Application of Tracking Technology to Access-control System
|
|
|
- Donna Golden
- 10 years ago
- Views:
Transcription
1 Hitachi Review Vol. 53 (2004), Application of Tracking Technology to Access-control System OVERVIEW: An access-control system that applies tracking technology to control the movement of people and goods inside buildings has been developed. This system whose key components are a newly developed, ultralow-power-consumption infrared transmitter/receiver and a weakradio-wave RFID (radio-frequency identification) tag that can handle infrared and RFID signals at the same time can precisely detect the passage direction of each tag carried by individual people or fixed to items moving in a line. Applying this system to access control has made handsfree room access possible. As regards conventional systems utilizing smart cards and biometrics, it is a concern that their security level and user convenience are conflicting issues. In contrast, placing no burden on the convenience of the user at all, the developed hands-free access-control system can provide efficient access control at higher precision. With the aim of promoting new physical-security technologies that have been unavailable till now, the current paper first overviews the main features of the system and then describes two examples of its implementation. INTRODUCTION IN the past few years, car-navigation systems have created a huge market in what seems like in no time at all. And regarding systems for outdoor tracking and location, in addition to such GPS (global positioning system)-based car navigation, systems utilizing mobile phones and PHS (personal handyphone system) are being practically applied. On the other hand, regarding location systems for indoors, although systems utilizing PHS and active RFID (radio-frequency identification) have demonstrated positive results, they have not reached the stage of widespread use because of problems with handset size and location precision. If high-precision indoor-use tracking utilizing compact tags were realized, various applications such as location systems like car navigation would be possible. In particular, if the conventionally difficult people tracking were realized, the range of possible applications in various kinds of businesses, such as security, distribution, and safety, would widen. In response to the above circumstances, Hitachi has developed a dynamic-state-monitoring system, whose key component is a newly developed RFID tag that utilizes infrared radiation and long-distance radiowave communication. Taking a global lead, we are offering this system as a new kind of tracking system (see Fig. 1). APPLICATIONS OF ACCESS-CONTROL SYSTEM Conventional access-control systems use a card reader to scan magnetic cards, smart cards, etc. in order to authenticate the card holder. On authorization of the ID (identification), the electric lock on the door is unlocked and the door can be opened. This procedure is essentially no different from the conventional use of a key. Against the backdrop of concerns regarding social unrest and protection of business information, access-control systems must satisfy an increasing diversification of needs. To realize a high reliability, smarter, and more efficient access-control system (which is not just a substitute for a key-based system), it is necessary that users of facilities are not conscious of using the system; in other words, authentication must be performed while a person is naturally entering a room. The main feature of the developed system is that it meets this requirement by providing hands-free access control (see Table 1).
2 Application of Tracking Technology to Access-control System 84 Server Monitoring station Set-up information Manual operation Scheduling operation Monitoring room Real-time data Archived data System characteristics Hands-free room access Individual authentication of several people entering a room at the same time Virtual-gate authentication Safe for the human body High-reliability system LAN Fig. 1 Configuration of Access-control System Applying Tracking Technology. This autonomous distributed system is configured so that each gate is controlled by a dedicated controller and the whole system is under the unified control of a PC server running UNIX*. The system not only provides gates that are physical barriers but also performs access control by means of virtual gates. TABLE 1. Comparison with Other Systems This table compares our system with other systems in terms of major features. te that location management and simultaneous reading are features unique to our system. Feature Location management Hands free Simultaneous reading Reading accuracy Responsiveness Our system High Fast IC card SYSTEM CHARACTERISTICS Hands-free Room Access To accomplish hands-free room access, a transmission and reception system utilizing infrared radiation and long-distance-communication RFID was developed. The basic principle of the system is shown schematically in Fig. 2. When a person wearing the developed RFID badge stands in front of the room he/ she wants to access, the system assesses whether or * Unix is a registered trademark of The Open Group in the United States and other countries. Low Fast Biometrics Depends on system Somewhat low Slow (3) Issuance of command to unlock electric lock Electric lock (1) Infrared beam (position ID) emission (2) Analysis of received infrared beam Transmission of badge-specific ID plus position ID Fig. 2 Principle of System. The basic operation principle of the verification of the badgespecific ID and the unlocking of the electric lock is shown. not that person has access authorization. In the case that authorization is given, the door is unlocked and the authorized person gains access. This procedure consists of the following three steps [indicated by the numbers (1) (3) in the figure]: (1) An infrared emitter at each checkpoint (spot) continuously emits an infrared beam forming a particular signal as a unique position ID for each spot. (2) When a person wearing a badge passes through a
3 Hitachi Review Vol. 53 (2004), spot, the badge picks up the infrared beam and extracts the position ID from it. The ID specific to that badge and the position ID are then combined, and the combined ID is transmitted as an RFID signal. (3) The controller receives the combined ID and separates the specific ID and the position ID. By doing so it can ascertain which particular badge has entered any particular spot. It then checks the specific ID against the security level for the door in the spot in question. If it confirms that the ID has access authorization, it issues a command to release the electric door lock. In this way, since authorized persons follow the above procedure without being aware of it, they can access authorized areas freely in a hands-free manner, and security checks can be carried out on them without inconveniencing them. Individual Authentication of Several People Entering Room at Same Time By providing hands-free room access according to the above-described principle, we have overcome what has been a key issue up till now, namely, individual authentication of several people entering a room at the same time. Fig. 3 shows an image of such an access situation. As regards a conventional system, access is controlled by means of smart cards, etc. However, in this case, it is possible that when the person in the front of a line of people is authenticated and the door is opened, the persons immediately behind them can enter without being authenticated. On the contrary, in the case of the newly developed system, each person in the line can be individually authenticated. Virtual-gate Authentication The new access-control system also makes it possible to carry out authentication without the need for physical gates. That is, an authentication system consisting of so-called virtual-gates can be set up as shown in the image in Fig. 4. In this system, areas are separated into zones by virtual gates that perform soft security checks (i.e. non-doorway checks) in order to provide a high level of access control. Even in door-less, spatial places like corridors, virtual gates can be set up in order to automatically authenticate anyone passing through. If an unauthorized person or someone not wearing a badge is detected, a warning announcement is given and the image of that person is recorded by a surveillance camera. Conventional system Unauthorized persons Video recording Card reader Attention: Access to this zone is forbidden to non-authorized personnel! Freeaccess zone Security zone Active tag plus infrared beam Individual recognition Fig. 3 Individual Authentication of Several People Entering Room at Same Time. As regards a conventional system, access is controlled by means of smart cards, etc. In this case, it is possible that when the person in the front of a line of people is authenticated and the door is opened, the persons immediately behind them can enter without being authenticated. By contrast, in the case of the newly developed system, each person in the line can be individually authenticated. Virtual gate Fig. 4 Virtual-gate Authentication. Even in door-less, spatial places like corridors, virtual gates can be set up in order to automatically authenticate anyone passing through. If an unauthorized person or someone not wearing a badge is detected, a warning announcement is given and the image of that person is recorded by a surveillance camera. Badge Security The badge used in the developed access-control system provides a high level of security by utilizing infrared radiation and an RFID device that produces a weak radio-wave signal. Though this weak radio-wave output power is 1/10000 of that of a standard mobilephone signal, or 1/100 of a PHS signal output, it can
4 Application of Tracking Technology to Access-control System 86 (1) (2) Records of access to data room B Person A Entered 10:00 Person B Entered 11:00 Person A Left 11:30 Data room C Record of movement of person A 10:00 11:30 11:33 Entered Left Entered Laboratory Laboratory (3) (4) (5) Data room A Dynamic-state monitoring Fig. 5 Example Screen Image of PC Monitoring Station. The screen visualizes a particular facility. The numbered areas in the example image contain access information corresponding to the following: (1) the whole facility; (2) a close-up of the area enclosed by a red line in (1); (3) the people in that room; (4) records of room accesses; and (5) records of warning announcements. still ensure a high level of security. By utilizing such a badge, the new system can be applied in hitherto difficult areas, like healthcare facilities, where use of such devices is restricted. High-reliability System Configuration Providing a system that ensures high reliability brings the two additional advantages listed below: (1) Even if the server or network is down, autonomous decentralized control ensures that access control is continued without hindrance. (2) With a platform consisting of an SH microcomputer without an HDD (hard disc drive) or cooling fan running a Linux* 1 operating system, the controller the core of the access control can provide long-term, stable operation. Wide Range of Standard Interfaces The developed controller is not just a basic device for controlling the infrared emitter and electric door locks; it can also be hooked up to standard multipurpose devices in order to control warning buzzers, voice guidance, and LCD (liquid crystal display) touch panels. By providing a standard application that functions as a monitoring station with a user-friendly GUI (graphical user interface), and that can be simply installed on a network-connected PC, dynamic-state monitoring and access control can be practically implemented. Fig. 5 shows an example GUI image for such monitoring and access-control Fig. 6 Records of Peoples Room Entry and Movements. Records for each room of each person s entry of and records for each person s movement (i.e. access or exit from each room) are accumulated. In this way, a visual image of each person s movements can be created. operations. The screen visualizes a particular facility. The numbered areas in the example image contain access information corresponding to the following: (1) the whole facility; (2) a close-up of the area enclosed by a red line in (1); (3) the people in that room; (4) records of room accesses and warning announcements. Easy Multilingualization by Means of Multilingual Library The system supports Unicode* 2, so access to a library of languages other than Japanese is simple. In the future, it is planned to support English and Chinese as standard from April SYSTEM EXAMPLE APPLICATIONS Installation of Security Centered on Dynamicstate Monitoring The developed access-control system has been installed at sensitive facilities like research centers to provide a high level of security regarding internal staff and visitors. The main features of the system are listed below: (1) Each area in the facility is defined hierarchically so that it is given a detailed security level. (2) Organizations and outside people are defined in * 1 Linux is a trademark of Linus Torvalds in the U.S. and other countries. * 2 Unicode is a trademark of Unicode, Inc.
5 Hitachi Review Vol. 53 (2004), Clicking on the previous record automatically shows on the map the point at which the warning announcement was given. Antenna for entry authorization Entry traffic lights Badge Passing authentication Surveillance camera Virtual-gate authentication Exit traffic lights LAN SW-HUB Guard room Stop line Antenna for exit authorization Fig. 7 Virtual Gate and Virtual Area. A person s passage through corridors and movement within rooms are automatically detected, authenticated and warning announcements can be given in real-time if necessary and recorded as archive data. Fig. 8 Schematic of Vehicle-access-control System. A vehicle equipped with an RFID badge is automatically authenticated at the barrier; if its authorization is confirmed, the barrier is raised or a green light is given. groups according to vertical or lateral organizational hierarchy, and an access level for each location is given to each defined group. (3) Record data on room access for each location and movement data for each individual or group are accumulated (see Fig. 6). (4) Virtual gates are set up in building passageways, and if an unauthorized person is detected, a warning announcement is given and an image of the intruder is shown in real-time. In addition, virtual gates set up in the offices accumulate records of the movements of authorized people. If an unauthorized person passes a virtual gate, a notification message is sent to the person in charge and an image of the person is recorded simultaneously (see Fig. 7). Proposed Vehicle-access-control System In this proposed application, the developed accesscontrol system is set up to connect barriers and traffic signals for controlling the movement of vehicles in places like industrial and public facilities or distribution and delivery warehouses. An RFID badge installed in each vehicle enables the authorization or nonauthorization of each vehicle to be confirmed at the entry and exit gates of these facilities as well as at area gates set up along internal roadways. The gate barriers are then opened or closed and traffic signals are controlled according to this authentication. This is an example of the access control system developed for people being applied to vehicles. Equipping vehicles with previously registered badges and checking their authorization automatically means that the drivers do not have to get out of their vehicles. This helps the entry and exit of vehicles to be controlled smoothly around the clock. Compared to the current ETC (electronic toll collection) system, which is referred to as non-stop, the proposed vehicle-access control system can be referred to as one-stop. As this name implies, the proposed system is not as convenient as the ETC system. On the other hand, the tag cost and the system-installation costs are low, so it can be installed at any general business premises at low cost. A schematic image of the proposed vehicleaccess-control system is shown in Fig. 8. CONCLUSIONS A newly developed access-control system combining infrared radiation and an RFID tag was focused on in this paper. Although only two typical applications of this system were briefly introduced, a wide variety of other applications in the areas of security control, product management, and personnel time management are also being provided. Moreover, by combining the developed system with a location system that uses only individual compact RFID tags, it will be possible to broaden the range of applications. In the future, we intend to provide high-reliability systems with higher accuracy for indoor tracking of people and goods. As regards overseas markets, we plan to launch such systems from 2005 onwards.
Electronic Parking System for Singapore
Electronic Parking System for Singapore TAKAYASU OBATA HIDEKAZU ONO YOSHIHIRO MIYAZAKI MASAKUNI ANDO An Electronic Road Pricing (ERP) system was introduced in 1998 in Singapore to reduce the traffic congestion
ParkingManagementSystems. Videobased Parking Management System INDOOR and OUTDOOR Description
ParkingManagementSystems Videobased Parking Management System INDOOR and OUTDOOR Description Mai 2011 Video-based Parking Management System INSIDE and OUTSIDE Control The video-based individual parking
A guide to access control for manufacturing sites
A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round
REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
AXS Biometric Security System
AXS Biometric Security System The SECU-AXS biometric security system components may be customized and used in numerous configurations to provide a full scale security and access control system to both
OnGuard Online User Guide
OnGuard Online User Guide T81165/Rev ER-7991-40 Jan 2005 Contents 1 Introduction Related documents 1 1 Navigation of the software 1 2 How to use this guide 1 4 2 Managing Access Holidays and Timezones
GMS GRAPHICAL MANAGEMENT SYSTEM
GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates
Time & Access System An RFID based technology
Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.
Smart Tag Concept & Application. International Patent Application Number: 61984076
Smart Tag Concept & Application International Patent Application Number: 61984076 What is a Smart Tag? A smart tag is an advanced Electronic Device that offers car owners, municipalities, service providers,
Enhance Security and Communication in Healthcare and Hospital Locations IP Indoor and Outdoor Video Intercoms and IP Paging Solutions
Enhance Security and Communication in Healthcare and Hospital Locations IP Indoor and Outdoor Video Intercoms and IP Paging Solutions 2N s HIP Video Intercom and IP Paging solutions enable increased Premise
Access CONTROL. MANAGEMENT Software
Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and
White paper. Axis Video Analytics. Enhancing video surveillance efficiency
White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network
White paper. Axis Video Analytics. Enhancing video surveillance efficiency
White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network
W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier
W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...
VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune
VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is
Intelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7
Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section
Tailored integration to suit you
UTC Fire & Security Integrated Systems Platforms Tailored integration to suit you We listened to you A majority of the Fortune 100 companies have chosen UTC Fire & Security for their integration needs.*
Trends in Finger Vein Authentication and Deployment in Europe
Hitachi Review Vol. 64 (2015), No. 5 275 Featured Articles Trends in Finger Vein Authentication and Deployment in Europe Yuji Nakamaru Makiko Oshina Shuichi Murakami Ben Edgington Ravi Ahluwalia OVERVIEW:
In the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in
We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in the market at competitive prices. - Profile - Digital
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
全 面 通 訊 方 案 發 放 無 限 可 能 A Total Communication Solution with Unlimited Possibility. 香 港 通 訊 有 限 公 司 Hong Kong Communications Co., Ltd.
全 面 通 訊 方 案 發 放 無 限 可 能 A Total Communication Solution with Unlimited Possibility 香 港 通 訊 有 限 公 司 Hong Kong Communications Co., Ltd. HKC Group Profile A major telecommunications equipment supplier in the
Large residential complex adopts RFID-based VEHICLE TRACKING SYSTEM
Large residential complex adopts RFID-based VEHICLE TRACKING SYSTEM Independent, non-stop system for security, parking and access control Accurate identification of authorized vehicles Automated entry
P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM. Interactive, real time security management
P2000 AND P2000LE SECURITY MANAGEMENT SYSTEM Interactive, real time security management P2000 Security Management System Fully scalable, intuitive and easy to use. The Johnson Controls P2000 security management
Parking. Management System: Our Strengths are: Advanced Technology Excellent Versatility Great Simplicity Wide Range Local Maintenance
Parking Management Systems For more than 20 years Somfy SACS has car park automation. We design and produce advanced systems for automatic management of all types of car parks offering end to end services.
A guide to access control for offices
A guide to access control for offices What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building.
Control and Surveillance Secure System on Entrance Gate Based on Wireless Control and Internet
Research Journal of Applied Sciences, Engineering and Technology 10(4): 443-453, 2015 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2015 Submitted: February 13, 2015 Accepted: March
A Study on Integrated Security Service Control Solution Development about CRETA Security
A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,
Major Risks and Recommended Solutions
Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major
Knowledge Base Article. Integrating ISONAS Access Control System with TagMaster LR-series RFID Readers
Knowledge Base Article Integrating ISONAS Access Control System with TagMaster LR-series RFID Readers Copyright 2009-2012, ISONAS Security Systems All rights reserved Table of Contents 1: INTRODUCTION...
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - [email protected]
Integrated Physical Security and Incident Management
IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting
Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution
Connect C CURE 9000 with dozens of applications for a holistic business-empowering, all inclusive solution Chances are, you re not just responsible for making sure people get in and out of your facilities.
Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:
Alarm Systems An intruder alarm system is designed to detect intruder presence at your premises. When detected, a siren will activate and communicate an alarm signal to one of our highly sophisticated
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION
ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION Reliable protection of facilities and intellectual property Intrusion prevention Workplace time and attendance Streamlining of staff needs
Personal Call Manager User Guide. BCM Business Communications Manager
Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008
Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System
Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.
Kaba EACM The SAP module for efficient access organisation
The SAP module for efficient access organisation THINK 360 Secure Holistic Simple THINK 360 Security can be this simple Lean and efficient organisation processes are more important today than ever. Yet
Integration of Supervisory Control and Data Acquisition Systems Connected to Wide Area Networks
Hitachi Review Vol. 53 (2004), No. 3 169 Integration of Supervisory Control and Data Acquisition Systems Connected to Wide Area Networks Mitsuya Kato Katsufumi Watahiki Tatsuyuki Suzuki OVERVIEW: Continued
Verizon Wireless Field Force Manager Device User Guide
Verizon Wireless Field Force Manager Device User Guide Verizon Wireless Field Force Manager Device User Guide Table of Contents General Information...4 System requirements...4 Privacy and mobility...4
The Challenger Version 8 User Guide
Issue III : October 1997 The Challenger Version 8 User Guide CONTENTS Introduction... 3 Glossary... 4 The Challenger Console.. Liquid Crystal Display... 6 Keypad... 7 Indicator Lights... 8 User Identification...PIN...
WLAN Positioning Technology White Paper
WLAN Positioning Technology White Paper Issue 1.0 Date 2014-04-24 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
Global Deployment of Finger Vein Authentication
Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication
Security Alarm Monitoring Protocol
Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or
RFID based Vehicle Tracking & Parking Lot Management System
RFID based Vehicle Tracking & Parking Lot Management System WHITE PAPER Ver 1. (Nov 213) The present day metropolitan areas have seen a burgeoning growth in human population as well as vehicles. With shrinking
ParkiNG systems Payment systems Payment terminals
ParkiNG systems Payment systems Payment terminals crosspark cross aptm cross aptl AUTOMATIC BARRIER PARKING SYSTEM AUTOMATIC PAYMENT TERMINAL PAYMENT STATION Parking system PARKING GUIDANCE SYSTEM PGS
RFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd.
RFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd. About Us NeoTechID is a provider of Business Automation Solutions based on AIDC technologies such as RFID, bar-code scanning,
IT-Based Safety and Security Solutions for Schools
IT-Based Safety and Security Solutions for Schools V Atsushi Horiguchi V Kazuhisa Shibafuji V Kenichi Ota (Manuscript received December 8, 2006) The number of violent crimes against children has increased
AORC Technical meeting 2014
http : //www.cigre.org C4-1106 AORC Technical meeting 2014 Operational Issues and Solutions for Photovoltaic Power Generation Facilities T. KISHI, K. INOUE, T. SEKI Nishimu Electronics Industries Co.,
1. Vehicle Security/Tracking Device
GPS Vehicle Tracking Devices 1. Vehicle Security/Tracking Device The size of a pack of cigarettes, the SuperGuardreports to you directly with alarm details and GPS location through SMS text messaging and
Best Practices in. Best IT Asset Management through Smart RFID-Enabled Software. Art Barton, Director of RFID Strategies, RFTrail
Best Practices in RFID-Enabled Asset Management Best IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail Chief Information Officers, finance managers,
Building Technologies
Building Technologies TELSCAN Web Server - Fast ethernet transmission of the highest quality images: Get your pictures anywhere. Compact, standalone system for easy rem Siemens is one of the largest and
Crow Limited Warranty. Print Version 017
Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose
PoE-Touch Fingerprint and RFID Access Control
-Touch Fingerprint and RFID Access Control Intelligent Security -Touch Fingerprint and RFID Access Control is a new generation access control device of Anviz. The adopts touch activation technologies in
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
Security Service de Services sécurité. Security Alarm Monitoring Protocol
Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings
GET THE ALARM.COM ADVANTAGE.
BETTER SECURITY REMOTE WEB CONTROL MOBILE APPS GET THE ALARM.COM ADVANTAGE. STAY SECURE. STAY CONNECTED. WIRELESS TECHNOLOGY VIDEO MONITORING INTERACTIVE SERVICES HOME AUTOMATION ENERGY MANAGEMENT Alarm.com
Doors in a Network Environment
in a Network Environment 1.0 Purpose of this Document Doors is designed for use in stand-alone computer applications; no network functionality has been built into the program. However, with the prevalence
WEBFIL LIMITED. Your Security Partner
WEBFIL LIMITED Your Security Partner ABOUT THE COMPANY WEBFIL is a state based company under the Andrew Yule Group. Andrew Yule & Co. Ltd. a Government of India Enterprise is multi product, multi unit
Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies
Complete solutions for commercial security Verex delivers leading intrusion, access and video products to protect today s companies Scalable, cost-effective security designed for today s businesses Designed
OPEN PARK. Automatic Number Plate Recognition that works worldwide including Egypt Number plates
Automatic Number Plate Recognition that works worldwide including Egypt Number plates Free subscription lane, ticket dispenser for nonmembers, ticket readers, e- payment with NFC OPEN PARK INTEGRATED PARKING
Automated Profile Vehicle Using GSM Modem, GPS and Media Processor DM642
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Automated Profile Vehicle Using GSM Modem, GPS and Media Processor DM642 Muhammad
SECURITY SYSTEM WITH AUTHENTICATION CODE AND ADAPTIVE PHOTO LOG
Technical Disclosure Commons Defensive Publications Series January 06, 2016 SECURITY SYSTEM WITH AUTHENTICATION CODE AND ADAPTIVE PHOTO LOG Alexander Faaborg Ariel Sachter-Zeltzer Follow this and additional
School Management Tracking Solutions Bus Fleet Management. www.geomama.com
School Management Tracking Solutions Bus Fleet Management GeoMama School Management System is developed for ensuring the highest standards of safety & ease for the school transportation sector. The proposed
Retail Solutions. Why Tyco Security Products for Retail?
Retail Solutions Why Tyco Security Products for Retail? We are a leading provider of integrated retail security solutions, deployed today at more than 80 percent of the world s top 200 retailers. Tyco
Access Control, Ticketing and Booking System for Sports Halls
Access Control, Ticketing and Booking System for Sports Halls SDD Information Technology Group has developed system for ticketing, booking and access control for sport objects. The system is based on contact
Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System
Introducing... The Word's Most Advance Biometric Time Attendance Door Access Security System EC50 Proximity Card Time Clock Designed for Small to Large sized Businesses Large Color LCD Display Plug n
converged communications
converged communications The future of business communications Enjoy freedom of choice with investment protection The Xen IPK gives you a choice: You can deploy traditional telephony, ToIP, or any combination,
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
How To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
Document Number: 13004.25-4.5.2-6/15/2012
Mobile Android App User Guide Copyright 2012 icontrol Networks, Inc. All rights reserved. No reproduction in whole or in part without prior written approval. icontrol Networks, icontrol, and icontrol logo
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
Generic RFID Software Platform for Any Application
FALKEN Secure Networks Inc. (FSN) has introduced a new paradigm to the RFID industry with its generic software platform to simplify System Integration, drive custom development costs out of system acquisition
Integrated Security System
Integrated Security System Door Access Control System Elevator Access Control System Elevator Vandalism Protection System Car Park Control System Time Attendance System A Simple Building Integration System
RFID, GPS & GSM Based Vehicle Tracing & Employee Security System
RFID, GPS & GSM Based Vehicle Tracing & Employee Security System Ms.S.S.Pethakar, Prof. N. Srivastava, Ms.S.D.Suryawanshi Abstract A RFID, GPS & GSM Based Vehicle Tracking and Employee Security System
Ensuring Security by Providing Technology Multipliers
Ensuring Security by Providing Technology Multipliers formerly KritiKal SecureScan UNDER VEHICLE SCANNING SYSTEM X-RAY BAGGAGE SCANNERS AUTOMATIC NUMBER PLATE RECOGNITION SPEED VIOLATION DETECTION RED
How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
Hands-free phone system features
Hands-free phone system features This system supports Bluetooth, which allows you to make or receive calls without using cables to connect a cellular phone and the system, and without operating the cellular
www.excellium.ca Tel. : 514.798.8899 Fax. : 514.798.8898 Toll Free : 1.888.381.2457 Equipmentperfect Controlperfect IDperfect Keyperfect Reportperfect
Controlperfect Equipmentperfect With its unique approach, Controlperfect is the first software suite to integrate, in a complete and interactive whole, the numerous daily tasks related to the management
ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.
MANY FUNCTIONS. ONE SYSTEM. ONE CARD. ACCESS CONTROL One card, centrally monitored and controlled provides access to doors, gates, turnstiles and lockers ACCESS CONTROL The Intelligent System from InterCard
Facility Monitoring Services for More Efficient Maintenance of Social Infrastructure
259 Hitachi Review Vol. 63 (2014), No. 5 Featured Articles Facility Services for More Efficient Maintenance of Social Infrastructure Masaki Ogihara Masafumi Uematsu Daisuke Shibata Sachio Minami OVERVIEW:
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
indusco Your Trusted IT Partner Indusco IT Solutions
indusco Your Trusted IT Partner Indusco IT Solutions Abu Dhabi Indusco IT Solutions Mussafah M-38, Plot No-18, Office No-17 P.O.Box: 7307, Abu Dhabi, UAE. Tel (Office): +971 2 550 7 474 Fax(Office) : +971
Middleborough Police Electronic Security Narrative
Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of
DPC-536 Programming and Debug Guide
DPC-536 Programming and Debug Guide CONTENTS 1. Introduction ------------------------------------------------------------------------------- 2 2. System Password and Master Card -----------------------------------------------------
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
VEHICLE TRACKING ALONG WITH THE ADVANCED RTO TECHNOLOGY
VEHICLE TRACKING ALONG WITH THE ADVANCED RTO TECHNOLOGY PROJECT REFERENCE NO. : 37S1335 COLLEGE : JAIN COLLEGE OF ENGINEERING, BELGAUM BRANCH : ELECTRONICS AND COMMUNICATION GUIDEs : PRAKASH B.B AND AKASH
A guide to Access Control in care homes
A guide to Access Control in care homes www.bsia.co.uk 1 of 8 What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets, or vehicles in,
Physical Security Assessment Form
Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...
