the brand's formats are often the primary ones used in Europe and Asia for physical access control.

US vs the World

Because of NXP Semiconductor’s strength in EMEA and the lack of licensing, MIFARE, DESFire, and the associated derivatives are popular outside the US.

However, HID Global's strongest markets are in the Americas, especially in the US. Despite the additional cost of licensing compliant credentials and readers, the company also produces products that use the unlicensed NXP formats and has equal or greater operability as a result.

125 kHz vs 13.56 MHz

The credential's RF frequency factors a key role in its performance. Because readers can only scan credentials operating at specific matching frequencies, this attribute is the first to consider. If frequency and format do not match, credentials are simply not read. The chart below shows the frequency of popular formats:

Perhaps the biggest difference between 125 kHz and 13.56 MHz frequencies is credential security. 125 kHz formats do not support encryption and are easily snooped or spoofed. However, 13.56 MHz formats are encrypted (usually 128 bit AES or greater) and credential data can only be read by a device that is specifically given the key to do so. 

Deciphering Credential Types

One of the most challenging jobs for integrators and end users alike is simply identifying which credential a system is using. The market is crowded with hundreds of options with no guarantees of compatibility for items that all appear to be a blank white card. The image below details four different credential types with dramatically different performance and security characteristics, yet they all look the same to the untrained eye:

For contactless types, you must know three attributes that are not typically clearly printed or overtly labeled on the credential:

·     Format Name: This designates how and how much data the credential transmits, usually defined by an ISO standard for Wiegand formats. For example H10301 is the typical 26 bit format, H10304 is HID's Wiegand 37 bit, and so on. The best way to confirm the format used by a card is to locate a box label of existing cards (See image below 'Card Format Details') to interpret the raw hexadecimal output as a specific format. If card boxes are not available, researching the credential type used by checking the format used in the Access Control Management Software application, typically in the cardholder and reader configuration settings.

·       Facility Code: This attribute is NOT printed on the card in most cases. This piece of information is also typically found on box labels but can be decoded using the same online calculators for format name. In certain cases, access systems must be configured to accept specific facility codes and some low-end systems may limit acceptable codes to one specific number. Without knowing this code, credentials are not sure to work.

·       Card ID/Serial Number (CSN/UID): In many cases, the ID number is embossed or printed on the card. This number is the 'unique ID' that ties a user to a specific badge. While concurrent numbers are not an issue, redundant numbers are, and the same Card ID and Facility Coded credential cannot be issued twice in the same system. The image below shows.

Interestingly, the Sales Order/Batch Number information printed on the card is often not used by the access system at all and is only printed to assist in researching the origin of the card as shipped to a specific distributor, end user, or dealer.

In some cases, a card vendor or distributor will 'read' an unknown card for a fee, but turn around times may take several business days.

Often, the box for cards currently in production is often the quickest, easiest way to gather all three pieces of this information, if not a reordering part number, as shown below:

The ISO/IEC 14443 Division

Very little separates HID's iClass from NXP's MIFARE offerings, and if not for ambiguous interpretation of an ISO standard, they would 'look' the same to most readers. However, because early versions of the standard left room for differentiation, HID and NXP designed their 'compliant' standards with a different encryption structure.

The end result is both versions of credential claim 'ISO 14443 Compliance', but are not entirely interchangeable. To reconcile this difference, ISO revised 14443 to include parts 'A and/or B' to segregate the two offerings. The default, basic serial number of cards is readable in both A & B parts, but any encoded data on the card is unreadable between the two because the original standard left room for implementation ambiguity.

In general, because there is no licensing cost in using 'Part A' standards, many low-cost, non-US target market, and new reader products start here. However, readers marketed specifically in the US or from vendors with a broader global market license use 'Part B' compliance common to HID.

For example, this TSDi reader supports 14443-A, but not 14443-B, meaning in practical terms in does not support HID's 13.56 MHz iClass formats, but does support NXP's 13.56 MHz MIFARE/DESFire formats:

In contrast, HID iClass readers support both 'A' and 'B' along with the non-ISO specific 'CSN' such that either type of credentials will work with these readers:

13.56 MHz Smartcard Interoperability

While the 'Part A & B' division in ISO 14443 separates formats from being the same, it does not always mean they are unusable with each other. Portions of ISO 14443 are the same in both parts, including the 'Card Serial Number'. For some access systems, this is the unique number that identifies unique users, and because this number is not encoded, it will register in 'non-standard' readers:

·    CSN/UID String: Essentially the card's unique identifier is readable because it is not stored in the deep 'encrypted' media. Many simple EAC platforms use only this number to define a user, and instead use the internal database to assign rights, schedules, and privileges.

·    Encoded Read/Write: However, the vast majority of storage within the card is encrypted and unreadable unless compliant readers are used. Especially for access systems using the credential itself for storage (e.g.: Salto, Hotel Systems) and for multi-factor authentication (e.g.: biometrics) high security deployments, the simple CSN is not sufficient.

The CSN Loophole

In terms of security, not all credential details are encrypted. The 'Card Serial Number' (defined by ISO standards) for 13.56 MHz cards can often be read regardless of underlying format, modulation method, or encryption. The CSN may be usable as a unique ID by the system, but the full data set of the credential will not be available.

For smaller systems with only a few doors and a hundred or fewer cardholders, using the CSN as the primary ID is common due to the ease of enrollment in using CSNs as unique badge numbers. However, for high-security sites where access identity encryption is required by standard or when credentials are used for multiple integrated systems, using CSNs to identify issued cardholders is often not approved. Rather, the card's encrypted data is required instead.

Form Factor

Credential shapes are not just limited to cards or fobs. The size and method of hosting a credential can include stickers, tokens, cell-phone cases, or even jewellery.

The form factor of the credential often is an important consideration in overall durability and service life. For example, while a white PVC card may be ideal to print an ID badge on and hang from a lanyard, it can easily be bent or broken in a rough environment. A key fob, while unsuitable for printing a picture on, is designed to be durable enough to withstand abuse, harsh environment exposures, and even submersion in water.

The right form factor choice should be dictated by the user and the user's environment, and generally, all major credential types have numerous form factor options to suit.

Touchless Switches

Touchless wall switch makes opening a door simple and germ free. Blue LED back-lighting highlights the switch at all times, other than during activation. This provides a visual reference of the switch’s location in low light conditions. Its low-profile design makes it blend into your wall.



Monday, June 1, 2020

COVID-19 & Surveillance

COVID-19 & Surveillance 

As nations have started to lift Covid-19 lockdown restrictions, large crowds of people have flocked to parks to enjoy spring temperatures but risking social-distancing guidelines that are deemed crucial to prevent an uncontrollable spread of virus.
In parallel shops are asked to ensure a safe reopening in adherence with the requirements coming from health authorities, e.g. that people need to maintain a social distance, compliance of protocols and health and safety guidelines will be key at every location. All stakeholders including employees will want to be sure that they are safe at work. It will therefore be important to ensure that such compliances are being stringently followed, and that reports are maintained.

State Governments and organizations are faced with the following challenges:
• Which part of my city, bus stop, shop or premises are most crowded and when?
• How do I make sure my building or shop doesn't get over-crowded?
• How do I know when people are getting too close to each other?
• How do I address people and avoid confrontation or incidents at the entrance to a store?
Yes, video surveillance hardware segment to hold largest share of the market. The hardware segment consists of cameras, monitors, storage devices, and accessories. The growth of the hardware segment is attributed to the increasing use of cameras in various security-related applications. Rising security concerns across various applications, the shift towards adoption of IP cameras, government initiatives to provide more secure environments, increasing smart city projects, technological advancements in cameras, and the availability of low-cost cameras are driving the growth of video surveillance hardware market.
Cameras is important component of hardware segment. Technological advancements have resulted in highly specialized surveillance cameras that can be programmed to zoom-in scan items such as harmful equipment. Technological advancements resulted in the availability of a variety of surveillance cameras, such as those with high resolution and better quality, cameras with more than 8 mega-pixels, body worn, mobile or spy cameras, ultra-low-light cameras, panoramic 360-degree cameras, robust outdoor cameras for harsh climates, cameras for sensitive environments, and those with integration capabilities for various applications such as people counting or retail management. In order to achieve optimal results from any technology, user 'expectations' must be in order. Technology has to assist users in performing tasks in an easier and standardized manner, leading to better decision making.

Major players in the video surveillance market are Axis Communications (Sweden), Bosch Security and Safety Systems (Germany), Hanwha Techwin (South Korea), Avigilon, a Motorola Solutions Company (Canada), Infinova (US), FLIR Systems (US), Milestone (US), Honeywell Security (US), Pelco (US), Agent Video Intelligence (US), Genetec (Canada), Nice Systems (Israel), Qognify (US),  VIVOTEK (Taiwan), CP Plus (India) and Zhejiang Uniview Technologies (China).
The COVID-19 pandemic has presented organizations of all types and classifications with a new set of challenges that impact the security, safety, and health of all individuals who enter their premises, as well as the liability and responsibility of the host. Right now, the biggest challenge is how to get people back to work, engaged in commerce, education, and all of the everyday activities that drive the economy with effective safeguards in place.

In surveillance systems
The role of intelligent video analytics software that can detect people violating health care guidelines has become important. Many solution providers of video analytics for security cameras and VMS are at the forefront of this segment, enabling authorities to use technology to avoid crowds, ensure social distancing, and wear masks. These video solutions involve a four-stage process of firstly establishing awareness of a situation, then confirming that distances are being maintained, responding to unsafe behaviour and analysing data to identify areas and activities that are proving problematic.

Here are a few examples of how video technology can contribute to a safe reopening of societies:

1. Detecting facial masks.
Masks have become an integral part of the fight against COVID-19, and facial recognition analytics solution providers are now factoring in the possibility of having to detect people who wear and do not wear masks. Detecting and identifying those who wear masks or PPE for special case could be a necessity from a security perspective, but in the pandemic, alerting authorities of someone not wearing a mask is critical for safety reasons.

2. Keeping people notified 
Both audio and visual messaging can be integrated with video, so those on a station platform can be given an audio reminder to maintain a safe distance over a PA system automatically when video identifies bunching. Screens can automatically provide notices of alternative access to buildings based on if the video system detects crowding in a particular area.

3. Crowd counting solutions
There is a danger of a fallback when COVID-19 restrictions are gradually being relaxed. So, in city squares, beaches, tourist attractions or other popular public places, social distance needs to be maintained for a longer period. Crowd counting solutions based on video analytics can help alert authorities to when these places get too crowded and social distance is at jeopardy. These alerts will be received in real-time, and historical statistics will also be available.

4. Responding to crowding
Dispatching personnel to deal with unsafe distancing and risky behaviour places these people at risk from infection, and they may face verbal or physical harassment. If they have to be deployed, however, video can support them with rules-based push notifications that send them to the place where an incident is taking place, giving them control of all the doors needed to access the area from their smartphone, and integrating with body worn video if being used.

Fever Camera Market
The market for elevated body temperature detection cameras, aka 'coronavirus cameras' aka 'fever detectors', may be worth billions of dollars this year and is certainly, by far, the fastest-growing market segment in the industry. Moreover, with physical products, including video surveillance, generally facing downward sales pressure, sales of coronavirus fever cameras will be a major factor in which companies 'win' or 'lose' over the next year.
FDA supplies this illustration showing a good fever cam setup
FDA considers body temp screening cams (paired with a thermometer to confirm the fever) to be medical devices, technically a "Telethermographic system intended for adjunctive diagnostic screening". These require FDA 510(k) clearance before being marketed, a process that takes around 130 days. On Apr 17, 2020 The US FDA has declared it will not go after the many companies marketing unapproved fever detection cameras during the coronavirus public health emergency, even though it does consider these products medical devices, it has announced 10 page new guidance (Click to get enforcement policy)The FDA recommended thermal cams are tested under following "performance specifications" including "measurement uncertainty, is less than or equal to ±0.5°C (±0.9°F) over the temperature range of at least 34-39°C (93.2-102.2°F)". The FDA says that a 'prominent notice' should be included, explaining: The labeling includes a prominent notice that the measurement should not be solely or primarily relied upon to diagnose or exclude a diagnosis of COVID-19, or any other disease. In particular, the world's two top international standards groups, the IEC and ISO, have published 3 standards covering fever (i.e., febrile) screening:
  • IEC 80601-2-59:2017 Medical electrical equipment — Part 2-59: Particular requirements for the basic safety and essential performance of screening thermographs for human febrile temperature screening
  • ISO/TR 13154:2017 Medical electrical equipment — Deployment, implementation and operational guidelines for identifying febrile humans using a screening thermograph
  • ISO 80601-2-56:2017 Medical electrical equipment — Part 2-56: Particular requirements for basic safety and essential performance of clinical thermometers for body temperature measurement
The IEC states the inner eye is the best area for body temp readings due to it being over an important artery, stating other body areas are "unreliable".
“Facial thermography of surface areas other than the region medially adjacent to the inner canthi is unreliable, and may be complicated by perspiration, facial skin flushed from exertion, etc. The current evidence indicates that the region medially adjacent to the inner canthi is the preferred site for fever screening due to the stability of that measurement site. This is because this region is directly over the internal carotid artery.”

“The temperature LABORATORY ACCURACY of a SCREENING THERMOGRAPH, including the measurement uncertainty shall be less than or equal to an offset error of ±0,5°C over the range of at least 34°C to 39°C”.

“Camera ensure that there are sufficient IMAGE PIXELS in the thermogram of the FACE and TARGET to permit an accurate assessment. The minimum display of the workable target plane shall be 320 IMAGE PIXELS by 240 IMAGE PIXELS. In NORMAL USE, the thermogram of the FACE shall fill at least 240 IMAGE PIXELS by 180 IMAGE PIXELS.” If a face on camera needs to be 240 pixels wide and a real face is about six inches wide, effectively a 400-pixel camera should have a field of view no wider than 10 inches. The practical issue is that with fewer pixels on target it is harder to get precise readings since the readings of adjacent hotter and colder parts of a face will blend in, reducing accuracy.

The ISO/IEC standards make no mention of such AI or of anything else helping overcome these obstructions. This sets up an issue where manufacturers may argue these 2017 standards are out of date. Some manufacturers have also touted "compensation algorithms" they claim automatically adjust for the (well-known) difference between face skin temperature and actual body temperature. However, the ISO recommends that this "small difference" between inner eye temp and body temp be accounted for by adjusting the "threshold temperature".

The ISO/TR 13154:2017 and IEC 80601-2-59:2017 standards specifically state that fever screening is deployed under indoor conditions.
The RESPONSIBLE ORGANIZATION needs to be aware of the type of lighting used at the screening area. Lighting such as incandescent, halogen, quartz tungsten halogen and other type of lamps that produce significant interference (heat) should be avoided. 


The area chosen for screening should have a non-reflective background and minimal reflected infrared radiation from the surroundings. IEC recommends A/C drafts be diffused to ensure they are not blowing onto people and cooling them. The ISO adds that "sun-facing windows, radiant heaters, or sources of cold (cold windows or outside walls" can also "interfere" with accurate readings and must be avoided as well.

Controlling ambient temperature is important, as overly hot/cold people will not give accurate results, particularly if they are sweating. ISO states the temperatures measured by a screening thermograph can be influenced when the individual being screened is sweating. Sweating thresholds can vary according to a person’s fitness level, environment of residence, length of adaptation and the relative humidity. When humidity is controlled, these effects are minimized. To produce consistent and reliable results of the temperature screening process, it is imperative that the screening thermograph be situated in a reserved stable indoor environment with a temperature range of 20°C to 24°C and relative humidity range from 10% to 50%.

The ISO recommends that a "secondary screening area" be set up "removed from the general traffic flow" for people who are being confirmed for fever. The secondary screening area should be properly equipped with "masks, wipes, disinfectants".

Toilets should not be proximal to the screening thermograph area. This is to both inhibit potential cross-infection and to prevent facial washing (alteration of the thermal profile) immediately prior to entering the screening thermograph area.

ISO recommends the responsible organization should retain this information for at least one month (normal maximum incubation time for known infectious diseases). The responsible organization should be prepared to maintain the data for longer periods when deemed necessary by the public health authorities and other organizations ensuring protection of public safety. Technically, the GDPR does not apply to thermal camera readings, as it only deals with the "processing of personal data" i.e. data that can identify a specific person - which thermal readings cannot.
IPVM test Thermal Imaging Camera & IR Thermometer
Camera Manufacturers 
These companies generally released thermal temperature screening products after the coronavirus pandemic commenced:
Camera Manufacturers / OEM & Their Partner
Dahua
 FLIR
Hikvision
Sunell
TVT
YCX
Altoros
Embedded Logix
ClearWay
Bolide

IVC
Amcrest
Emitted Energy
Smart CT Solutions
CBC Ganz
AvyCon
Secureye
ENS
HIS MSC
Mercury Security and Facilities Management
Dubak Electrical Group DuThermX
Johnson Controls
Tsimplifica
Optiview
Viper Imaging
Smart CT Solutions
CP Plus

CommOptics
PlatinumCCTV
Midas Touch
Remark Thermal
CohuHD / CoStar
Cyber Info
IndigoVision


EagleEye

RedSpeed
DLink
RS Tech
EOS Australia

Flexible Systems
CheckVideo
Braasco
InVid
Novus
SATIR
TKH / Siqura
Vicon
VenueScreen
Watchnet
ZKTeco 
A core issue is there are no independent tests of thermal camera performance/accuracy and no independent standards to measure against. This has allowed manufacturers to tout products meant for body/fire detection as a fever solution, or falsely claim pinpoint accuracy at long distances. We urge caution against buying low-cost thermal solutions from any manufacturer.
Bengaluru-based Cocoslabs Innovations will receive a loan from the Technology Development Board, under Science and Technology Department, to develop a “low-cost solution to identify persons with abnormal body temperature in a crowd and, at the same time, provide an alert system to notify about identified persons to authorities on their phones and laptops”. The product, according to TDB, includes features such as detecting and tracking a person with and without a face mask, predicting age, gender, race, temperature readings, and facial recognition in a single product that can track multiple people in a real-time environment.  “Imagine a CCTV which can take temperatures as well as carry out mask identification”.

In access control systems
Video analytics is no longer limited to CCTV systems. With cameras becoming an integral part of access control solutions for facial recognition, video analytics are now being used on them too. The consequences of COVID-19 are clear to see in the short term, but it may also drive the need for technology that will help mitigate against pandemics and the spread of disease in the long term.

Major players in the access control market are HID Corporation (US), Suprema (South Korea), LenelS2 (US), Gallagher (US), IDEMIA (France), ViRDI (Korea), DDS (Israel), CEM (US), Honeywell Security (US), SYRIS (Taiwan), Kaba (Switzerland ), Boon Edam (Netherlands ), FAAC (Italy), Mantra Softech (India), WYSE Biometrics (India) and ZKTeco (China). 
One of these technologies that offers some promise is long-range RFID. The value offered is more than just security and safety. Implemented correctly, it not only helps minimise the dangers posed to staff and patients, but also helps improve the efficiency and workflow around the facility. Hence, during the current times of peak capacity, the risk increases. The right long-range access control solution can help minimise the risk by reducing shared contact points.

Long-range RFID is gaining traction as a complete people and vehicle solution. As an ideal solution that automates vehicle access without the need for ticket stations, pin pads or manned gates, members of staff can now go from their doorstep to the room they are required in without having to touch surfaces in order to access the car park and building.

All of this can be done from a card that is transferred from a special holder in your car to a land yard for centrally managed, hands-free access around the facility. A modern access control solution using long range readers can help by keeping supplies locked in a dedicated room with access granted only for approved staff ID badges. Whilst also restricting access in staff car parks to only approved staff members.

Access control software offers a unique insight of real-time data into key staff members and their movements within the building. This software can then compile the data collected into reports which can help reveal bottlenecks in the flow of staff members around the facility.  In the case of an emergency, an access system with connections to readers and cameras, can lock / unlock certain doors, or revoke access to particular people in case their badge was stolen.

Whilst we cannot accurately predict what the world will look like post COVID-19, long-range RFID technology could prove to be a powerful tool going forward. It offers solutions that go beyond just security, and helps healthcare facilities build a better future by improving workflow, manage medical equipment, protect patients, staff and visitors from infection and future pandemics.
The turnstiles, revolving doors restrict entry to one person at a time and with the automatic systems, the entry is verified against each individual and the door is opened and closed automatically. This will ensure a contactless access control in Ireland while maintaining the same level of security.

The access control system will regulate and limit the incoming and outgoing of a pedestrian. The access control gates can be installed to stop the pedestrian movements and only allow the authorized authorities to enter. This way you can control whether the permission can be granted to the person or should be restricted. This system will regulate social distancing and safe workplace environment by ensuring only the essential personnel to enter and restrict the outdoor crowd. Public places such as stations, hotels, banks, restaurants, airports, etc. can use the access control system to ensure only the needy person gets in and the contraction of the virus is stopped.

This will not only be useful in public places, but also at community centers, apartment complexes, parking garages or college campuses. This will control the crowd in a manner will implement social distancing and will protect the entire facility.

Seos is a breakthrough credential technology that represents a new way of thinking about end-user experiences. Solutions that are powered by Seos offer the freedom to use your device of choice – from smart cards to smartphones – for secure access to more application. Solutions range from building access, computer login and cashless vending to Internet of Things (IoT) applications, time-and-attendance, secure print authentication and an ever-increasing number of other uses that are in demand. As a dynamic, standards-based technology that is already proven in the marketplace, Seos introduces a new realm of choices. End-users have the potential to use any combination of smart phones, smart cards, tablets, wearables, bank cards, key fobs, inlays and other smart devices to secure applications.
Finger technology is end now, most of end user going to nontouch based attendance system. Through iPhone & Android enabled app platforms GPS & Camera end user track there employee mainly who work from home / field technical or sales team. Employees in the field can register their attendance through a mobile app. The attendance is pushed to ADIS and it puts the data on cloud server. Tech integrates with Google Map, its Advance Geo Tagging features gets you the exact longitudinal location of the employee which verifies his presence on the client’s premises. For example, when an employee reaches a destination on time and the client keeps him waiting, the manager can intervene and make meeting on time. On the other hand when the employee leaves the premises a quick check up can be done about his performance with the client and any issues can be resolved as soon as possible.
Facial recognition is the ideal choice. Once installed and your employees are registered they merely have to look at the device and it will record them. Clocking takes a split second. But due to Mask on your face, some old face recognition system may not work.

Access Control Manufacturers / OEM & Their Partner
Mercury
HID
Proprietary
Lenel
RedCloud
Kantech
R2S
Averics
GE
Open
Options
CBORD
Group
Software
House
Honeywell Prowatch
Genetec
Johnson Controls
Red Cloud
IDN-Acme
AMAG
S2
Imron
Keyscan
Brivo
Maxxess
Gallagher
Maxxess
Next Level Security Systems
DSX
Keri NXT
Automated Management Technologies (AMT)
RBH Access
Genetec
Johnson Controls - EDGE ONLY
Identive
Stanley
Wren Solutions
Paxton
Identicard

Infinias
RF Logics Inc

Bosch ReadyKey

Ref:
https://ipvm.com/reports/
https://ipvm.com/reports/zkteco-fda
https://www.securityindustry.org/2020/05/27/fda-issues-guidance-on-thermal-imaging-systems-and-covid-19/