You are at : Search > Articles Search Results

Articles Search Results

279 Articles and 254 related Products found for RFID

Assa Abloy/Hid Global Awarded Gesture-Based Access Patents for Smart Cards and Phones

Assa Abloy/Hid Global Awarded Gesture-Based Access Patents for Smart Cards and Phones

Editor / Provider: Assa Abloy/Hid Global | Updated: 7/10/2013 | Article type: Security 50

HID Global announced that the U.S. Patent and Trademark Office granted several patents for the company's innovation related to gesture-based methods of using three-dimensional (3-D) motion sequences to increase privacy, security and convenience when using RFID-based devices such as smart cards and NFC-enabled smartphones for a broad range of applications. These patent additions strengthen HID Global's IP portfolio of over 1,000 pending and issued patents and protect the company's intellectual capital.

HID Global's latest inventions allow a user to define a series of hand motion sequences or gestures to be used to control operation of an RFID-based device, introducing the notion of a new authentication factor. For example, when incorporated into a RFID smart card, a user can present the card to a reader, rotate the card 90 degrees to the right and then back to the original position to enable the card to be read. This greatly minimizes the possibility of a rogue device surreptitiously stealing the user's RFID credential in a “bump and clone” attack.

The invention opens up a new field of gesture-based authentication and is particularly pertinent when incorporated into an NFC-enabled mobile phone. Apart from the benefits of convenience and speed, the user can define gesture-based passwords to easily add an additional factor of authentication (e.g., something you know in addition to something you have) to the phone-based transaction. These user-defined, gesture-based passwords can also work in a two-dimensional mode similar to a combination lock, or they can also include 3-D motions such as moving to the left, right, forward and backward.

HID Global's invention can also be utilized to unlock Apps as well as to lock and unlock a door, similar to the way a mechanical key is used to lock and unlock a door. Additionally, it can allow the user to secretly signal that he is using his card or phone to gain access but is under duress.

New patents granted to HID Global for this invention are US 8,427,320 and US 8,232,879, and the company has received notification that the European Patent Office has indicated their intention to grant a patent.

Scottish swimming center upgrades access control infrastructure for international games

Scottish swimming center upgrades access control infrastructure for international games

Editor / Provider: Salto Systems | Updated: 7/5/2013 | Article type: Government & Public Services

Scotland's newest international sporting facility, the Tollcross International Swimming Center in Glasgow, has installed Salto RFID electronic locks to provide a state-of-the-art access control solution as part of its overall security package.

The center has just re-opened its doors to the public after a US$20.7 million (£13.8million) refurbishment to make it ready to host the Glasgow 2014 Commonwealth Games. The 2015 IPC World Swimming Championships have also been awarded to the venue and it is also at the heart of the city's bid to host the 2018 Youth Olympic Games.

As well as the pool improvements, Tollcross will also be a community facility. The fitness suite has been doubled in size to become one of the biggest and best equipped gyms in the city with 85 cardiovascular and strength conditioning stations, and a range of equipment is available for people with disabilities, including three hand cycles and six fixed resistance machines.

To handle security into and within the facility, Tollcross International Swimming Center has deployed a contactless RFID access control solution from Salto Systems and fitted it to a variety of internal room and storeroom doors.

David Brown from Scotdor, Salto's local partner that won the contract and carried out the installation, comments “We fitted a range of standalone battery powered RFID products from Salto'sproduct including 79 handle sets in a smart and practical stainless steel finish, 2 double sided locker units, 3 online doors and 3 electronic cylinder controlled doors.

For the online doors, we were required to install a separate network from the main system to comply with the client's requirements and the Data Protection Act not to transfer data for these doors across from the main network. This was no problem, and we were able to install and set up the controlling software for these doors completely to the client's satisfaction.”

Brown continues “The centre has been very impressed with the technical ability of the products, in particular the ability to control access via the Mifare smart ID cards. Since most access related information is kept encrypted on these cards, the locks are able to update and receive information from the cards at any time. So not only is the system easy to use, but its functionality has practically all the benefits of a fully on line access control system at the cost of a standalone system.

The ‘smart' access cards build up 'on-card' audit trails through normal use giving the centre complete control over access and enabling the movement of staff to be controlled and tracked if and as required. This enables a complete access profile of each individual to be established and updated as necessary as well as having the ability to see who accessed what door, where and when.

Cards can be programmed to allow access to specific rooms or areas within the centre for selected periods only, with the doors auto locking at pre-specified times as required. And if card security is breached due to the loss or theft of a card, it can be instantly deleted without the need or cost of rekeying or changing locks – saving the centre time and money.”

 

Assa Abloy/VingCard Elsafe introduces interactive RFID locking solution

Assa Abloy/VingCard Elsafe introduces interactive RFID locking solution

Editor / Provider: Assa Abloy/VingCard | Updated: 7/1/2013 | Article type: Security 50

VingCard Elsafe, the global supplier in hospitality security and part of the ASSA ABLOY Group, announces the introduction of “Allure by VingCard,” a highly innovative RFID locking solution with a unique, interactive design and more features than ever before available in an electronic locking system.

VingCard Elsafe initiated a growing trend toward minimizing lock hardware on the guestroom door with the introduction of its Essence by VingCard locking system last year. Created with the hotel designer in mind, Allure by VingCard is a flexible, design-centric hardware and software solution that takes the minimalistic “invisible lock” concept one step further.

With Allure by VingCard, all external hardware on the door has now been completely eliminated through the use of a futuristic signage panel that adds a host of additional benefits and functionality to the locking system. These include a higher degree of flexibility in design, as well as the ability to add guest-facing in-room features such as “Do Not Disturb (DND) and “Make Up Room” (MUR) notifications to hotel staff. This is accomplished through an interactive touch panel located inside the room, An LED light on the door lock alerts staff of the request, so that guests are not disturbed unnecessarily.

An attractive exterior panel, easily installed on the wall next to the door in both reconstruction and new construction hotels, can be used to showcase the hotel's logo to allow for personalization. It also includes a touch doorbell, displays the room number, and notifies the guest when the door has been unlocked. The flexible design allows it to be used either as a component of a VingCard RFID locking system or as a pure DND/MUR panel-only configuration, which can be installed in properties that already have a locking system in place.

 

Assa Abloy/HID expands RFID tag family for quick mount to irregular surfaces

Assa Abloy/HID expands RFID tag family for quick mount to irregular surfaces

Editor / Provider: HID Global | Updated: 6/28/2013 | Article type: Security 50

HID Global announced it has expanded its SlimFlex Tag family of broadband UHF RFID transponders with the addition of the new SlimFlex Standard 200 and Standard 301. Designed for flexibility and durability, SlimFlex Tag transponders are among the most versatile UHF RFID tags available, enabling greater adaptability for a range of RFID tag placement options.

The SlimFlex Standard 200 and Standard 301 tags are designed for quick, secure mounting using standard cable ties and can attach snugly to round or irregular surfaces, such as cylindrical containers, plastic pipes, bags, helmets or trees. An important feature is avoiding the use for screw holes on tagged objects, such as pipes, that could otherwise leak fluids and become inoperable. Like all SlimFlex tags, the new solutions are waterproof, food compatible and designed to perform in the harshest conditions. Additionally, the Standard 200 and Standard 301 tags are a high-visibility yellow for excellent color contrast when laser-engraved with a barcode, text or logo.

“Due to the flexible and durable housing the SlimFlex tag family offers, customers can now quickly and conveniently mount UHF transponders to irregular surfaces improving the reliability and performance of existing systems,” said Richard Aufreiter, Director of Product Management, Identification Technologies at HID Global. “By applying these tags with a simple cable tie, customers gain better traceability of items where traditional inflexible transponders could not be used.”

“The new tags have read ranges up to 26.3 ft (8 m) when mounted flush to plastic or wooden surfaces. Due to its vertical mount option, the Standard 200 tag delivers comparable read range performance even on wet or metal surfaces. Built with a unique thermoplastic elastomer (TPE) housing, the tags tolerate bending and exposure to harsh chemicals and temperatures. The SlimFlex family of tags provide high resistance to aggressive liquids and UV rays, and deliver reliable performance and reading stability in heat up to 158° F (70° C) and sub-freezing temperatures to -40° F (-40° C).

Assa Abloy/HID Global awarded as contractor for 2013 US Green Card program

Assa Abloy/HID Global awarded as contractor for 2013 US Green Card program

Editor / Provider: Assa Abloy | Updated: 6/26/2013 | Article type: Security 50

The U.S. Citizenship and Immigration Services (USCIS), an agency of the U.S. Department of Homeland Security, has selected HID Global as the prime contractor for the USCIS Permanent Resident Card – commonly known as the “Green Card.”

Chosen for its capabilities in delivering end-to-end secure ID solutions,HID Global will be responsible for the secure production, delivery and storage of up to two million Green Cards in 2013. The Green Card incorporates state-of-the-art technology to prevent counterfeiting and obstruct tampering, while facilitating quick and accurate authentication of the card. The Green Card is also the world's first secure ID credential combining HID Global's LaserCard optical security media with RFID tags for accelerated border crossing.

HID Global will continue to manufacture the Green Card in conjunction with its expanded responsibilities as the program's prime contractor. LaserCard Corporation, which was acquired in 2011 by HID Global, played a strategic role in redesigning the card for maximum security and rapid border crossing in 2010. The Green Card is one of the most secure national ID cards in the world with a digital security that has never been compromised.

“HID Global's new role as prime contractor for the secure production and delivery of the card is a natural evolution of our relationship with the U.S. Department of Homeland Security,” said Denis Hébert, president of HID Global.

“With our dedicated team of security experts managing every key aspect of the program and our continuing role as manufacturer of the Green Card, HID Global will deliver significant added value by reducing overall program risks while achieving greater efficiencies for USCIS.”

Argentinean highway toll booths operator identifies vehicles with smarts

Argentinean highway toll booths operator identifies vehicles with smarts

Editor / Provider: Axis Communications | Updated: 6/18/2013 | Article type: Infrastructure

Four Aumar-operated toll plazas along the 647 kilometer corridor of highways in the province of Buenos Aires in Argentina recently deployed eight Axis Communications network cameras with Neurallabs ALPR to help identify about 16,000 vehicles that are exempt from tolls or qualify for special rates. The system was designed by system integrator Telectronica.

In July 2011, a new concession was created for highway linking Routes 2, 11, 63, 56, and 74. Within this corridor there are four tollbooths: Samborombón, La Huella, Gral Madariaga, and Mar Chiquita. The Concession Agreement stipulates that users residing within a 10 kilometer radius of a toll plaza are exempt from tolls, and there is a different rate for those who live in certain parts of the coast.

At first, different technologies such as ID cards or RFID tags were considered to meet this need. However, these options involve high investment costs that are difficult to recuperate. It was therefore decided to test ALPR technology with different types and brands of cameras. After several tests, Neurallabs ALPR was completed with Axis network cameras, with image control and shutter control software. Initially eight sets were installed: four at the La Huella toll plaza, two at the Madariaga plaza, and two at the Mar Chiquita plaza.

With the implementation of ALPR technology and Axis IP cameras, Aumar succeeded in automating vehicle identification for most residents within the zone in question, and the system achieved an extremely high recognition rate. Furthermore, the solution allowed the concessionaire to improve both its auditing processes and security.

“At first we were a little skeptical regarding recognition rates and processing speed after everything was integrated into the toll collection system; we even thought that cars might have to stop for the system to recognize and authorize them,” said Claudio Reynaga, System Administrator, Aumar. “But the numbers show us that the recognition rates are excellent, and users can go through the plazas without stopping, just as if there was a free-flow type system in place.”

Following these excellent results, AUMAR evaluated the use of the same technology for other applications. “ALPR technology is very interesting to us and allows us to think of many applications: for example, to measure average vehicle speed between toll stations, or using it as a backup in electronic toll lanes when the device tag is not recognized but the license plate is,” said Reynaga.

Identive introduces NFC tags for retail shelf labeling

Identive introduces NFC tags for retail shelf labeling

Editor / Provider: Identive Group | Updated: 6/13/2013 | Article type: Security 50

Identive Group, a provider of solutions and services for the identification, security and RFID industries, announced that Store Electronic Systems (SES), the supplier in Electronic Shelf Labeling (ESL) systems for food and non-food retail, has selected Identive's NFC tags to power innovative electronic shelf labels that allow consumers to access a wealth of information about product pricing, composition, origin and manufacturing, through a smartphone. Three million Identive NFC tags have been ordered for this ground-breaking retail application, which is the world's largest of its kind.

“For the launch of our patent-pending NFC electronic shelf labels, we were looking for a partner that could provide us with a proven and reliable NFC solution that would in turn ensure a quick and hassle-free experience for our retailer clients around the world. We turned to Identive because of their reputation as one of the most experienced and responsive suppliers in the transponder industry and as a leader in NFC in particular,” said Philippe Bottine, CTO of Store Electronic Systems. “Identive's focus on performance, interoperability, reliability and quick-turn production has enabled us to offer NFC capabilities across the full range of our electronic shelf label offerings. This capability is yet another differentiator for SES as we work to help large retailers improve their sales and operational performance.”

Identive's NFC tags are embedded in SES's electronic shelf labels and give easy access to a cutting-edge retail experience for consumers. Using any NFC-enabled smartphone, it takes only a few seconds for consumers to download the retailer's NFC mobile app when they first enter the store. They can then tap their phones to store shelf labels to view product information and receive coupons and loyalty benefits that can be redeemed from their phones at checkout. The NFC tags can also trigger a health alert on the phone's screen for products that contain ingredients such as dairy or nuts. Retailers can also use the NFC-tag to store information used for product and shelf management.

“We are very pleased to work with SES on the launch of their NFC shelf labels, which are a simple yet dramatic innovation in retail shopping,” said David Holmes, VP of  Mobility & NFC Solutions at Identive Group. “NFC is becoming a standard feature on new smartphones and soon will be virtually everywhere. With this new global concept for large retailers, SES is leveraging the convenience of NFC in a practical application that has wide appeal. SES's innovative use of NFC technology helps consumers make better decisions, brings brands and consumers closer together and enables retailers to lower their operational costs.”

Security innovations to be driven by compliance

Security innovations to be driven by compliance

Editor / Provider: Memoori Business Intelligence | Updated: 6/7/2013 | Article type: Hot Topics

Memoori Business Intelligence recently interviewed Adlan Hussain, Global Head of Marketing at CNL Software, to discuss innovations in security in the next five years.

1. Where will the major innovations in security come from in the next 5 years? Let us start by stating the speed of innovation in this internet era makes it difficult to predict innovation for five years forward. There are trends such as processors and storage for computers that will get substantially smarter and cost less, but when we talk about innovation, we are thinking about game changing technologies that will disrupt the industry. We think two things will drive key changes in security: technology and compliance;

Compliance: Large-scale solutions are becoming ever larger and with a mix of private and public applications and devices, there is an even stronger need for truly intelligent front-end software solutions managing authentication as well as compliance to pre-determined memorandums of understanding. Armed with logical capabilities to use public systems in the event of an emergency, we are seeing safe city projects embracing the idea of connecting security systems from all the schools in their district for example, but this is dependent on the ability to manage and enforce compliance through strong software technology.

Evidence trail, audit trails, hardened data retrieval and export, authentication, potentially through logical gateways will all be the norm within the next few years as system owners recognize that software solutions can quickly, consistently and cost effectively process the huge amounts of data generated from their security systems. With the real estates growing to hundreds of thousands of devices and operators, technology is fundamental to managing and ensuring the compliance to all laws and procedures.

Technology: The two main technologies that will drive innovation are highly linked. Firstly, hardware will continue to evolve radically with more and more networked devices delivering ever-increasing capability. Secondly, the advancement of integration and management software needed to manage all these intelligent devices on the network.

A good example would be surveillance cameras. The growing capacity to store footage locally means that soon terabytes of storage at the edge will be an affordable option. With advances in analytics, the camera will have its own recording “rules” managed by a main suite of programs deciding: what recordings stay at the edge, what goes to a central library and what is deleted. This will not be a man managed video real estate, but a computer program that uses risk and probability analytics to determine what stays and what goes.

While this sounds a radical step, it is not at all and quite a few former NVR suppliers are already moving their systems from centralized recording to recording at the edge or on a managed set of SCSI disk libraries that take recording directly from the camera. This increases performance, reduces the bottleneck created at centralized servers and decreases the overall cost of a solution, while simultaneously reducing bandwidth requirement. Now that cameras are moving towards extreme high image densities, intelligent management of locally held video data will emerge as one of the newest and most important innovations that will eradicate the current DVR and NVR mentality.

Looking at access control and winding forward to when all the ironmongery needed for access control for example is network attached, powered by network connection and will probably include a mass of new devices managed by the access control system. We see that it is no longer a card presented to a door but can be a phone, tablet, RFID, biometric, VPN; in fact, the whole real estate of authentication ought to move to a self-managed model, reducing costs and need for security guards or personnel staff.

While it is difficult to look beyond the next twelve months to see what is going to happen in hardware. VMS and ACS systems as we know them are already being surpassed by smarter technologies, solving bigger problems on a wider scale. It is easy to forecast that existing suites of VMS or ACS applications will either get smarter or die a death as standalone applications.

Just like in the IT world, siloed applications died when users realized they could manage their businesses much better with integrated suites that improved company efficiencies and reduced costs. In a world where the demand to do more for less is increasing, the only fact we can be sure of is that this is a perfect environment for technology. Reducing cost has to be based on reduction of overheads, but without increasing the risk.

What we can say is it is unlikely to be the traditional installer equipment manufacturer who creates these innovations. The innovators will be those forward thinking manufacturers who are prepared to defy the past and provide new, smarter and cheaper hardware, which will require new software solutions to harness their intelligence.

2. Is the security industries' resistance to change creating opportunities for Startup businesses? For other industries, a reluctance to invest in innovation may only affect operational efficiency offered to clients, but in the security space, it means those intent on causing harm are able to catch up; and this is not good for any of us.

As we have seen in the last decade, the majority of this disruptive innovation will continue to come from smaller, agile and entrepreneurial companies. This is especially true in the electronic security industry, where the larger companies are often very cautious to adopt anything new.

Typically, these large organizations prefer to acquire technology rather than to risk the development process. This is good news for bright minds, as it leaves the door open for them to create game changing innovations that can help to secure each and every one of us. As we have seen ourselves, once a technology is proven and is seen to be commercially viable, there are plenty of companies who like to follow genuine innovators.

If you want to prove this, the next time you attend a tradeshow, walk down the back of the hall and look at the small shell scheme stands, I can assure you that you will find far more innovation there than you will on the manufacturer islands at the front of the hall. We are also seeing large companies offering these small start-ups money to invest into their innovation; the value to them is an early opportunity to look for the next new thing with less risk.

3. As platforms for sensing and analyzing data, video cameras, security sensors, biometrics etc has enormous potential. How will they fit into the ‘Internet of Things'? Firstly, as with the internet the security industry is finding that the real value lies not in the hardware or the device you are using, but in the software that is pulling everything together. Analytics or biometrics on their own will provide part of the picture, but pull them together with other systems, apply some intelligence and suddenly you have a stronger, tighter defense and improved security system.

Secondly, the move to the cloud will see a lot of change within the electronic security industry and will provide opportunities for new ideas and companies to grow, who offer a better service for less. How these two tends will meet will be interesting and PSIM will play a role here. Limited bandwidth, edge storage, coupled with rich data will mean an intelligent engine will be needed to ensure only the most relevant data is pushed to a reducing number of security operators.

Identive launches online training program

Identive launches online training program

Editor / Provider: Identive Group | Updated: 6/7/2013 | Article type: Security 50

Identive Group, a provider of solutions and services for the identification, security and RFID industries, announced that the award winning training programs for its Hirsch access control and security systems are now available online. Targeted online courses are available to introduce Identive products and solutions to new users, explore the feature and capabilities of new technology or enhance users' skills and knowledge. This new online offering allows dealers, channel partners and users to complete courses at convenient times and at their own pace as an alternative to attending live classes at Identive's training facilities in California and Germany.

Identive's online access control courses encompass the full breadth of topics included in the Company's classroom-based training program, including:
- Velocity Security Management Software System Administration;
- System Architecture;
- Optimizing System Design;
- Controller Capabilities and Installation;
- Wiring and Wire Requirements;
- Locking Systems and Lock Power Calculation;
- Readers and Biometrics; and
- Surveillance Video and Other Integrations.

“Our new online learning program gives customers and channel partners significant flexibility to obtain the knowledge they need to be successful with their security projects,” said Scott Chillemi, Technical Training and Publications Manager of Identive. “Educating technicians and front-line users is key to successful system implementations and produces long-term benefits. Training is critical to allow our partners to design bid and install their systems faster and more smoothly, limit expensive callbacks and corrective changes, and deliver more satisfactory performance. Our online courses eliminate barriers to obtaining training such as travel costs and time restrictions to ensure that our end-users can achieve optimal results with their systems.”

Identive's online training courses are available to customers and dealers globally and meet the continuing accreditation requirements of the Hirsch certification program.

Abu Dhabi seaport and industrial zone set sail to advanced access management

Abu Dhabi seaport and industrial zone set sail to advanced access management

Editor / Provider: CEM Systems | Updated: 5/31/2013 | Article type: Infrastructure

The Khalifia Port and Industrial Zone (KPIZ) in Abu Dhabi recently deployed CEM Systems, a Tyco Security Products company, access control and gate management system to secure its perimeters. The access control system consists of 700 card readers and fingerprint readers, portable card readers, and more than 300 PoE door interface units (DIU), were installed by Tyco Fire & Security in United Arab Emirates.

Khalifa Port was officially opened in December 2012. The port is crucial to the Abu Dhabi Ports Company megaproject which includes Khalifa Industrial Zone Abu Dhabi. Featuring the latest technology and designed to accommodate the world's largest ships. Upon completion of all construction phases, the port will be at an estimated size equivalent to two-thirds of Singapore.

“This was an exciting yet challenging project for CEM who delivered not one but two systems for the port; the access control system and a highly customized gate management system, providing high level integration to multiple port security systems to ensure the monitoring and control of vehicles coming onsite,” said Philip Verner, Regional Sales Director, EMEA, CEM.

The gate management solution integrates with a number of third party systems all interfaced to ensure multiple checks are made before a vehicle can enter site. The driver first swipes their card then passive or active long range RFID tags are used on trucks and light vehicles and then finally ALPR recognition is utilized and the gate opens. “Khalifa Port required a highly secure and flexible access control system, which could be used for more than just access control” said Craig Menzies, Security Division Manager, UAE, Tyco Fire & Security.

The multi-technology IP card readers installed at the port are IP 66 rated to protect against dust and water. The reader features a keypad for additional PIN code security, and features an internal database for offline card validation. The database holds up to 200,000 card holder records internally and up to 8,000 records offline. This means that should communication be temporarily lost at the seaport, staff can still validate cards throughout the port at all times.

Fingerprint readers will also be installed on critical doors/areas throughout the port. For high security areas users will be prompted for three identity checks (card, PIN and biometric verification) using one device. Being such a large and expansive site, the port required mobile security. The portable reader is ideal for roaming security. The reader can be used at remote port sites or temporary entrances which have no power during the construction phases. 

PoE DIUs was chosen by the port authorities to ensure cabling was kept to a minimum. The DIU utilizes PoE technology to power readers and heavy duty maglocks on two doors. This created sizable cost savings on the project as it eliminated the need to fit mains power supplies/ fused spurs above each door. The security management system was also used to its maximum efficiency taking advantage of software applications such as alarm event display, visual image pass ID badging system and visitor management module

First Page< Prev< | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 >Next >Last Page
Sign Up for Free
Weekly e-Newsletters
  • Headline
  • Trending Tech
  • Hot News
  • Product Highlights
  • Success Stories

Featured Suppliers