Wireless biometric identification: the path to universal access.
Today, biometric readers are placed on wireless access control cards, which clearly expand the capabilities and improve the convenience of establishing the authenticity of a person, but the real prospect lies in universal biometric access.
Just imagine the convenience of placing a biometric reader on your building access control card.
You could simply carry it with you like a car key fob (card), receive authentication as soon as you approach the door, and then simply walk inside.
Speeding up the building entry process will help avoid the inconvenience that security systems systematically bring to our office lives.
By combining biometrics with wireless communications as an additional layer to existing access control systems, entry and clearance become more convenient for the user.
This is the ultimate in security: universal hands-free (automated) access, authorized and verified using unique parameters.
The flexibility of using a combined biometric reader and access card means that a person can gain access simply by walking up to or through the door.
This requires a reader, wireless communications, and power to operate both identification systems on the card.
It also requires that the identification document be of a reasonable size and have a low cost.
How it works
The user registers their fingerprints in the system and, when they are about to enter the enterprise, simply places their finger on the card to initiate the transmission of identification data.
Such wireless communications are common today, but we are talking about long-distance data transmission from a small card without high power consumption.
Recent inventions in micro-wireless communications now make it possible to transmit a reliable signal over significant distances.
For example, 100 feet (300 m) from a small watch battery (the size of a coin) embedded with wireless electronics in an access card.
Automatic hands-free access control systems are often used in large enterprises where the number of moving employees is significant.
In these cases, mass accounting of personnel access is used, which, for example, makes it possible to take into account the working time of employees, attendance and costs.
The technology allows you to establish the location of employees who can be tracked on the plan during security training at the enterprise.
Support for emergency evacuation systems, which is required by law for all businesses, is provided.
Enhanced Business Security, Productivity, and Efficiency
Today, long-range wireless identification reduces direct costs while improving safety, productivity, and operational efficiency.
Combining them with distributed or decentralized biometric identification on the card creates an even more powerful and versatile workforce management tool. Many of today's systems are capable of communicating with multiple devices across the enterprise.
In this context, access control systems manage unique numbers for authorized entry.
With an integrated biometric reader, authentication is performed on the card itself.
After which only the access control ID is transmitted.
This ensures the safety and security of the encrypted biometric data, as only the existing ID is transmitted for access, which is also compared by the access control system with the permission list before access is authorized.
The card is secure.
The system is secure. Lost cards and incorrect IDs are controlled as before.
Road to implementation
The low prevalence of biometric access control systems was due to the closed architecture of door reader systems and the high cost of their installation on an enterprise scale.
With the transfer of biometric recognition directly to the access card, the process of identity verification becomes a separate and individualized operation.
Once the user has been identified, the card functions as a regular access card, transmitting a code and receiving authorized access.
Now it is possible to deploy biometric systems selectively, using and expanding the infrastructure of any access control systems that exist everywhere today.
Low-cost biometric identification will pave the way for its own rapid implementation and distribution.
The ability to place a biometric reader directly on the access card gives greater freedom of choice: where and how to use this technology. The commercial benefit of hands-free, biometrically verified access is directly related to the accounting of working hours and the security of the facility. Working hours are often associated with the “period of recovery of operability”, and automatic identification systems increase this time by more than 10%. Biometric identification simply makes the process of access control more secure.
The time lag of a biometric system is often due to the time it takes to compare the received data with the person's parameters stored in a corporate database file. With a biometric sample on a card, a 1:1 match with the template data will occur when the person approaches the door, reducing verification time and speeding up the process of identification and access authorization.
With faster and more secure access, it is much easier to deploy an internal security system.
You can use regular cheap access control readers, install them everywhere at the entrances to internal premises where there is a risk of loss. Building an internal security system with biometrics on the card increases the level of security and does not impair the high throughput of the entry point.
The ability to implement decentralized wireless biometric identification on an access card means that existing trivial access control systems can use a biometric component everywhere.
Now biometrics can become cheaper and be used everywhere.
Bandwidth is improved, therefore productivity is increased.
Security is improved, therefore losses are reduced.
Overall, the cost of implementation is reduced, while flexibility and possibilities for future use are increased.
The pinnacle of access control systems is achieved with automatic biometric recognition.
Safety on the move
Security vehicles with infrared cameras for rapid deployment on the ground help protect government officials during visits to remote, unsafe meeting and event locations.
Absolute security in today's environment requires more expertise than ever before.
As governments grow, so do investments in security systems. This, in turn, gives security services the opportunity and resources to acquire more sophisticated technology and equipment to do their job.
In Africa, the Middle East and South East Asia there is a particular need for specialist vehicles to enhance the capabilities of the relevant services to control and provide security in remote areas and meeting places.
A project to create such a vehicle has recently been initiated by several UK companies who have joined forces in this direction: Meridian Distribution U.K., a professional service dealing with the development and implementation of bespoke security products for overseas governments;
Vedesco, specializing in the creation of special vehicles;
Norbain SD, one of Europe's largest distributors of equipment for video surveillance, access control and security alarm systems.
The result of this cooperation was a command and control vehicle created for the presidential security services.
Its design fully takes into account all technical requirements that must be met to ensure the safety of top officials during off-site meetings.
Along with other equipment, the vehicle is equipped with modern cameras in an aluminum case with infrared illumination MIC400IR manufactured by Bosch Security Systems, which were specified in the technical conditions of Vedesco and purchased from Norbain SD.
Providing mobile security and rapid response
The command and control vehicle chosen is a 26-ton Mercedes truck measuring 6 m long and 4 m high, which serves as a platform for security personnel to effectively monitor the progress of a meeting or event.
This allows the person being protected to safely visit more locations than would otherwise be recommended.
By equipping the vehicle with video surveillance, security personnel now have more tactical views of the surrounding area.
The vehicle's capabilities are impressive: a conference room with an LCD projector, satellite communications for data, fax and voice communications, a radio transmitter and receiver that enable encrypted communications, a kitchen, a shower, an operator's room and other systems on request.
The most complete kit includes a cell phone jammer, bomb detector, and metal detector that can be used as a mobile frame for installation outside the truck.
The command and control vehicle contains 12 wireless cameras that can be installed up to a kilometer from the truck.
These include two MIC400 aluminum full-function Bosch PTZ cameras with windshield wipers.
With IP68 protection, the cameras are well protected from weather and extreme temperatures, and are also highly vandal-resistant. All equipment is protected from overheating.
The MIC400 aluminum cameras are ideal for rapid deployment applications due to their compact size, rugged construction, and flexible installation options that allow the camera to be mounted vertically, upside down, or at a 45-degree angle.
Full 360-degree rotation with no horizontal limitation and 320-degree vertical rotation provides complete coverage around the vehicle.
In addition, the camera’s virtually silent operation means there is no resonant noise from the mount it is mounted on, which is a problem with many PTZ cameras.
A Combination of Performance and Reliability
All cameras are controlled via a matrix switcher designed to accommodate four operators in the control room.
The radar equipment is used to transmit images wirelessly and is easy to set up – the operator just needs to switch it on and point it in the desired direction.
“Every component in this system has been carefully selected for performance and reliability,” says Steve Woodhead, technical director at Vedesco, the company that managed the vehicle project and coordinated the installation of the wireless and portable powered CCTV cameras. “The cameras can be started very quickly and can operate for up to 48 hours without maintenance.”