Showing posts with label OSDP. Show all posts
Showing posts with label OSDP. Show all posts

Sunday, February 1, 2026

Open Access Controller Guide

 Open Access Controller Guide

In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers.

In 2019, Axis released a 3rd party-only controller, while HID purchased Mercury Security.

In this note, we contrast common access hardware providers and which brands of hardware many access management systems use.

·        The 3rd party offerings of Axis, HID, Isonas, and Mercury

·        How their pricing compares

·        Why ONVIF for Access Control Is Not A Big Factor

·        A chart explaining which controllers 34 notable access platforms support

·        The three factors that may complicate takeovers

What is an Access Control System?

An access control system is a security measure designed to regulate who can enter or exit a building or specific areas within it. These systems can range from simple mechanical locks to advanced biometric and cloud-based solutions. Modern access control systems often include features like keycards, PIN codes, mobile credentials, and facial recognition technology.

Select Access Hardware Components

Your access control system will require various hardware elements:

·        Control Panels: The brain of the system, managing access points and credentials.

·        Readers: Devices that scan keycards, biometrics, or mobile credentials.

·        Electric Locks: Magnetic or strike locks that secure doors.

·        Door Sensors: Detect whether a door is open or closed.

·        Request to Exit Buttons: Allow users to leave secured areas.

·        IT: If you run an on-premises access control system you will need a computer to run the software on and network connectivity.

Choose hardware compatible with your desired technology and ensure it meets your building’s security standards.

'Open' Controller Options

In the access market, the number of manufacturers producing door controller hardware is comparatively small to the total number of vendors writing management software.

While some companies choose to produce their own proprietary controller designs, a significant portion of the market chooses to integrate with 'open' 3rd party devices manufactured by others.

For the access control market, the most widely recognized non-proprietary door controllers are produced by three companies:

·        Axis: The company offers two different controllers, the A1001 and A1601. Both models are two-door controllers, but the A1601 is built with higher memory capacity, faster processors, form C relays. Both units use Axis' VAPIX API, although the free embedded Axis Entry Manager software is only an option for the A1001.

·        HID Global: Owned by Assa Abloy, HID also manufactures two series of controllers, Edge and Aero, that with a firmware update can be added to over 15+ different access systems.

·        Isonas: The Allegion owned access hardware manufacturer opened it's line of controllers to being integrated into other platforms in 2017. The company's line of combo readers/controllers are IP based and PoE powered.

·        Mercury Security: Purchased by HID in 2017, the hardware manufacturer sells only to other businesses. Mercury produces several lines of controllers and expansion modules, including the IP-based LP and EP series and Series 3 Redboard panels with a common firmware framework. Over 35 companies use Mercury designed hardware, or other hardware using Mercury's standard firmware.

These offerings compose most of the 'open' controller options in the market.

Defining 'Open' for Access

In the case of access control and the broader security market, 'Open' has a different general meaning than IT and software development use. 'Open' for access essentially means 'non-proprietary' that is potentially compatible with several systems.

This differs from 'openness' in other tech areas where 'open-source' generally means use is free, collaboration is public, and licensing (if implemented) is light and provisional.

Cost Comparison

While pricing varies for each controller, the hardware cost alone may also be subject to additional software licensing. However, on a hardware only basis, pricing looks like:

·        Axis A1001 & A1601: The A1001 is widely available online for ~$500, while the A1601 runs ~$700.

·        HID Edge EVO: The single door controller is available from distribution with a street price of ~$350, with options for units with integrated readers for ~$450.

·        HID Aero: The base controller and two-door expansion module is available through resellers for ~$650, but total cost varies depending on which base controller and how many expansion modules are used.

·        Isonas: The company's line of RC-04, PowerNet, and IP Bridge controllers range from $700 (single door) - $1,100 (three door bridge) depending on configuration of the included reader.

·        Mercury Security: None of these products are available as direct purchases from Mercury or through distribution. Single door controllers typical range in price from $250 - $400, but the final cost is often heavily negotiated and drops for projects with large door counts.

Compatibility Chart

The chart below provides a look at leading access brands, and which door controllers they work with:-

The Disadvantages of Proprietary Solutions

Discussions around the “myth” of open architecture often come from advocates of proprietary solutions who argue against the flexibility of open systems. However, this perspective can be compared to the fox guarding the henhouse—those who benefit from vendor lock-in are the ones discouraging open architecture. The primary aim of proprietary manufacturers is to secure ongoing reliance on their products, leaving organizations with little ability to switch to alternative solutions without a major cost.

Hardware installation is typically the most expensive part of an initial Physical Access Control System (PACS) deployment. By opting for a proprietary solution, organizations essentially commit to that manufacturer for the duration of the product’s lifespan. If the solution no longer meets operational needs, a costly overhaul is required to migrate to another system. This dependency aligns perfectly with the goals of proprietary vendors, keeping organizations tied to one source indefinitely.

The Advantages of Open Architecture Solutions

Open architecture solutions offer a range of benefits that boost security, flexibility, and efficiency. Companies like Mercury Security, HID Aero, and Axis provide open hardware platforms that are interoperable and supported by numerous technology partners. Choosing an open architecture approach means futureproofing your hardware investment, allowing for a flexible transition across providers without needing a complete system replacement.

For example, Mercury Security has the world’s largest access control hardware base, supported by over 20 OEMs. This extensive adoption enables users to switch to another Mercury OEM if the current solution is insufficient, preserving the existing hardware infrastructure and avoiding significant costs.

Five Reasons to Choose Open Architecture

1.   Interoperability and Integration: Open architecture supports seamless integration across various hardware and software, enabling vendor independence, smooth communication between platforms, and easy customization to meet unique security needs.

2.   Scalability and Flexibility: Open architecture systems are scalable and flexible, allowing for expansion and adaptability. Incremental upgrades are possible without major overhauls, reducing costs and supporting long-term system value.

3.   Cost-Effectiveness: Open architecture reduces expenses tied to proprietary systems, such as costly upgrades and vendor-specific maintenance. By supporting partial upgrades and enabling competitive pricing, it provides short- and long-term savings.

4.   Enhanced Security: Open systems allow organizations to implement the latest security protocols and quickly respond to emerging threats. They also support compliance with industry standards, ensuring a resilient and compliant security environment.

5.   Future-Proofing: Open architecture preserves initial hardware investments by allowing integration of new technologies through standard protocols. This approach ensures long-term relevance, efficiency, and cost savings.

Proprietary Private Brand Hardware Common

Notice not all platforms use or are compatible with third party panels.

For example, major providers like Tyco's Software House use proprietary controllers, which differ and are not compatible with other Tyco access products like the distribution access line Kantech that uses its own proprietary panels.

Startups like Openpath and Proxy sell 3rd-party compatible mobile readers, but also are available in versions that use their own proprietary controller boards/relays in a standalone management software.

Access ONVIF Not A Factor

When it comes to interoperability standards, access control is significantly less accepting of standards like ONVIF and no 3rd party standard is widely adopted.

As noted in Access Control Does Not Want ONVIF, despite being so readily adopted by video platforms, both ONVIF interoperability standards, Profile A and Profile C have weak adoption with support from only two vendors:

Three Common Takeover Exceptions

While generally possible, 'takeovers', where controllers associated with one platform are switched to another, have exceptions.

The three common factors that complicate system takeovers and controller interoperability are:

·        Unsupported Features/Integrations

·        New Licensing/OEM Mask Codes

·        Voided Warranty or Support

Unsupported Features/Integrations

First, in terms of existing system integrations and features, just because another system supports the same controller hardware, there is no certainty a new platform supports the same range of features and integrations. Individual features, like OSDP or event cross-linking may be supported at the panel in one system, but not the other.

New Licensing/OEM Mask Codes

Another pitfall, as noted in Does Lenel Support Unbranded Mercury Security Hardware? is some platforms may observe a 'Product OEM Mask' that codes hardware to a specific brand.

The codes are not always observed and not all 3rd party vendors have them in place, but adding existing hardware to a new system can be blocked and potentially require additional licensing fees or risk being refused by the new vendor.

In other cases, like Honeywell Prowatch, physically changing chips on the controller board may be required.

Voided Warranty or Support

Finally, vendors may choose to not 'tech support' taken-over devices, nor do they typically warranty them when something goes wrong.

Thanks to Mr. Brian Rhodes, IPVM writer.


Sunday, June 21, 2020

Technologies for Face Recognition in Access Control

Technologies for Face Recognition in Access Control

In the 1960s, Woodrow Wilson Bledsoe developed a system that could classify photos of faces called facial recognition. Identifying human faces in digital images has variety of applications, from biometrics and healthcare to video surveillance and security. In psychological terms, face identification is a process through which humans locate and attend to faces in a visual scene.
One can consider face detection as a specific case of object class detection. A reliable methodology is based on the eigen-face technique and the genetic algorithm.

Rather than just simply telling you about the basic techniques, we would like to introduce some efficient face recognition algorithms (open source) from latest researches and projects.

  • OpenFace
  • OpenBR
  • SphereFace
  • Deep Face Recognition with Caffe Implementation
  • Android Face Recognition with Deep Learning

8 from China, where facial recognition has received the most significant recent support:

  1. Dahua: "interest but not adoption"
  2. Facego: Big parent company, poor marketing
  3. Hikvision: Downplayed
  4. Longse: Fac Rec "Just for Show"
  5. Qualvision: "Frank Comments on NDAA, Face Rec Hype"
  6. Sunell: Bold Claims
  7. TVT: "that's gonna piss our customers off"
  8. ZKTeco: Claims World’s Best Facial Recognition, Calls Hikvision “Cheap Chinese”
Note: China's most prominent facial recognition providers, SenseTime, Megvii Face++, and Yitu.

12 outside of China, mostly US, with one each from Australia, Japan, Russia, South Korea and Taiwan:

  1. Avycon: ''It Can Detect A Face"
  2. Axxonsoft: Frank Comments on 'Accuracy' Ratings
  3. Ayonix: Emphasis on Speed
  4. Ever AI: Positions Itself as China/Russia Competitor
  5. Deepcam: Selling $59 'Facial Recognition' Cams
  6. Faceron: Obscure Operations
  7. Geovision: 3D Face Map and Gender Recommendations
  8. iOmniscient: "20x Cheaper", Touts Chinese Army as Client
  9. Panasonic: 'We Beat NEC'
  10. Real Networks / SAFR: US Based Facial Recognition for Schools Solution
  11. Tough Dog: Tough Time Selling Face Rec Solutions
  12. Virdi: World's Best / No Evidence

Suprema has a facial recognition reader called facestation 2 and also had a new face lite which was introduced in 2019. Idemia VisionPass uses visual cameras, IR, and '3D' Time-of-Flight sensors to establish face 'liveness' and scan faces to verify users. VisionPass unit supports IR scanning, capacity for more user templates, and is compatible with OSDP. Idemia pricing is higher, often 2X to 3X higher for VisionPass compared to facial recognition models emerging from China.
1- There are two main technologies for Face Recognition:
Optical solutions (CCTV based): these are based on algorithm/pixel performance only. It can be used as black listing (Stadium, Retail, Vandalism) but it is not enough for white listing (i.e.: access control).
Infra Red Solutions (Suprema and others): these are based on Light emission + IR sensors + Algorithm + processing power. Advantage of IR are: distance 15cm to 1.5m (it filters background and all related issues), works in any light conditions (unlike CCTV that can take a face with sun from the side), makeup/painting on face, Face Face/Images detection (easier than Optical). These ones are safe enough to be used for white listing (=access control).

2- FaceLite is working same as Suprema FaceStation2, with Infra-Red templates (it's compatible).
Cool stuff: FaceLite is 43% smaller (size) than FaceStation2, and the price follow the same 43% off trend. That brings the Flite IR face recognition reader to the price of Fingerprint reader (= BioLite Net : BLN2-OAB). But still you have the high performance/reliability/security. No sacrifice on this!

Limitation: Face template is too big to be encoded on a card (>8KB) and Suprema Face Models are "evolutive" (maching learning: each time you check your face on a reader, it is updated). The related drawback is that Face cannot be stored on RFID cards (EV1/EV2 / Seos). Instead it is stored in Central Database or in Reader itself (my preference). The # of face models are limited to 3,000 (1:N, Identification) and to 30,000 (1:1, Verification, that case you need to swipe a card or input an ID before authentication). Compared to FaceStation2 (FS2), you also lose the second optical camera (that I like for user interface or Picture logs), you lose the large touch screen, you lose Android OS, you lose the Video Intercom possibility. But that's in line with the 43% off in price point!

Privacy: Face templates are stored on central server (encryption: AES 256) or on readers (AES 128), with possible "Tamper secure" option => if the reader is removed from wall, it factory resets and loses all memory (Users, Face Models, Logs, Encryption keys, ..). Face Models are being transported from Central Server <=> Readers via TCP, using TLS 1.2 encryption/certificate.

Product Name

FaceStation 2
FaceLite
Model Name

FS2-D
FS2-AWB
FL-DB
RFID
RF Option
125kHz EM & 13.56MHz MIFARE, MIFARE Plus, DESFire/EV1, FeliCa
125kHz EM, HID Prox & 13.56MHz MIFARE, MIFARE Plus, DESFire/EV1, FeliCa, iCLASS SE/SR/Seos
125kHz EM & 13.56MHz MIFARE, MIFARE Plus, DESFire/EV1, FeliCa
Mobile Card
NFC
NFC, BLE
NFC, BLE
Protection
Ingress Protection
Not supported
Not supported
Not supported
Vandal Proof
Not supported
Not supported
Not supported
Face
Template
SUPREMA
SUPREMA
SUPREMA
Extractor / Matcher
SUPREMA
SUPREMA
SUPREMA
Live Face Detection
Supported
Supported
Supported
Capacity
Users (1:1)
* Based on one face enrollment per user
30,000
30,000
30,000
Users (1:N)
* Based on one face enrollment per user
3,000
3,000
3,000
Max. Face Enrollment per User
5
5
5
Text Log
50,00,000
50,00,000
50,00,000
Image Log
50,000
50,000
Not supported
HW
CPU
1.4 GHz Quad Core
1.4 GHz Quad Core
1.2GHz Quad Core
Memory
8GB Flash + 1GB RAM
8GB Flash + 1GB RAM
8GB Flash + 1GB RAM
LCD Type
4” color TFT LCD
4” color TFT LCD
2” color TFT LCD
LCD Resolution
800 x 480 pixels
800 x 480 pixels
320x240 pixels
Sound
24 bit Voice DSP (echo cancellation)
24 bit Voice DSP (echo cancellation)
24 bit Voice DSP
Operating Temperature
-20°C ~ 50°C
-20°C ~ 50°C
-20°C ~ 50°C
Storage Temperature
-40°C ~ 70°C
-40°C ~ 70°C
-40°C ~ 70°C
Operating Humudity
0% ~ 80%,
non-condensing
0% ~ 80%,
non-condensing
0% ~ 80%,
non-condensing
Storage Humidity
0% ~ 90%,
non-condensing
0% ~ 90%,
non-condensing
0% ~ 90%,
non-condensing
Weight
Device: 548g
Bracket: 74g (Including washer and bolt)
Device: 548g
Bracket: 74g (Including washer and bolt)
Device: 296 g
Bracket: 41 g (Including washer and bolt)
Dimension (WxHxD, mm)
141 x 164 x 125
141 x 164 x 125
80 x 160.3 x 71.8
Tamper
Supported
Supported
Supported
Interface
Wi-Fi
Not supported
Built-in, IEEE 802.11 b/g
Not supported
Ethernet
10/100/1000 Mbps, auto MDI/MDI-X
10/100/1000 Mbps, auto MDI/MDI-X
10/100 Mbps, auto MDI/MDI-X
RS-485
1ch Host or Slave (Selectable)
1ch Host or Slave (Selectable)
1ch Host or Slave (Selectable)
Wiegand
1ch Input, 1ch Output
1ch Input, 1ch Output
1ch Input or Output (Selectable)
TTL Input
2ch Inputs
2ch Inputs
2ch Inputs
Relay
1 Relay
1 Relay
1 Relay
USB
USB 2.0 (Host)
USB 2.0 (Host)
USB 2.0 (Host)
SD Card
Not supported
Not supported
Not supported
PoE
Not supported
Not supported
Not supported
Intercom
Supported
Supported
Not supported
Electrical
Power
Voltage: DC 24 V
Current: Max. 2.5 A
Voltage: DC 24 V
Current: Max. 2.5 A
Voltage: DC 24 V
Current: Max. 2.5 A
Platform
BioStar 2
Supported
Supported
Supported