Presentation is loading. Please wait.

Presentation is loading. Please wait.

Integrated Security Solution Ingersoll Rand. Insert Footer 2.

Similar presentations


Presentation on theme: "Integrated Security Solution Ingersoll Rand. Insert Footer 2."— Presentation transcript:

1 Integrated Security Solution Ingersoll Rand

2 Insert Footer 2

3 3 The Presentation 1.Introduction 2.Challenges 3.The Solution – Total Integration 4.Biometric 5.Access Control / T&A 6.Perimeter and Gates 7.Architectural Hardware 8.Digital Video Surveillance 9.Conclusion

4 4 Who is Ingersoll Rand? Corporate Worldwide Facts : Fortune 500 Company 135 year Old, Completed 100 years on New York Stock Exchange Over 100 manufacturing facilities Exports products to more than 150 countries Over US $10 billion in annual sales 50,000 employees worldwide Industrial Technologies Security Technologies Compact Vehicle Technologies Climate Control Technologies Construction Technologies

5 5 Access T&A Productivity Security Technologies Climate Control Technologies Locks & Trim Fire Doors & Door Controls Industrial Technologies Construction Technologies Compact Vehicle Technologies Digital Video Surveillance Perimeter Protection System

6 6 LEVEL 1 Mechanical Access/ Egress including Fire Doors Basic Door hardware and master key System LEVEL 2 Electronics Standalone electronic access Controlled openings LEVEL 3 Access Control and Surveillance Network Access control including Biometrics, Perimeter and CCTV LEVEL 4 Total Security Integration Global Networked Security Solution with time and attendance & personnel scheduling Security Technologies

7 7 WAN Hinges Closer Push Bar/ Lock Mechanical Access Control Central Control Room Global/Multi Facility Integrated Solution Site 1 Site 2 Site 3Site 4 LAN/ WAN LAN/ WAN LAN/ WAN LAN/ WAN Site 1 Site 2 Site 3 Site 4 H.Q Network Security LAN/ RS485 Control Room

8 8 Security Technologies Fire Door Panic Device Surveillance System Biometrics Access Control Time & Attendance, Productivity Perimeter Protection System

9 9 …Biometric Devices Since 1986 Biometric devices are electronic means of measuring unique characteristics or actions of a person, and are used to identify, or verify the identity of, an individual. Recognition Systems, Inc., a division of Ingersoll-Rand, is the worldwide leader in Biometric access control, time and attendance, and personal identification products. The company, founded in 1986, pioneered the commercialization of biometrics using its patented technologies. Recognition Systems brings the true security and convenience of biometric technology easily within reach of most access control applications.

10 10 Biometrics What are Biometrics? Automatic methods to verify the identity of an individual using a physical characteristic or behavioral trait How Biometrics Fit into Security  Things you have Keys, cards, badges  Things you know PINs, Passwords  Things you are Biometrics The only ‘positive identifier’ 123 4

11 11 Benefits of Biometrics Access is about people, not tokens –A card based system grants access to pieces of plastic, not people –Whom ever knows the password gains access Only a biometric can insure it’s the right PERSON gaining access Cards and PINs can be shared, lost, or stolen Cost Savings –Membership applications Convenience High deterrent value –Minimizes losses from theft and tampering

12 12 How to compare Biometrics FAR: False Accept Rate Letting the bad guys in All Biometrics make mistakes, some more than others FRR: False Reject Rate NOT letting the good guys in This rate is for “normal” access control the most important At least 99% of all people are good, 1% is bad Hassle Factor: How many problems I have When people cannot be verified When people cannot be enrolled If bad guys are let in The combined effect of the above

13 13 Why False Reject is Key? A False Reject can occur with EVERY use of the system A False Accept can ONLY occur when an unauthorized person makes an attempt There are a lot more good guys! The False Reject rate will determine if it stays on the wall

14 14 An Example A company has 100 employees. Each person uses the door 4 times per day 400 transactions per day or 2000 transactions per week

15 15 A 1.0% False Reject Rate of would predict 20 problems per week 2000 transactions X 1.0% = 20 1.0%= A 0.1% False Reject Rate would yield 2 problems in the same week! 2000 transactions X 0.1% = 2 0.1%= Remember, there are only 100 employees! An Example

16 16 Types of Biometrics Handkey Reader Fingerprint Reader Face Recognition Iris Recognition

17 17 Relative Performance CharacteristicFacialFingerprintIrisHand 3.3-70%0.2-36%1.9-6%0-5% False Accept Rate 0.3-5%0-8%< 1%0-2.1% User acceptancePotential for privacy misuse Association with law enforcement, hygiene User resistance, usage difficulty Hygiene Enrollment timeAbout 3 minAbout 3 min 30 sec About 2 minutes 15 seconds About 1 minute Transaction time10 seconds9-19 seconds12 seconds6-10 seconds Template size84-1,300 bytes250-1,000 bytes512 bytes9 bytes VulnerabilityShow pictureArtificial fingers or reactivated latent prints High resolution picture of iris None False Reject Rate Source: United States General Accounting Office Technology Assessment

18 18 Relative Performance CharacteristicFacialFingerprintIrisHand 3.3-70%0.2-36%1.9-6%0-5% False Accept Rate 0.3-5%0-8%< 1%0-2.1% User acceptancePotential for privacy misuse Association with law enforcement, hygiene User resistance, usage difficulty Hygiene Enrollment timeAbout 3 minAbout 3 min 30 sec About 2 minutes 15 seconds About 1 minute Transaction time10 seconds9-19 seconds12 seconds6-10 seconds Template size84-1,300 bytes250-1,000 bytes512 bytes9 bytes VulnerabilityShow pictureArtificial fingers or reactivated latent prints High resolution picture of iris None False Reject Rate Source: United States General Accounting Office Technology Assessment comfort < 70% < 36% < 6% < 5% security < 5% < 8% < 1% < 2.%

19 19 BIOMETRIC HAND KEY READER Features Provides the ultimate in system reliability. Door operation and monitoring. Stand alone or networked operation. Card emulation mode. Multiple auxiliary inputs and outputs. Definable time zones. How it works ID is made by the size and shape of your hand 3-D image is acquired 31,000 points analyzed Over 90 unique measurements taken Lengths Widths Thickness Surface area 9 byte template is generated

20 20 Using a HandReader Present MIFARE®/ iClass Smartcard Place hand on plate Gently touch finger pins LED’s indicate when hand is in proper position 9 byte template is generated HandReader compares template to current hand placement User is verified in less than 1 second User is given a customized message (optional)

21 21 Benefits Reliability  1,500,000 units installed  Available from RSI for over three decades  Installed, operating and serviced in over 80 countries Security without hassle  High security for large populations  Comfort and acceptance, very easy to enroll and use  Template is small, easy to store and cannot be turned around User acceptance  15 people per minute can move through an entrance  People use their hands to open doors, it is a natural verification!  Custom limits can be set for specific users

22 22 FEAR FACTOR FINGERPRINTFACTORSHANDKEY Of top part of fingerTEMPLATEComplete palm USAGE Top part of finger used as a signature, hence can be misused by miscreants USAGECannot use the finger template since the image would then be blurred SEASONS & ENVIRONMENT Sweaty / moist / dry- scaly fingers cannot be identified by the reader Summer/ Rains/ winterNo such problem encountered Oily/ soiled fingers cannot be identified by the reader FoodNo such problem encountered Bruised/ bandaged fingers not identifiable WOUNDSPalm can be identified despite a cut / bandaged finger. If details of employee who is sacked or left organization not deleted- employee can still enter. Fingerprint stored at once stays same. SACKED EMPLOYEE (Every hand and finger undergoes gradual changes) Hand key revises/ updates template each time the employee shows his hand. If sacked employee returns after a long time, his hand will not be identified 1 out 50 fingerprints are not readable; hence difficult to enroll ENROLLMENTNo such problem encountered

23 23 Access Control Software Features Security Standards –Meets industrial data center security standards –Secure individual administration rights over part or all of the system –Run secure individual reports by login Tools –Video imaging/Integrated Badging –Global anti-passback Options –Visitor tracking software – optional web interface available –Digital video retrieval for event/video recall –Customized user reports via Crystal Reports Writer –Software can run as a single client or multi-client

24 24 Reader #4 Reader #8 Geoffrey File Server Workstation 1 of 50+ ID Badging Station/ Workstation 48 of 50+ Workstation 49 of 50+ Biometric Reader #6 Smart Card Reader#4 Biometric Reader #1 Elevator Reader Main Entrance Badging Station Service Control Room Attendance recording Maintenance Gymnasium System Configuration Biometric Reader #6 Biometric Reader #1 Smart Card Reader #6 Luggage Stores Biometric Reader #1

25 25 WAN ID Badging Station/ Workstation 48 of 50+ Workstation Redundant File Server Workstation File Server Workstation Site 1Site 2 Other Site

26 26 Total Integrated Security Solution CCTV Control Centre CCTV Gate Security

27 27


Download ppt "Integrated Security Solution Ingersoll Rand. Insert Footer 2."

Similar presentations


Ads by Google