Showing posts with label Suprema. Show all posts
Showing posts with label Suprema. Show all posts

Sunday, December 3, 2023

6 Reasons your business needs gates and barriers

6 Reasons your Business Needs Gates & Barriers 

Although the onset of the coronavirus saw a significant decrease in crime rates across the India due to enforced lockdown, there are very few reasons for businesses to take this as a sign of things to come. Indeed businesses should take this time to consider their security protocols and begin to address any shortcomings in good time as restrictions lift. Here we will look at some of the benefits of two of our most popular forms of perimeter security: gates and barriers.
1 – Barriers and gates are strong deterrents against crime
Time and time again we hear stories of criminals that have acted on opportunity when committing a crime. A broken fence, unlocked door, insufficient lighting, the list goes on. Having outdated, broken or a complete lack of perimeter security almost guarantees you to be viewed as an easy target by criminal gangs. Barriers and gates are the first port of call for many perimeter security overhauls because they actively send out a message that your business is not going to be easy pickings.
 
2 – Barriers and gates allow you to control movement
While tools like CCTV are a great way to monitor the flow of traffic and pedestrians throughout your site, they do nothing to act on it. One of the main shortfalls of CCTV is that it simply takes a record of actions. The job of dealing with any issues is left to others. With barriers and gates, you can proactively limit entry to your site. With the use of pin pads, tokens, and fingerprint recognition you can reduce the need for manpower to administer front-of-house duties.
 
3 – Real-time savings
This brings us to our next reason to invest in gates and barriers. Perimeter security is essentially an investment in your future. These enhancements protect you from the disasters that follow on from a serious crime. Businesses that are victims of serious crimes like theft, burglary, vandalism, and arson can face significant losses in several different ways. The initial impact of stock loss or damage, losses from downtime for your business, and an impact on your customer relationships or reputation are all very real consequences. They can be successfully averted by investing in your security needs before the worst happens.

 
4 – Curb appeal
Gates and barriers are often the first thing that visitors to your site or passers-by will see. A high-quality installation will provide a level of professionalism to your company brand and reputation and show that you care about the safety of your employees, assets, and visitors.
 
5 – Privacy
For businesses that operate in sensitive areas or highly competitive fields, privacy is often high on their agendas. Gates and barriers extend your footprint to the far exterior of your property and mean that the only people who can approach your site are those who you have given explicit authorisation to do so.

6 – Restrict vehicular access
Smash and grab type crimes are on the rise. This is when a perpetrator uses a vehicle to approach their target quickly, commits their crime, and then escapes again before the police arrive. By utilising gates and barriers you can effectively shut down the chances of a speedy approach or escape and thwart their plans.
 
No matter the size or nature of your businesses, we can provide you with a free, no-obligation quotation and feasibility survey to assess the security requirements of your organization. For more information on any of the security options above, or for further advice on how to protect your business premises from criminals, please contact us on ssaintegrate@gmail.com


Friday, April 15, 2022

Integrating access control and fire detection

Integrating Access Control and Fire Detection

Most fire jurisdictions require that all doors are automatically unlocked during a fire alarm emergency to ensure a fast exit for those inside the building and a fast entry for the firefighters to do their job. This means the door locking methods (typically electric strikes or electro-magnetic locks)—that are powered and controlled by an Access Control Unit (ACU)—must be kept unlocked during a fire alarm emergency. Fire relay is key product to execute this operation.

What is a fire relay or Output Module?

A output module or control module or fire relay is a switch that sits between the fire system control panel and the power source to the door locking methods. While there are different types of fire relays and different ways to configure them, the job of a fire relay is simple: when there’s a fire alarm, the fire relay unlocks the selected doors.

In an access control system, the fire relay is typically installed inside or near the ACU, and connects the ACU to the fire alarm control panel—as shown in this diagram. Any brand Access Control System can be integrate with Fire, some brand have dedicated port on controller, someone not. You need to verify before getting order. Below arrangement we have test in our experience centre.

Installing a fire relay can be expensive. Follow these tips to get the best pricing.

Lack of a fire relay is one of the most common and expensive surprises we see during customer site surveys. If you’re working with an existing building fire system and it doesn’t already provide a fire relay, you’ll need to get a quote from your building’s fire system provider to install one. 

Unfortunately, the cost of installing a new fire relay can vary significantly. We’ve seen fire relay quotes ranging from Rs. 4000 to Rs. 8000, but there are ways to negotiate for the best pricing. It’s best to include a fire relay as part of your lease agreement with your building management company. If that’s not an option, ask them to negotiate for a fire relay with the building fire system provider on your behalf. Your building management company will likely get better pricing.

If you are building out a new space, you can make a fire relay a part of the general contractor bid so it’s included in the fire alarm system design. Similar to the building management company, your general contractor who is in a position to give repeat business to the fire system provider is more likely to obtain better pricing. Before ordering verify contractor confidence and related document.

Each every manufacture has this module or relay to operate 3rd party equipment Like: Access Control, PA system, Fire Damper, Smoke Damper, AHU etc. If you have Edwards Fire Panel, then only Edwards’s module will be work with proper programming same as Notifier, ESSER, Autronica, GST, Gent any addressable fire brand. If you are not confirm lets contacts us we will guide you free of cost.

The control outputs from a fire alarm control unit can also be sent out on a signaling line circuit (SLC) to an addressable output module, which can open or close a contact based on information sent from the fire alarm control unit on the SLC to the COMM terminals. This is beneficial because multiple output modules can be controlled by the same SLC, which can control each module separately. For example, all output modules controlling all of the door hold opens in a building could be on the same SLC, but based on the specific input to the control unit, only specific doors can be closed. If all of these modules were on the same control circuit, the control unit would only be able to close all the doors.


Monday, November 1, 2021

2021 is a big year for Mobile Credentials

2021 is a big year for Mobile Credentials 

Modern electronic access control systems, whether on-premise or cloud-hosted, offer a variety of ways to authenticate users and grant them access to a space. Credentials are typically classified into a few categories, something you have, something you know, something you are, or any combination of these categories (multi-factor).

Keep reading to learn about four of the most common types of access control credentials and how they can help you manage your space more effectively.

In access control and identity management, authentication is done via three factors, namely what you have (keyfobs and access control cards), what you know (passwords) and what you are (biometrics).

Needless to say, more and more people are now using their smartphones to open doors. And 2020-21 is likely to be a big year for mobile credentials, whose market size and deployment are expected to reach a new height.

In terms of the “what you have” factor, regular and smart cards have been in use for a long time, whereby the user either taps the card on the reader or bring the card close to it. Yet more and more, mobile credentials, or user credentials stored in the user’s mobile phone which can then interact with the reader, have become a more popular concept and are increasingly deployed in certain end user entities such as offices, college dorms and hotels.

1. RFID

Historically, the most common credential is RFID technology using some sort of card or fob (something you have). These RFID options can range from basic proximity cards and fobs to more advanced and secure smart cards that use integrated circuit chips embedded into the card itself to provide encrypted communication with the access control readers. Not all access control cards are secure as some can be easily sniffed and cloned. Access control cards can also easily be lost or stolen, which can create a vulnerability.

2. PIN Codes

PIN codes are also a popular method where a PIN code (something you know) is assigned to a user and then used as their credential to access a space. With PIN codes, a user walks up to the keypad on a door and types in a numerical code assigned to them to authenticate and gain access to a space. PIN codes do have some drawbacks as well. PIN codes are often shared, creating a security risk. In addition, PIN codes can be cumbersome to administer and maintain.

3. Biometric

Biometric credentials have grown in popularity over the past several years and can include multiple biometric features (something you are). There are biometric devices that can scan fingerprints, retinas, or the palms of your hand to authenticate you and grant or deny access. Another biometric option is facial scanning where a device can scan a face to determine facial features that can be turned into a hash that can then be used as a credential. Biometric readers have come a long way and can offer a high level of security, but in order for biometric readers to work effectively and efficiently, they need to be installed in the right location and in the right environmental conditions.

4. Mobile Credentials

Perhaps one of the fastest-growing credentials lately is mobile credentials. Mobile credentials allow users to have a credential stored on their mobile devices, usually in the form of a mobile app, that they can use to gain access to spaces providing those spaces have compatible hardware. As a user approaches a reader, they can make an unlock request using a button on their phone or even a gesture, to gain access. Mobile credentials also have the advantage of providing multi-factor authentication easily by leveraging the built-in PIN code functionality or biometric readers of the mobile device for additional security. A system administrator can require that in addition to the mobile credential a user needs to provide either a PIN code and/or a fingerprint/facial recognition, whichever method the mobile device supports. Mobile credentials have grown in popularity so much because just about everyone has a mobile device with them at all times, and they are easy to administer compared to managing RFID cards or PIN codes.

In fact, 2020 is set to be a big year for mobile credentials as suggested by various stats and figures. Gartner, for example, has predicted that in 2020, 20 percent of organizations will use smartphones in place of traditional physical access cards, compared to just 5 percent back in 2016.


Growth drivers

That the mobile credential trend is picking up is quite understandable due to their various benefits, among them the convenience factor. Whereas the user may forget to bring their keycard, they are less likely to forget to bring their smart device. Further, compared to keycards, smartphones are less likely to be lost as users attach greater importance to them. On a related note, since chances are the user already has a mobile device, the end user entity does not have to spend extra cost to make cards for their staff.

Besides those benefits, wider technology availability will drive growth as well. “When they first appeared about 10 years ago, mobile credentials used near-field communication (NFC). Since Apple never provided API access to its NFC capabilities, adoption was limited, because the technology was only available to Android users. Today’s mobile credentials use Bluetooth, which is supported by all smartphone manufacturers and many wearables, such as smartwatches, and is therefore available to virtually everyone with a smart device. Bluetooth also ups the convenience factor since Bluetooth readers allow users to open doors without even taking their phones out of their pockets. If your customer uses a cloud-based access control system, mobile devices can communicate directly with the cloud via Wi-Fi or cellular.
 
Meanwhile, compared to cards, which can be duplicated or cloned, the mobile device has more security features. The biometric function that unlocks the phone in and of itself is a security feature that prevents misuse by others in the even the phone is lost. Meanwhile, the latest technologies also enable communications to be safer between the phone and the reader.
 
Finally, mobile credentials have the “wow” factor. “Everyone loves new gadgets, especially ones that make their lives easier. Mobile credentials are no exception. Our salespeople tell stories of closing deals as soon as they show prospective customers that they can unlock their doors with their smartphone. Property managers have begun listing mobile credentials as one of their high-tech amenities to attract new residents. Users of mobile credential apps write glowing reviews about convenience.

Still not sure which access control credential solution is right for you? We’re here to help.

The goal is no longer just limiting access to a particular space but rather managing that space effectively.

Modern electronic access control systems offer a wide variety of features to allow you to better manage business spaces and to protect your business and your brand.

Working with a qualified security sales consultant will ensure you are not installing old technology into a new installation. There is an access control solution available that is convenient, secure, and works for your user’s technology level. You can touch with SSA Integrate to get proper way, what actual is required for your premises. They are solution service provider for SUPREMA, Magnetic FAAC & certified for Honeywell Winpak Access Control.


Sunday, February 14, 2021

Touchless Access Technology

Touchless Access Technology 

THE business landscape changing so dramatically over the past few months — possibly irrevocably — the task for many in security, including for consultants, integrators, dealers and manufacturers. As businesses and organizations begin to reopen, many are rethinking the way they budget for security, including access control, video surveillance and intrusion Alarm.

It’s amazing that a microscopic virus from China could virtually bring the world to a standstill. The 2020 global pandemic has reshaped the way people work, learn and play on every conceivable level. In addition to the devastating impact on global health and safety, COVID-19 has infected the health of the global economy.

The growing call to return to work will surely accelerate many of the social distancing, sterilization and occupancy issues that we are currently facing. Hopefully, modern medicine will rise to the challenge sooner than later with a COVID-19 vaccine, but this may take some time even with accelerated testing and approvals.

Commonly touched items that can cause the spread of coronavirus (and other infectious disease) can include things like elevator buttons, ATM and checkout keypads, door knobs and handles, keyboards and mice, and door/entry access control panels — just to name a few. When you think about all of the “touchable” items that you interact with each day it becomes a daunting task to stay away from them and feel safe, clean and virus-free. Well, it's no surprise that right now, businesses are feeling the need to provide solutions and upgrade their safety and security as the workforce begins to come back to the office or plan for that to happen soon.

By employing touchless credentials such as face recognition, proximity devices, or mobile credentialing, existing and new access control systems can easily be enhanced to provide a fast and efficient means of allowing authorized individuals hands-free entry and egress to a facility helping prevent the spread of contagions that can impact the health of both individuals and businesses. Taking the role of access control further, platforms with open architecture can integrate new thermal detection solutions to instantly identify the surface temperature of individuals.

Types of touchless technology

Businesses going touchless isn’t new—despite how relevant it is lately. In fact, touchless technology, from gesture sensors to voice recognition, has been widely used since the late 1980’s when automatic faucets and soap dispensers became popular in public restrooms. Today, you likely experience touchless technology multiple times a day such as walking through an automatic door, or asking Siri to set your alarm while your phone is sitting across the room from you.

Sign-in process

Touchless technology isn’t only about hygiene and safety. It’s also a way to show that your business is forward-thinking and modern. After all, who likes being slowed down by an old-school pen and paper sign-in sheet or a clipboard with long legal documents to read through?

The answer: no one. That’s why we have thought through how to make the sign-in experience seamless and touch-free. With a touchless visitor sign-in, guests can pre-register on their phone or computer before their arrival; scan a QR code at check-in; and be off to see their host in no time.

For modern offices, creating a touchless experience shows that you’ve thought of every last detail of your visitor experience and have made steps to take the burden off of guests when they come onsite. By doing that, you save your visitors time once they arrive so they’re not bothered with sign-in and can more quickly get to who they’re there to see.

Plus, while having one visitor come on site might seem simple, there’s often a lot of info you’ll need to collect from them. Instead of asking for this information during sign-in, you can collect essential information about your guest and take care of any additional actions before the visit, rather than frantically trying to solve issues while your guests wait in your lobby.

Going touchless is another way to help your visitors, and your entire office, stay healthy. By going touchless, you’re able to minimize the spread of germs and make sure you’re taking care of everyone in your space. 

Gesture recognition

Gesture recognition is the most common form of no-touch technology. Users can do simple gestures to control or interact with devices without touching them. Waving your hand to trigger an automatic door, for example, removes the need to touch handles or a physical button. Users are positively identified with a simple wave of either their right or left hand, in any direction. The touchless technology copes with wet and dry fingers, eliminates ghost images left on the scanner and mitigates hygiene concerns. The high speed, contactless acquisition capability allows users to remain in motion while being identified. Faster access control and time & attendance transactions reduce overall costs and increase employee productivity.

The system uses the passenger's unique Aadhaar identification number to biometrically authenticate passengers in real time, from arrival at the airport through boarding. Each checkpoint features high-speed and touchless biometric technology to facilitate the passenger processing. In less than a second, this device captures four fingerprints and matches them against the Aadhaar database.  An automated process generates considerable time savings for an airport like Bengaluru, which experienced a 22% increase in passengers in 2016, rising to 22 million. Passengers will be able to pass these checkpoints much quicker, and no longer have to constantly show their ID documents & boarding pass/e-ticket.

Bengaluru is the first airport to use a biometric identification process based on Aadhaar ID numbers, offering a thoroughly modern passenger experience that will contribute to the digital transformation of India. Indian passengers with a driver license (which also contains their fingerprints), and passengers with a biometric passport from other countries can also take advantage of this e-boarding system. When checking in, they are assisted by a police officer, who scans their passport and boarding card, and saves their fingerprints to ensure traceability.

Examples of this include smart lights that turn on when you walk into a room or automatic doors that you see at grocery stores, hotels, and commercial buildings.

Voice recognition

Voice recognition systems let users interact with technology simply by speaking to it. This has become popular especially in our homes. We can make hands-free requests, set reminders, and perform other simple tasks by talking to Apple’s Siri, Amazon’s Alexa, or the Google Assistant. You’ll be able to use an app to switch on light, or if that sounds a little awkward, even your voice – most systems will integrate with a virtual assistant such as Google or Amazon. One thing to check is that your lighting is compatible with the virtual assistant you use, as not all bulbs work with all systems.

Dozens of companies now offer smart door locks that are controlled via an app. With many of them, you can even control access with your voice using virtual assistants such as the Amazon Alexa®.

It’s also possible, with many models, to send electronic keys to friends and guests when they visit. These keys can be timed to stop working once they leave, giving you peace of mind.

With most virtual assistants, you’ll even be able to remotely operate your lights and set timers so it appears you are home even if you’re away. You can also set routines, so that the house lights up whenever you return home, and switches everything off as you retire to bed for the night.

Most smart TVs integrate with a virtual assistant, so you can turn on your TV or change channels using your voice – a particularly useful feature when you inevitably lose the remote down the back of the sofa, so it’s useful long after COVID-19 is a distant memory.

Facial recognition

Even before the COVID-19 pandemic, the touchless nature of facial recognition as an access credential was gaining traction with physical and cyber security professionals. By using an individual’s face as an access control credential, facial recognition eliminates the need and expense of physical cards and proximity devices, or the need to physically enter PIN codes. In addition, facial recognition readers meet the new emerging need to limit physical exposure to germs and viruses by offering a highly accurate touchless access control credentialing solution. 

As a workforce management tool, facial recognition helps preserve the health of employees checking into work, while providing management with an infallible means of documenting employee time and attendance while providing a detailed history of overall workforce activity and individual personnel tracking. Both of which have been longstanding challenges due to easily compromised time tracking systems and practices. Now, nothing is left to question based on hard data. 

With the growing popularity of facial recognition technology, there are many choices already available with more undoubtedly on the way. Selecting the right solution for your specific access control and/or workforce management application is dependent on a very wide range of variables. But there are a few core characteristics that you should look for when evaluating facial recognition readers.

Most facial recognition terminals employ some form of IR (Infrared) technology to help ensure high visibility by the unit’s image sensor. This often limits where the unit can be installed such as outdoors or near windows due to strong ambient light. More advanced facial recognition readers employ as many as 80 wide-angle near infrared LEDs and 60 narrow-angle near infrared LEDs, allowing the unit to recognize faces even in full daylight and brightly lit environments (not direct sun). This enables installation at indoor locations near windows, lobbies and building entries.  

Another facial recognition reader advancement to look for involves three-dimensional pixel intensity analysis. Ambient lighting contains ultraviolet rays which can negate near infrared LED lighting, and can also cast shadows making it difficult for a facial recognition reader to pinpoint the facial recognition points required for identification and authentication. Three-dimensional pixel intensity distribution analysis minimizes the effects of ambient light when acquiring facial images by minimizing lighting contrasts. As a result, it is easier for the algorithm to recognize the shape of the face enabling it to extract more facial features and create higher quality face templates, which are critical for accurate facial recognition. 

The angle and position of a facial recognition reader directly impact the performance of the unit. Facial recognition readers with different viewing angles for built-in visual and infrared cameras allows users to stand at positions that are most suitable for facial recognition with little or no effort of contortions. This results in a faster, more comfortable, and convenient user experience. 

It is most important that the facial recognition readers you evaluate are capable of analyzing faces in real time to maintain fluid entry/egress even during high volumes of employee traffic. Hardware-dependent live face detection systems employing technologies such as facial thermogram recognition and facial vein recognition require expensive hardware components, provide less accurate matches and slower authentication performance, which is counterintuitive for mainstream access control and workforce management applications. 

Thermal Camera integration is expected to enhance security and safety at sites by combining face recognition and skin temperature measurement with facial recognition hardware unit. It increased the accuracy and consistency of the temperature measurement by using the face recognition algorithm to pinpoint the upper area of the face. It displays skin temperature and thermal image of a subject’s face on its intuitive GUI, giving audio and visual alerts when higher than threshold temperature is detected.

Personal devices

For technology to be completely touch-free it must operate without the need for physical contact, like in the examples above. However, the introduction of smartphones and other personal devices have made nearly touch-free technology possible as well. Anything that operates at the command of your own personal device allows you to avoid touching public surfaces. The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before.

The combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards.

Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction.

Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets.

While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market.

Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems however, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards.

AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin.

This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader.

“For Indian workers to return safely back into office buildings, there must be a comprehensive system in place that integrates technology and new safety protocols both for the building and for tenant spaces alike. It can't be every building owner, tenant and occupant for themselves. We are all in the business of public health now to protect each other’s lives and help India get back to work”. - Arindam Bhadra

Iris

Every human iris has its own unique traits. An iris scanner identifies pits, furrows and striations in the iris and converts these into an iris code. Comparing this code to a database subsequently determines whether to allow access. Iris recognition terminals provide 100% touchless user authentication for a variety of applications, spanning access control, time & attendance, visitor management, etc.

Touchless Switches

Touchless wall switch makes opening a door simple and germ free. Blue LED back-lighting highlights the switch at all times, other than during activation. This provides a visual reference of the switch’s location in low light conditions. Its low-profile design makes it blend into your wall.

Touchless Visitor Management 

The visitor management system is the first point of contact for every visitor. To help maintain the spread of COVID-19, several organizations are implementing health screening procedures for visitors and employees entering their building.

Touchless technology doesn’t only provide protection and safety to the workplaces. It also provides the seamless modern experience to the workplace. The paper-based manual system is not safe enough and also slowed down the productivity of the business. That’s why we have thought through how to make the visitor check-in experience seamless and touch-free.

A.   With a Touchless visitor management system, visitors can pre-register on their smartphone before their arrival; visitor screening; check-in with a QR code; can meet their host in no time; and record the last details of the visitor experience.

B.   Going Touchless is a way to help your visitors, and your workplace, stay healthy. By going Touchless, you’re able to reduce the spread of viruses.

C.   The Touchless visitor management system saves your visitors time once they arrive so they’re not bothered to check-in and can more quickly get to who they’re there to see.

D.   When Visitors arrive, you can collect essential information about your guest and take care of any additional actions before the visit.

E.   Touchless Visitor management System isn’t only about hygiene and safety. It’s also a way to show that your business is forward-thinking and modern.

Kiosk

Companies have to now restart the Touchless visitor management system after lockdown is over. To help maintain the spread of COVID-19, several organizations are implementing health screening procedures for visitors and employees entering their building. Touchless self-check kiosk automatically measures body temperature in seconds. It is an invaluable solution for quick detection of illnesses and reduce the spread of bacteria & viruses, it vets staff members and the public before entry to premises such as Schools, Malls, Restaurants, factories, Railway stations, Airports, and Corporate offices.

The kiosk features a touch-less UV-C Box to disinfect the bag, cell phone, and keys in less than 10 seconds. UV-C Box kills 99% Viruses and Bacteria within 10 seconds on exposed surface.

Preparing before anyone even arrives onsite

There’s a lot you can do before your employees and guests arrive to make the experience frictionless. Start by pre-registering anyone coming into your office. This way you can gather important information to make sure they’re safe to enter and give them what they need to feel comfortable in your workplace.

Start with pre-screening them and approving their entry to make sure only the right people come on-site each day. This gives your team important control levers, like inviting healthy employees into the office in shifts.

Create a touchless sign-in experience.

A.   Post clear signage at the front desk so people know what to do when they arrive

B.   Allow people to check-in using their personal device rather than an iPad Kiosk

C.   Put a bottle of hand sanitizer next to your kiosk if you do need to use it

D.   Update your settings so guests don’t have to tap to take their photo when they arrive

E.   Create a welcome guide and customize it by employee or visitor type to make sure everyone has the information they need

F.    Make your badge printer easily accessible to guests 

G.   Update your hospitality practices. Instead of having a receptionist hand a guest a drink, make personal beverages available to grab without hand-to-hand contact

H.   Set up your final screen to give instructions to guests about what to do next, like where to go or where to wait for their host

I.    Opt for a sign-in system that notifies your employees automatically when their visitors arrive


Sunday, June 21, 2020

Technologies for Face Recognition in Access Control

Technologies for Face Recognition in Access Control

In the 1960s, Woodrow Wilson Bledsoe developed a system that could classify photos of faces called facial recognition. Identifying human faces in digital images has variety of applications, from biometrics and healthcare to video surveillance and security. In psychological terms, face identification is a process through which humans locate and attend to faces in a visual scene.
One can consider face detection as a specific case of object class detection. A reliable methodology is based on the eigen-face technique and the genetic algorithm.

Rather than just simply telling you about the basic techniques, we would like to introduce some efficient face recognition algorithms (open source) from latest researches and projects.

  • OpenFace
  • OpenBR
  • SphereFace
  • Deep Face Recognition with Caffe Implementation
  • Android Face Recognition with Deep Learning

8 from China, where facial recognition has received the most significant recent support:

  1. Dahua: "interest but not adoption"
  2. Facego: Big parent company, poor marketing
  3. Hikvision: Downplayed
  4. Longse: Fac Rec "Just for Show"
  5. Qualvision: "Frank Comments on NDAA, Face Rec Hype"
  6. Sunell: Bold Claims
  7. TVT: "that's gonna piss our customers off"
  8. ZKTeco: Claims World’s Best Facial Recognition, Calls Hikvision “Cheap Chinese”
Note: China's most prominent facial recognition providers, SenseTime, Megvii Face++, and Yitu.

12 outside of China, mostly US, with one each from Australia, Japan, Russia, South Korea and Taiwan:

  1. Avycon: ''It Can Detect A Face"
  2. Axxonsoft: Frank Comments on 'Accuracy' Ratings
  3. Ayonix: Emphasis on Speed
  4. Ever AI: Positions Itself as China/Russia Competitor
  5. Deepcam: Selling $59 'Facial Recognition' Cams
  6. Faceron: Obscure Operations
  7. Geovision: 3D Face Map and Gender Recommendations
  8. iOmniscient: "20x Cheaper", Touts Chinese Army as Client
  9. Panasonic: 'We Beat NEC'
  10. Real Networks / SAFR: US Based Facial Recognition for Schools Solution
  11. Tough Dog: Tough Time Selling Face Rec Solutions
  12. Virdi: World's Best / No Evidence

Suprema has a facial recognition reader called facestation 2 and also had a new face lite which was introduced in 2019. Idemia VisionPass uses visual cameras, IR, and '3D' Time-of-Flight sensors to establish face 'liveness' and scan faces to verify users. VisionPass unit supports IR scanning, capacity for more user templates, and is compatible with OSDP. Idemia pricing is higher, often 2X to 3X higher for VisionPass compared to facial recognition models emerging from China.
1- There are two main technologies for Face Recognition:
Optical solutions (CCTV based): these are based on algorithm/pixel performance only. It can be used as black listing (Stadium, Retail, Vandalism) but it is not enough for white listing (i.e.: access control).
Infra Red Solutions (Suprema and others): these are based on Light emission + IR sensors + Algorithm + processing power. Advantage of IR are: distance 15cm to 1.5m (it filters background and all related issues), works in any light conditions (unlike CCTV that can take a face with sun from the side), makeup/painting on face, Face Face/Images detection (easier than Optical). These ones are safe enough to be used for white listing (=access control).

2- FaceLite is working same as Suprema FaceStation2, with Infra-Red templates (it's compatible).
Cool stuff: FaceLite is 43% smaller (size) than FaceStation2, and the price follow the same 43% off trend. That brings the Flite IR face recognition reader to the price of Fingerprint reader (= BioLite Net : BLN2-OAB). But still you have the high performance/reliability/security. No sacrifice on this!

Limitation: Face template is too big to be encoded on a card (>8KB) and Suprema Face Models are "evolutive" (maching learning: each time you check your face on a reader, it is updated). The related drawback is that Face cannot be stored on RFID cards (EV1/EV2 / Seos). Instead it is stored in Central Database or in Reader itself (my preference). The # of face models are limited to 3,000 (1:N, Identification) and to 30,000 (1:1, Verification, that case you need to swipe a card or input an ID before authentication). Compared to FaceStation2 (FS2), you also lose the second optical camera (that I like for user interface or Picture logs), you lose the large touch screen, you lose Android OS, you lose the Video Intercom possibility. But that's in line with the 43% off in price point!

Privacy: Face templates are stored on central server (encryption: AES 256) or on readers (AES 128), with possible "Tamper secure" option => if the reader is removed from wall, it factory resets and loses all memory (Users, Face Models, Logs, Encryption keys, ..). Face Models are being transported from Central Server <=> Readers via TCP, using TLS 1.2 encryption/certificate.

Product Name

FaceStation 2
FaceLite
Model Name

FS2-D
FS2-AWB
FL-DB
RFID
RF Option
125kHz EM & 13.56MHz MIFARE, MIFARE Plus, DESFire/EV1, FeliCa
125kHz EM, HID Prox & 13.56MHz MIFARE, MIFARE Plus, DESFire/EV1, FeliCa, iCLASS SE/SR/Seos
125kHz EM & 13.56MHz MIFARE, MIFARE Plus, DESFire/EV1, FeliCa
Mobile Card
NFC
NFC, BLE
NFC, BLE
Protection
Ingress Protection
Not supported
Not supported
Not supported
Vandal Proof
Not supported
Not supported
Not supported
Face
Template
SUPREMA
SUPREMA
SUPREMA
Extractor / Matcher
SUPREMA
SUPREMA
SUPREMA
Live Face Detection
Supported
Supported
Supported
Capacity
Users (1:1)
* Based on one face enrollment per user
30,000
30,000
30,000
Users (1:N)
* Based on one face enrollment per user
3,000
3,000
3,000
Max. Face Enrollment per User
5
5
5
Text Log
50,00,000
50,00,000
50,00,000
Image Log
50,000
50,000
Not supported
HW
CPU
1.4 GHz Quad Core
1.4 GHz Quad Core
1.2GHz Quad Core
Memory
8GB Flash + 1GB RAM
8GB Flash + 1GB RAM
8GB Flash + 1GB RAM
LCD Type
4” color TFT LCD
4” color TFT LCD
2” color TFT LCD
LCD Resolution
800 x 480 pixels
800 x 480 pixels
320x240 pixels
Sound
24 bit Voice DSP (echo cancellation)
24 bit Voice DSP (echo cancellation)
24 bit Voice DSP
Operating Temperature
-20°C ~ 50°C
-20°C ~ 50°C
-20°C ~ 50°C
Storage Temperature
-40°C ~ 70°C
-40°C ~ 70°C
-40°C ~ 70°C
Operating Humudity
0% ~ 80%,
non-condensing
0% ~ 80%,
non-condensing
0% ~ 80%,
non-condensing
Storage Humidity
0% ~ 90%,
non-condensing
0% ~ 90%,
non-condensing
0% ~ 90%,
non-condensing
Weight
Device: 548g
Bracket: 74g (Including washer and bolt)
Device: 548g
Bracket: 74g (Including washer and bolt)
Device: 296 g
Bracket: 41 g (Including washer and bolt)
Dimension (WxHxD, mm)
141 x 164 x 125
141 x 164 x 125
80 x 160.3 x 71.8
Tamper
Supported
Supported
Supported
Interface
Wi-Fi
Not supported
Built-in, IEEE 802.11 b/g
Not supported
Ethernet
10/100/1000 Mbps, auto MDI/MDI-X
10/100/1000 Mbps, auto MDI/MDI-X
10/100 Mbps, auto MDI/MDI-X
RS-485
1ch Host or Slave (Selectable)
1ch Host or Slave (Selectable)
1ch Host or Slave (Selectable)
Wiegand
1ch Input, 1ch Output
1ch Input, 1ch Output
1ch Input or Output (Selectable)
TTL Input
2ch Inputs
2ch Inputs
2ch Inputs
Relay
1 Relay
1 Relay
1 Relay
USB
USB 2.0 (Host)
USB 2.0 (Host)
USB 2.0 (Host)
SD Card
Not supported
Not supported
Not supported
PoE
Not supported
Not supported
Not supported
Intercom
Supported
Supported
Not supported
Electrical
Power
Voltage: DC 24 V
Current: Max. 2.5 A
Voltage: DC 24 V
Current: Max. 2.5 A
Voltage: DC 24 V
Current: Max. 2.5 A
Platform
BioStar 2
Supported
Supported
Supported