fbpx
25.9 C
Sydney
Wednesday, November 27, 2024

Buy now

  • HIKVISION NVR
  • HIK Vision
  • HID SIGNO
Home Blog Page 933

Networked Access From Ir

0

The new software manages offline programmable locks, such as Schlage Computer-Managed (CM) locksets, to online systems including Schlage Value Integration Platform (VIP) and Wyreless open architecture locks. Controllers accommodate up to 16 readers, including PIN-enabled locks, magnetic stripe and proximity card readers, iButton readers, and biometric HandReaders and FingerKey readers. An easy-to-use GUI provides “drag and drop” assignment. “With the new IR Schlage security management system, end users have never had more flexibility to apply a tailored solution for each and every opening, whether online or offline, all managed by the same access control software, ” emphasizes Marilyn Collins, marketing manager for IR Security & Safety ECS. “It provides users with a single point of contact for all security needs and offers a seamless expansion path.” The new security management system meets banking data center security standards. It views, acknowledges and secures all alarms, defines an unlimited number of alarm conditions, sends alarms to pre-defined workstations in order of priority, emails appropriate recipients and receives videos of alarms. The IR Schlage software supports both online and offline credentials and lets users design and edit badge layout. Visitor management can be fully integrated so that operators can assign access control privileges to authorized guests. It can even order the printing of appropriate guest badges. Using the new software in conjunction with video systems, users are provided convenient searchable criteria, easy distribution of video clips, and immediate retrieval of transaction or alarms and associated video clips. Users are able to generate, email and print pre-defined or customized reports on alarm or archive history, credential holders, database, guest passes and transaction history in any standard format. For security tour management, the system is extremely flexible, allowing an unlimited number of checkpoints with any card swipe or active contact to be a checkpoint. The new software also offers advanced offline and online capabilities as well. “It’s a terrific advantage to be able to connect both offline and online access systems under one platform,” explains Collins. “Lower security openings in an existing structure are best equipped with offline, battery-powered locksets as an appropriate access control solution while high security, perimeter, or heavy traffic openings are best equipped with online, hard-wired or wireless access control solutions. Biometric technology expands both online and offline security options dramatically. “And now, with the IR Schlage security management system, customers can get creative with solutions, mixing and matching such access control options without needing help from their systems administrators to train, manage or keep up to date with a series of access control management systems.” The new security management system capitalizes on the latest technology available from Schlage, including VIP and wireless solutions. Both online solutions offer end users substantially lower installation costs than other online options and provide optimal retrofit conditions. The VIP open architecture platform seamlessly connects the specially designed door lock to a panel interface board (PIB) that connects to the security management system panel. Users access the VIP lock with either magnetic stripe or HID proximity cards. Wireless systems use less hardware and install five to ten times faster. With Schlage wireless systems, it becomes extremely easy to retrofit electronic access control solutions in facilities and applications that have previously held back due to budget constraints or installation limitations. Importantly, the wireless system easily integrates into all existing access control systems and customers can continue to use their existing keys or ID credentials. In addition to managing the variety of offline and online products available from IR Security & Safety, the IR Schlage security management system also manages a variety of credentials ranging from hand geometry and finger scans, HID proximity card, magnetic stripe card, iButton, plus all the former with PIN number or PIN number only. “It is not uncommon for an application to call for different types of access credentials across a facility,” affirms Collins. “On a college campus, a student may use their hand geometry for access to the perimeter security points of their residence halls while using their ID card with magnetic stripe for access to their individual rooms. Meanwhile, the facilities management staff may prefer the use of an iButton credential because of its durability and ease of use.” The new IR Schlage security management system is available now through IR-certified access control dealers.

Dallmeier Close To Pixim Camera Release

0

Dallmeier and Pixim formed a partnership towards the end of 2004 with the goal of delivering high-performance security cameras for use in networked video environments. The first product from the partnership, Dallmeier’s DI-CAM camera based on Pixim’s D2000 Video Imaging System, provided high quality images suitable for use in advanced surveillance applications. “After looking at a number of alternatives for our new security cameras, we determined that Pixim had the best solution, with a roadmap that matches our view on the future of networked video surveillance,” said Dieter Dallmeier, CEO of Dallmeier Electronic, late 2004. “Using Pixim’s chipset we have been able to get our first camera to market with great image quality in an incredibly short period of time. We see Pixim’s DPS technology as providing us with a camera platform for the long term.” DI-CAM is now in manufacturing and is being demonstrated at the Global Gaming Expo (G2E) in Las Vegas this week. It is part of an integrated solution that includes a set of cameras, a DVR, and a comprehensive video management system that allows the images to be recorded and remotely controlled and accessed over an IP network. The Pixim D2000 Video Imaging System is a highly integrated chipset utilizing Pixim’s innovative Digital Pixel System® technology that provides an image sensor, image processor, and the intelligent software to develop advanced feature, high quality color security cameras.

Engineered Terrorism Solutions

0

Protecting closed public spaces such as airport terminals and shopping malls from chemical or biological terror agents requires a new paradigm that relies on a systems approach, argues Georgia Tech professor Art Janata. Since the 2001 anthrax attacks, research has focused on developing improved sensors to detect potential chemical or biological terror agents. But these devices themselves cannot head off terrorist attacks, and while they should be part of an overall protection strategy, reliance on such technology can create a false sense of security, warns a Georgia Institute of Technology researcher. Protection for closed public spaces such as airport terminals and shopping malls therefore needs a new paradigm: a “systems engineering” approach, argues Jiri (Art) Janata, a Georgia Tech professor of chemistry who specializes in sensing and analytical instrumentation. That systems approach would include central command centers, response strategies tailored to the facility, protection of water and air circulation systems – and neutralizing and sterilizing chambers built into air-circulation systems to limit the spread of terror agents. Janata, who is also a Georgia Research Alliance Eminent Scholar, discussed these issues in a presentation: “New Strategies for Analytical Chemistry and Biochemistry in Homeland Defense” February 19th at the annual meeting of the American Association for the Advancement of Science in Washington, D.C. Part of a symposium “Stopping the Bio Bad Guys: Biological Forensics and Detection,” his presentation summarized the results of a 2002 National Science Foundation-sponsored symposium on the challenges of chemical and biological sensing in homeland security. “Correctly applied technology can improve security, but incorrectly applied technology – such as reliance on sensors that may or may not detect the actual agent being used – could create a false sense of security,” Janata said. “We need to think about everything in terms of a systems engineering approach. Very little has been done to integrate comprehensive systems.” Using sensors to protect public buildings faces two major challenges: there are too many potential chemical and biological agents to reliably detect, and even with the fastest sensors, some people will become victims before the sensor can respond and an alert can be sounded. Sensor development has so far focused mostly on a “short list” of toxic agents originally developed for military battlefield use. But Janata warned there are hundreds of other non-military gases that could be just as deadly in civilian spaces – and for which no sensors are available or no sensors have been deployed. “The problem with the whole sensing strategy is the presumption that you would know what is going to be used as a toxic agent,” he said. “Unless you were in correspondence with the terrorists, you would not know that, so the selectivity of the sensors – defined in terms of ‘toxicity’ rather than a specific toxic compound – becomes an issue that makes the whole chemical sensing effort largely useless.” Should a toxic gas be released in a public building, the time required for the agent to reach a chemical sensor would be about the same as the time required for the agent to reach potential victims. “You must accept that there will be casualties in the event of an attack like this,” Janata added. Based on that realization, agencies such as the Defense Advanced Research Projects Agency (DARPA) have been promoting the concept of “immune buildings” that actively protect their occupants. This protection would come both from making buildings less attractive targets and from automated systems that would remove toxic agents from the indoor air. “Almost every public building in the United States has a heating and air conditioning system that circulates the air,” Janata noted. “Not only does that refresh the air, but it also provides a vehicle for introducing both chemical and biological agents. The concept would be to insert into that HVAC system a sterilization chamber that would disable the biological agents and decompose the chemical agents.” A chamber exposing the air to ultraviolet light could inactivate most biological agents. And because of their reactive nature, most chemical agents could be neutralized with a small number of chemical processes built into filtering systems. “Some such technologies already exist,” Janata said. “With some additional development, they could be implemented in public spaces.” He compares this protective approach to the treatment systems cities have used for decades to ensure clean drinking water. It’s also similar to the approach taken in hospitals, which sterilize instruments because surgical infections are easier to prevent than to treat. Once a threat has been detected – either by sensors or by observing the distress of building occupants – the next step will be to choose the most appropriate response, such as evacuating a building or closing an airport. Deciding how to respond to a chemical or biological attack may take considerably more time than would be required to detect the attack itself. To improve that decision-making process, large public facilities should have central command centers with extensive monitoring capabilities including sensors, video cameras and other technologies. “These events should be monitored from a central control room which would develop the proper level of response,” Janata explained. “You need to avoid overreactions because they actually cause more economic damage than the actual attack. That gives to the terrorists what they want.” Effectively assessing the potential danger of a toxin requires not only knowledge of its physiological toxicity, but also its physical characteristics. For instance, in some situations a toxic gas that doesn’t disperse well could be less potent than a much less toxic agent that easily disperses. Thus, some of the most-feared chemical agents may pose a lower risk than chemicals familiar to industrial chemists, Janata noted. Facility operators also need to look beyond chemical and biological agents to consider other forms of attack, including use of explosives, commando-style assaults or efforts to disrupt computer networks, Janata added.

New Processor Offers Secure Home Automation

0

The MB9140x series from Fujitsu features the MB91403, which supports IPv6 and includes encryption circuitry supporting the Advanced Data Encryption Standard (AES), Data Encryption Standard (DES), 3DES, and other established cryptographic systems. The encryption circuits in the MB91403 are 150 to 200 times faster than software-based encryption, and are complemented by authentication circuitry. The series also supports the MD5 and SHAR1 authentication standards, key exchange methods DH 1/DH 2, and the Internet Key Exchange (IKE) protocol with hardware engine. The series also includes the MB91401, a 32-bit network system MCU that supports IPv6, and the MB91402, which is available for customers whose designs do not require security features. All the new MCUs can operate as standalone systems or as companion chips for existing designs. Each of the new system-on-chip MCUs is designed to simplify development of IPv6-capable products for ubiquitous-computing environments. On-board, high- capacity ROM and RAM reduce the need to add external memory, enabling lower overall system costs with fast, up-to-date, security-support features for embedded applications. Each device incorporates all the basic functions needed to serve as a controller for an appliance, including a 32-bit RISC CPU, an FR core, timer, interrupt controller and UART. “This impressive 32-bit MCU family delivers the processing power, performance and security features required for Internet age appliances, and for important emerging applications that must include the best available encryption capability,” said Akio Nezu, senior marketing manager for the Embedded Products group at Fujitsu Microelectronics America. “As we move into the era of ubiquitous computing, users will be able to connect portable and handheld devices to the Internet with full confidence in reliability, privacy and security, because of the performance of this new generation of microcontroller technology.” High-capacity Embedded RAM and ROM The MB9140x family incorporates 8 KB of high-speed data RAM, 4 KB instruction cache, along with 256 KB ROM and 64 KB RAM, which reduce the need for external memory chips, resulting in lower costs and more compact circuit boards. If more RAM is needed, SDRAMs can be added externally in applications where the device can serve as a buffer for a high-data-traffic application, or to cache data that is transmitted over the network. MB91403’s Support for IPv6 and Security The MB91403 supports IPv6 over Ethernet running at either 10 Mbps or 100 Mbps, enabling Internet-capable appliances to connect to the network using individual IP addresses. The chip’s hardware-based layer-filtering functionality will admit only the appropriate packets, so the communication process runs effectively via an appliance’s CPU. The MB91403 also supports IPv4. The full range of security technology incorporated in the MB91403 ensures that Internet-enabled appliances are fully secured. The encryption circuitry is complemented by authentication circuitry. Customers can easily develop their own applications with industry-standard authentication support. Pricing and Availability The MB91401, MB91402 and MB91403 are manufactured using Fujitsu’s 0.18- micron CMOS process, and packaged in 144-pin LQFPs. Pricing for the MB91401 begins at $15.78, for the MB91402 at $9.92, and for the MB91403 at $12.86 each in 1,000-unit quantities.

Axis Launches New DayNight Ip Camera

0

-With the ability to provide high quality images under all lighting conditions, the AXIS 221 is an ideal solution for indoor and outdoor applications, including the surveillance of buildings, roads, parking areas, garages, railway stations and airports. The camera is supported by the industry’s largest base of application software for video and alarm management. The AXIS 221 features an automatic, removable infrared-cut filter, which enables the camera to provide color video when there is sufficient light, and black and white video in dark conditions. It uses a high performance Pentax lens and a progressive scan CCD image sensor so that moving objects can be presented without distortion. In addition to support for full frame rate at all resolutions, the AXIS 221 offers simultaneous Motion JPEG and advanced MPEG-4 video streams to optimize image quality and bandwidth efficiency. The AXIS 221 also supports a number of advanced features that give the camera increased flexibility and intelligence, including: * Power over Ethernet, which enables power to be delivered through the network cable. This means the camera doesn’t require separate cabling for power and is, therefore, easier to install. * Video motion detection, which can activate the camera to start sending and recording images once it detects any motion that occurs within its field of view or specifically within an area defined by a user. * Pre- and post-alarm buffer. This enables the camera to internally save images from before and after an alarm event occurs (approximately five minutes of video images in total). * Privacy masking. This allows areas of a recorded image to be blacked out for privacy reasons. * Inputs/outputs for connecting external devices such as door sensors and relays to activate light or close doors. The AXIS 221 is available through Axis’ APAC distribution channels as of end April 2005.

New Cyber Security Protocol

0

The same protocol could be employed in many computer networks in which two computers, hand-held communication devices or network nodes need to simultaneously verify the identity of each other. The protocol – called “delayed password disclosure” – was created by Markus Jakobsson and Steve Myers of Indiana University. It may have application in any environment where “mutual identity authentication” is required, the researchers say. This new security protocol could help to prevent consumers from getting tricked into connecting to a fake wireless hub at an airport, for example. Or the protocol could notify you that the link included in a legitimate-looking e-mail points to a fake website set up to steal your sensitive information, such as passwords and PINs to bank accounts, credit cards numbers and account numbers for online fund-transfer services. The safety measures also might help stop organized crime and terrorist-funding groups from collecting large numbers of fund-transfer account numbers that could be used for money laundering, the researchers say. In one possible application, the security protocol could be used to verify that two wireless devices trying to connect to each other don’t mistakenly connect to another device. This is useful to safeguard communications between mobile units, such as between members of emergency crews who are connected through wireless networks built “on the fly.” These so-called “ad hoc” networks hold great potential for military and emergency response applications where network infrastructures have been destroyed or are nonexistent. The flexibility of ad hoc networks, however, opens the door to attack. The new protocol is meant to strengthen such networks, using a type of electronic “interrogation” to ensure they are not compromised. The protocol also holds promise as on-line banking becomes more prevalent. In one scenario, criminals could “sift” or launder money through a large number of accounts once the system is compromised by an attacker. Each account would maintain the correct balance for the unsuspecting victim, even as the attacker funneled funds through it. If large numbers of accounts are used, and the payment patterns are intricate, then such misbehavior is difficult to trace to the attacker – who might be working for the payer, the final recipient of the funds, or both. For network attackers to launder money through online fund-transfer accounts of unsuspecting individuals, the criminals must stop email notifications from the fund-transfer company to the account holder. “Denial of service attacks” and other kinds of network attacks could be employed to stop such notification emails, the researchers say. But spotting such maneuvers is not easy. “It’s difficult to say exactly what tactics network attackers are using right now because many people do not know they are being attacked. Nonetheless, criminals who have no greater passion than money laundering are already intensely thinking about these kinds of projects,” Jakobsson explained. The use of delayed password disclosure or a comparable protocol could help to prevent such crimes. If the protocol were used by an online bank, a technical version of the following dialogue would occur between the bank and the online customer to authenticate the identity of both parties without divulging passwords. CUSTOMER: Hello bank. I know my banking password. If you really are my bank, then you already know my password. I don’t trust you and you don’t trust me. I’m not going to tell you my password. We’re going to use this authentication protocol called “delayed password disclosure.” It allows us to both be sure the other one is not lying about our identity, but without giving out any sensitive information in the process. BANK: Proceed. CUSTOMER: Bank, I will send you some information that is encrypted. You can only decrypt it if you know my password. If you don’t know the password, you could of course try all possible passwords (although that is a lot of work!), but you would never know from my message if you picked the right one. Once you have decrypted the message, I want you to send it to me. If it is correctly decrypted, I will know that you know my password already. Once I know that you know my password, I will send it to you so that you can verify that I also know it. Of course, if I am lying about my identity and don’t know the password in the first place, then I will not learn anything about the password from your message, so it is safe in both directions.

Dm Moves Forward With Netvu Inside

0

THE powerful NetVu client/server software has already proven its worth embedded in a diverse portfolio of AD Group systems on the ground, on the move and in the air, whether FireVu to detect smoke in a prestige office development; TransVu to monitor school buses or FlightVu to keep cabin doors secure on international passenger aircraft. Mark Romer, National Sales and Marketing Manager at Dedicated Micros Australia explains: “We have been a strong advocate of network connectivity from the very beginning; in fact every digital recorder brought to market by DM has had an Ethernet port. However we now believe that the latest DV-IP products, based on the NetVu Inside client/server software architecture can take IP connectivity to another level, offering a truly scaleable solution that encompasses integrated video capture, recording, transmission and viewing.” DM does not just see ‘NetVu Inside’ as a benefit for new customers, there are plans in place to release a software upgrade suitable for the vast majority of existing customers who want to take advantage of a more distributed solution. Adds Mark: “In future our vision is: ‘Any camera, from any moment in time, on any screen, anywhere in the world’, facilitated by ‘NetVu Inside’ technology. This has tremendous benefits for example at airports where systems on groundside vehicles, in planes and in terminals could provide a complete picture of the security environment.” For further information please contact Mark Romer at Dedicated Micros on tel +612 9634 4211 or visit the website at www.dedicatedmicros.com. See DM at Security Australia 2005, stand no: 25

Brinks Buys Into Uk And Belgium

0

The Brink’s Company has announced the completion on March 4, 2005 of the previously disclosed purchase of certain security services operations from affiliates of Group 4 Securicor by subsidiaries of Brink’s, Incorporated. The purchase includes two entities, Securicor Luxembourg S.A. and Group 4 Falck Cash Services UK Limited, for an aggregate price of approximately $39 million.

Upgrade For Pacific Comms Dvr

0

The newly enhanced 16 channel DVR provides pentaplex operation for simultaneous recording, multi-screen viewing, playback, remote monitoring and archiving. In addition, the PDR16-RMT Series offers a recording speed of up to 200 images per second (depending on model). This full-featured digital video recorder stores high-resolution video on internal hard drives for safekeeping, and has a built in CD-RW for backup storage. Updates over previous model include the fact all units now have looping inputs, a 250 Gig HDD, will accommodate another 2 HDD’s and come with the inclusion of an IDE extension card. They can also add another 4 HDD’s (Total of 7 within the case). There are a total of 6 USB ports (2 x Front, 4 x Rear), there’s a new GUI and the new case dimensions are 440mmW x 180mmH x 507mmD. Distributor: Pacific Communications Contact: 61 3 9676 0222

Indala Allies With Philips

0

“The combination of 2 RFID technology leaders like Philips and Indala is impressive to say the least,’ says Indala president Marc Freundlich. “Philips’ worldwide leading contactless MIFARE platform has a strong track record in Europe and Asia. “In the U.S> market MIFARE DESFire is the first secure contactless smart card chip solution to meet the Government Smart Card Interoperability Standard – there’s no doubt that Indala customers worldwide will benefit from this alliance and can be assured of a broad range of high quality product solutions from Indala in the near future.” According to Manuel Albers, Amercia’s director business development for the identification business at Philips Semiconductors, “Indala has performed as a solid leader in the industry for many years and continues to grow through advanced technology “We are pleased about Indala’s decision to use Philips’ MIFARE standard and MIFARE DESFire products for open, secure and contactless solutions,” he said.