View
217
Download
3
Category
Tags:
Preview:
Citation preview
Integrated Security Solution
Ingersoll Rand
Insert Footer 2
3
The PresentationThe Presentation
1. Introduction
2. Challenges
3. The Solution – Total Integration
4. Biometric
5. Access Control / T&A
6. Perimeter and Gates
7. Architectural Hardware
8. Digital Video Surveillance
9. Conclusion
4
Who is Ingersoll Rand?
Corporate Worldwide Facts :
• Fortune 500 Company
• 135 year Old, Completed 100 years
on New York Stock Exchange
• Over 100 manufacturing facilities
• Exports products to more than 150 countries
• Over US $10 billion in annual sales
• 50,000 employees worldwide
Industrial TechnologiesSecurity Technologies
Compact Vehicle Technologies
Climate Control Technologies
Construction Technologies
5
AccessT&A
Productivity
Security Technologies
Climate Control
Technologies
Locks & Trim
Fire Doors &Door Controls
Industrial Technologies
Construction Technologies
Compact Vehicle
Technologies
Digital VideoSurveillance
Perimeter Protection
System
7
WAN
WAN
HingesCloserPush Bar/LockMechanical Access Control
Central ControlRoom
Global/Multi Facility Integrated Solution
Site 1
Site 2
Site 3 Site 4
LAN/WAN
LAN/WAN
LAN/WAN
LAN/WAN
Site 1 Site 2
Site 3Site 4
H.Q
Network Security
LAN/RS485
Control Room
8
Security TechnologiesSecurity Technologies
Fire DoorPanic Device
Surveillance System
Biometrics
Access Control
Time & Attendance,ProductivityPerimeter Protection
System
9
…Biometric Devices Since 1986
• Biometric devices are electronic means of measuring unique
characteristics or actions of a person, and are used to identify,
or verify the identity of, an individual.
• Recognition Systems, Inc., a division of Ingersoll-Rand, is the
worldwide leader in Biometric access control, time and
attendance, and personal identification products.
• The company, founded in 1986, pioneered the
commercialization of biometrics using its patented technologies.
• Recognition Systems brings the true security and convenience
of biometric technology easily within reach of most access
control applications.
10
BiometricsWhat are Biometrics?What are Biometrics?Automatic methods to verify the Automatic methods to verify the identity of an individual using a identity of an individual using a physical characteristic or behavioral physical characteristic or behavioral traittrait
How Biometrics Fit into Security
Things you haveKeys, cards, badges
Things you knowPINs, Passwords
Things you areBiometricsThe only ‘positive
identifier’
1234
11
Benefits of Biometrics
Access is about people, not tokens– A card based system grants access to pieces of
plastic, not people– Whom ever knows the password gains access
Only a biometric can insure it’s the right PERSON gaining access
Cards and PINs can be shared, lost, or stolen• Cost Savings
– Membership applications• Convenience• High deterrent value
– Minimizes losses from theft and tampering
12
How to compare Biometrics
FAR: False Accept RateLetting the bad guys in
All Biometrics make mistakes, some more than others
FRR: False Reject RateNOT letting the good guys in
This rate is for “normal” access control the most important
At least 99% of all people are good, 1% is bad
Hassle Factor: How many problems I haveWhen people cannot be verified
When people cannot be enrolled
If bad guys are let in
The combined effect of the above
13
Why False Reject is Key?
• A False Reject can occur with EVERY use of the system
• A False Accept can ONLY occur when an unauthorized person makes an attempt
• There are a lot more good guys!
The False Reject rate will determine if it stays on the wall
14
An Example
• A company has 100 employees.
• Each person uses the door 4 times per day
400 transactions per dayor
2000 transactions per week
15
A 1.0% False Reject Rate of would predict 20 problems per week 2000 transactions X 1.0% = 20
1.0%=
A 0.1% False Reject Rate would yield 2 problems in the same week! 2000 transactions X 0.1% = 2
0.1%=
Remember, there are only 100 Remember, there are only 100 employees!employees!
An Example
16
Types of Biometrics
Handkey Reader Fingerprint Reader Face Recognition Iris Recognition
17
Relative Performance
Characteristic Facial Fingerprint Iris Hand
3.3-70% 0.2-36% 1.9-6% 0-5%
False Accept Rate
0.3-5% 0-8% < 1% 0-2.1%
User acceptance Potential for privacy misuse
Association with law enforcement, hygiene
User resistance, usage difficulty
Hygiene
Enrollment time About 3 min About 3 min 30 sec
About 2 minutes 15 seconds
About 1 minute
Transaction time 10 seconds 9-19 seconds 12 seconds 6-10 seconds
Template size 84-1,300 bytes 250-1,000 bytes 512 bytes 9 bytes
Vulnerability Show picture Artificial fingers or reactivated latent prints
High resolution picture of iris
None
False Reject Rate
Source: United States General Accounting Office Technology Assessment
18
Relative Performance
Characteristic Facial Fingerprint Iris Hand
3.3-70% 0.2-36% 1.9-6% 0-5%
False Accept Rate
0.3-5% 0-8% < 1% 0-2.1%
User acceptance Potential for privacy misuse
Association with law enforcement, hygiene
User resistance, usage difficulty
Hygiene
Enrollment time About 3 min About 3 min 30 sec
About 2 minutes 15 seconds
About 1 minute
Transaction time 10 seconds 9-19 seconds 12 seconds 6-10 seconds
Template size 84-1,300 bytes 250-1,000 bytes 512 bytes 9 bytes
Vulnerability Show picture Artificial fingers or reactivated latent prints
High resolution picture of iris
None
False Reject Rate
Source: United States General Accounting Office Technology Assessment
comfort < 70% < 36% < 6% < 5%
security < 5% < 8% < 1% < 2.%
19
BIOMETRIC HAND KEY READERFeatures Provides the ultimate in system reliability .
Door operation and monitoring.
Stand alone or networked operation .
Card emulation mode .
Multiple auxiliary inputs and outputs .
Definable time zones .
How it worksID is made by the size and shape of your hand
3-D image is acquired
31,000 points analyzed
Over 90 unique measurements taken• Lengths
• Widths
• Thickness
• Surface area
9 byte template is generated
20
Using a HandReader
• Present MIFARE®/ iClass Smartcard
• Place hand on plate
• Gently touch finger pins
• LED’s indicate when hand is in proper position
• 9 byte template is generated
• HandReader compares template to current hand placement
• User is verified in less than 1 second
• User is given a customized message (optional)
21
Benefits
Reliability 1,500,000 units installed Available from RSI for over three decades Installed, operating and serviced in over 80 countries
Security without hassle High security for large populations Comfort and acceptance, very easy to enroll and use Template is small, easy to store and cannot be turned around
User acceptance 15 people per minute can move through an entrance People use their hands to open doors, it is a natural verification! Custom limits can be set for specific users
22
FEAR FACTORFINGERPRINT FACTORS HANDKEY
Of top part of finger TEMPLATE Complete palm
USAGE Top part of finger used as a signature, hence can be misused by miscreants
USAGE Cannot use the finger template since the image would then be blurred
SEASONS & ENVIRONMENT
Sweaty / moist / dry- scaly fingers cannot be identified by the reader
Summer/ Rains/ winter No such problem encountered
Oily/ soiled fingers cannot be identified by the reader
Food No such problem encountered
Bruised/ bandaged fingers not identifiable
WOUNDS Palm can be identified despite a cut / bandaged finger.
If details of employee who is sacked or left organization not deleted- employee can still enter. Fingerprint stored at once stays same.
SACKED EMPLOYEE (Every hand and finger undergoes
gradual changes)
Hand key revises/ updates template each time the employee shows his hand. If sacked employee returns after a long time, his hand will not be identified
1 out 50 fingerprints are not readable; hence difficult to enroll
ENROLLMENT No such problem encountered
23
Access Control Software Features
• Security Standards– Meets industrial data center security standards– Secure individual administration rights over part or all of the system– Run secure individual reports by login
• Tools– Video imaging/Integrated Badging– Global anti-passback
• Options– Visitor tracking software – optional web interface available– Digital video retrieval for event/video recall– Customized user reports via Crystal Reports Writer– Software can run as a single client or multi-client
24
Reader #4
Reader #8
Geoffrey File Server
Workstation 1 of 50+
ID Badging Station/ Workstation 48 of 50+
Workstation 49 of 50+
Biometric Reader #6
Smart Card Reader#4
Biometric Reader #1
Elevator Reader
Elevator Reader
Main Entrance
Badging Station
Service
Control Room
Attendance recording
Maintenance
Gymnasium
System Configuration
Biometric Reader #6
Biometric Reader #1
Smart Card Reader #6
Luggage
StoresBiometric Reader #1
Biometric Reader #1
25
WAN
ID Badging Station/ Workstation 48 of 50+
Workstation
Redundant File Server
Workstation
File Server
Workstation
Workstation
Workstation
Site 1 Site 2
Other Site
26
Total Integrated Security Solution
CCTV
ControlControl
ControlCentre
CCTV
CCTV
Gate Security
27
Recommended