Integrated Security Solution Ingersoll Rand. Insert Footer 2.

Slides:



Advertisements
Similar presentations
California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
Advertisements

NexSentry Imaging Solutions
RFID Access Control System March, 2003 Softrónica.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Department of Labor HSPD-12
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
BioLynx, Inc.™ Biometrics and Enrollment. Overview Biometrics Hand Geometry and templates Enrollment Command Mode.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
By: Monika Achury and Shuchita Singh
Gateplus Time Attendance and Access Control System.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
LP 400. General Issues faced by Business Organizations:  Attendance Proxy through “buddy punching”  Errors when computing time  Cost of paper time.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Digital Surveillance. Danish Software Company specialized in development of security solutions. Started in year 2000 with HQ in Copenhagen. All solutions.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Marjie Rodrigues
Security-Authentication
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Authentication Approaches over Internet Jia Li
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Truly Powerful. Flexibility, Scalability, Reliability User Friendly Software  Predefined parameters  Scaled down for easy admin  Personalised reporting.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
1 Reference sites Amgen Puerto Rico Telephone Phillip Morris Hewlett Packard Kremlin Expo ’98, Portugal.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
CorporateInformationSecurity Corporate Information Security User Identification & Logical Access Control.
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
1 Reference sites Amgen Phillip Morris Hewlett Packard Kremlin Expo ’98, Portugal.
BioLynx™... Ensuring Employees are paid for actual time worked and Facilities’ access is audited and controlled.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Biometrics Authentication Technology
PRESENTATION ON BIOMETRICS
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Physical security By Ola Abd el-latif Abbass Hassan.
©Spectra Technovision (India) Pvt. Ltd.
Inception Technologies has been in the Labor Management business for over 15 years, becoming a leader and innovator in the industry. With over 10,000 end.
Controlsoft have 25 years experience in the development, manufacture and distribution of Access Control Solutions. With over 10,000 systems in daily use.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
An Introduction to Biometrics
ATTENDANCE MANAGEMENT SYSTEM. PRODUCT DESCRIPTION Attendance Management System: is a user-friendly, flexible and full featured employee attendance management.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
enterprise Software Solutions Lab Pvt Ltd
Amgen Phillip Morris Hewlett Packard Kremlin Expo ’98, Portugal
Nexbase Invites You To Our Special Products
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
COSEC ARC IP based Access Control Panel.
SUBMITTED BY ATHIRA BALAKRISHNAN
FACE RECOGNITION TECHNOLOGY
Wavestore Integrates…
Seminar Presentation on Biometrics
Managing the IT Function
X7– Fingerprint Access Control terminal
Ones Technology Products & Solutions
Presentation transcript:

Integrated Security Solution Ingersoll Rand

Insert Footer 2

3 The Presentation 1.Introduction 2.Challenges 3.The Solution – Total Integration 4.Biometric 5.Access Control / T&A 6.Perimeter and Gates 7.Architectural Hardware 8.Digital Video Surveillance 9.Conclusion

4 Who is Ingersoll Rand? Corporate Worldwide Facts : Fortune 500 Company 135 year Old, Completed 100 years on New York Stock Exchange Over 100 manufacturing facilities Exports products to more than 150 countries Over US $10 billion in annual sales 50,000 employees worldwide Industrial Technologies Security Technologies Compact Vehicle Technologies Climate Control Technologies Construction Technologies

5 Access T&A Productivity Security Technologies Climate Control Technologies Locks & Trim Fire Doors & Door Controls Industrial Technologies Construction Technologies Compact Vehicle Technologies Digital Video Surveillance Perimeter Protection System

6 LEVEL 1 Mechanical Access/ Egress including Fire Doors Basic Door hardware and master key System LEVEL 2 Electronics Standalone electronic access Controlled openings LEVEL 3 Access Control and Surveillance Network Access control including Biometrics, Perimeter and CCTV LEVEL 4 Total Security Integration Global Networked Security Solution with time and attendance & personnel scheduling Security Technologies

7 WAN Hinges Closer Push Bar/ Lock Mechanical Access Control Central Control Room Global/Multi Facility Integrated Solution Site 1 Site 2 Site 3Site 4 LAN/ WAN LAN/ WAN LAN/ WAN LAN/ WAN Site 1 Site 2 Site 3 Site 4 H.Q Network Security LAN/ RS485 Control Room

8 Security Technologies Fire Door Panic Device Surveillance System Biometrics Access Control Time & Attendance, Productivity Perimeter Protection System

9 …Biometric Devices Since 1986 Biometric devices are electronic means of measuring unique characteristics or actions of a person, and are used to identify, or verify the identity of, an individual. Recognition Systems, Inc., a division of Ingersoll-Rand, is the worldwide leader in Biometric access control, time and attendance, and personal identification products. The company, founded in 1986, pioneered the commercialization of biometrics using its patented technologies. Recognition Systems brings the true security and convenience of biometric technology easily within reach of most access control applications.

10 Biometrics What are Biometrics? Automatic methods to verify the identity of an individual using a physical characteristic or behavioral trait How Biometrics Fit into Security  Things you have Keys, cards, badges  Things you know PINs, Passwords  Things you are Biometrics The only ‘positive identifier’ 123 4

11 Benefits of Biometrics Access is about people, not tokens –A card based system grants access to pieces of plastic, not people –Whom ever knows the password gains access Only a biometric can insure it’s the right PERSON gaining access Cards and PINs can be shared, lost, or stolen Cost Savings –Membership applications Convenience High deterrent value –Minimizes losses from theft and tampering

12 How to compare Biometrics FAR: False Accept Rate Letting the bad guys in All Biometrics make mistakes, some more than others FRR: False Reject Rate NOT letting the good guys in This rate is for “normal” access control the most important At least 99% of all people are good, 1% is bad Hassle Factor: How many problems I have When people cannot be verified When people cannot be enrolled If bad guys are let in The combined effect of the above

13 Why False Reject is Key? A False Reject can occur with EVERY use of the system A False Accept can ONLY occur when an unauthorized person makes an attempt There are a lot more good guys! The False Reject rate will determine if it stays on the wall

14 An Example A company has 100 employees. Each person uses the door 4 times per day 400 transactions per day or 2000 transactions per week

15 A 1.0% False Reject Rate of would predict 20 problems per week 2000 transactions X 1.0% = %= A 0.1% False Reject Rate would yield 2 problems in the same week! 2000 transactions X 0.1% = 2 0.1%= Remember, there are only 100 employees! An Example

16 Types of Biometrics Handkey Reader Fingerprint Reader Face Recognition Iris Recognition

17 Relative Performance CharacteristicFacialFingerprintIrisHand %0.2-36%1.9-6%0-5% False Accept Rate 0.3-5%0-8%< 1%0-2.1% User acceptancePotential for privacy misuse Association with law enforcement, hygiene User resistance, usage difficulty Hygiene Enrollment timeAbout 3 minAbout 3 min 30 sec About 2 minutes 15 seconds About 1 minute Transaction time10 seconds9-19 seconds12 seconds6-10 seconds Template size84-1,300 bytes250-1,000 bytes512 bytes9 bytes VulnerabilityShow pictureArtificial fingers or reactivated latent prints High resolution picture of iris None False Reject Rate Source: United States General Accounting Office Technology Assessment

18 Relative Performance CharacteristicFacialFingerprintIrisHand %0.2-36%1.9-6%0-5% False Accept Rate 0.3-5%0-8%< 1%0-2.1% User acceptancePotential for privacy misuse Association with law enforcement, hygiene User resistance, usage difficulty Hygiene Enrollment timeAbout 3 minAbout 3 min 30 sec About 2 minutes 15 seconds About 1 minute Transaction time10 seconds9-19 seconds12 seconds6-10 seconds Template size84-1,300 bytes250-1,000 bytes512 bytes9 bytes VulnerabilityShow pictureArtificial fingers or reactivated latent prints High resolution picture of iris None False Reject Rate Source: United States General Accounting Office Technology Assessment comfort < 70% < 36% < 6% < 5% security < 5% < 8% < 1% < 2.%

19 BIOMETRIC HAND KEY READER Features Provides the ultimate in system reliability. Door operation and monitoring. Stand alone or networked operation. Card emulation mode. Multiple auxiliary inputs and outputs. Definable time zones. How it works ID is made by the size and shape of your hand 3-D image is acquired 31,000 points analyzed Over 90 unique measurements taken Lengths Widths Thickness Surface area 9 byte template is generated

20 Using a HandReader Present MIFARE®/ iClass Smartcard Place hand on plate Gently touch finger pins LED’s indicate when hand is in proper position 9 byte template is generated HandReader compares template to current hand placement User is verified in less than 1 second User is given a customized message (optional)

21 Benefits Reliability  1,500,000 units installed  Available from RSI for over three decades  Installed, operating and serviced in over 80 countries Security without hassle  High security for large populations  Comfort and acceptance, very easy to enroll and use  Template is small, easy to store and cannot be turned around User acceptance  15 people per minute can move through an entrance  People use their hands to open doors, it is a natural verification!  Custom limits can be set for specific users

22 FEAR FACTOR FINGERPRINTFACTORSHANDKEY Of top part of fingerTEMPLATEComplete palm USAGE Top part of finger used as a signature, hence can be misused by miscreants USAGECannot use the finger template since the image would then be blurred SEASONS & ENVIRONMENT Sweaty / moist / dry- scaly fingers cannot be identified by the reader Summer/ Rains/ winterNo such problem encountered Oily/ soiled fingers cannot be identified by the reader FoodNo such problem encountered Bruised/ bandaged fingers not identifiable WOUNDSPalm can be identified despite a cut / bandaged finger. If details of employee who is sacked or left organization not deleted- employee can still enter. Fingerprint stored at once stays same. SACKED EMPLOYEE (Every hand and finger undergoes gradual changes) Hand key revises/ updates template each time the employee shows his hand. If sacked employee returns after a long time, his hand will not be identified 1 out 50 fingerprints are not readable; hence difficult to enroll ENROLLMENTNo such problem encountered

23 Access Control Software Features Security Standards –Meets industrial data center security standards –Secure individual administration rights over part or all of the system –Run secure individual reports by login Tools –Video imaging/Integrated Badging –Global anti-passback Options –Visitor tracking software – optional web interface available –Digital video retrieval for event/video recall –Customized user reports via Crystal Reports Writer –Software can run as a single client or multi-client

24 Reader #4 Reader #8 Geoffrey File Server Workstation 1 of 50+ ID Badging Station/ Workstation 48 of 50+ Workstation 49 of 50+ Biometric Reader #6 Smart Card Reader#4 Biometric Reader #1 Elevator Reader Main Entrance Badging Station Service Control Room Attendance recording Maintenance Gymnasium System Configuration Biometric Reader #6 Biometric Reader #1 Smart Card Reader #6 Luggage Stores Biometric Reader #1

25 WAN ID Badging Station/ Workstation 48 of 50+ Workstation Redundant File Server Workstation File Server Workstation Site 1Site 2 Other Site

26 Total Integrated Security Solution CCTV Control Centre CCTV Gate Security

27