Title: Integrated Security Solution
1Ingersoll Rand
- Integrated Security Solution
2(No Transcript)
3The Presentation
- Introduction
- Challenges
- The Solution Total Integration
- Biometric
- Access Control / TA
- Perimeter and Gates
- Architectural Hardware
- Digital Video Surveillance
- Conclusion
4Who is Ingersoll Rand?
Security Technologies
Industrial Technologies
- Corporate Worldwide Facts
- Fortune 500 Company
- 135 year Old, Completed 100 years
- on New York Stock Exchange
- Over 100 manufacturing facilities
- Exports products to more than 150 countries
- Over US 10 billion in annual sales
- 50,000 employees worldwide
Compact Vehicle Technologies
Construction Technologies
5Industrial Technologies
Construction Technologies
Compact Vehicle Technologies
Security Technologies
Climate Control Technologies
Locks Trim
Fire Doors Door Controls
Access TA Productivity
Digital Video Surveillance
6Security Technologies
Global Networked Security Solution with time and
attendance personnel scheduling
LEVEL 4 Total Security Integration
Network Access control including Biometrics,
Perimeter and CCTV
LEVEL 3 Access Control and Surveillance
Standalone electronic access Controlled openings
LEVEL 2 Electronics
Basic Door hardware and master key System
LEVEL 1 Mechanical Access/ Egress including Fire
Doors
7Central Control Room
WAN
Mechanical Access Control
WAN
8Security Technologies
Access Control
Time Attendance, Productivity
9Biometric Devices Since 1986
- Biometric devices are electronic means of
measuring unique characteristics or actions of a
person, and are used to identify, or verify the
identity of, an individual. - Recognition Systems, Inc., a division of
Ingersoll-Rand, is the worldwide leader in
Biometric access control, time and attendance,
and personal identification products. - The company, founded in 1986, pioneered the
commercialization of biometrics using its
patented technologies. - Recognition Systems brings the true security and
convenience of biometric technology easily within
reach of most access control applications.
10Biometrics
What are Biometrics? Automatic methods to verify
the identity of an individual using a physical
characteristic or behavioral trait
How Biometrics Fit into Security
- Things you have
- Keys, cards, badges
- Things you know
- PINs, Passwords
- Things you are
- Biometrics
- The only positive identifier
11Benefits of Biometrics
- Access is about people, not tokens
- A card based system grants access to pieces of
plastic, not people - Whom ever knows the password gains access
- Only a biometric can insure its the right PERSON
gaining access - Cards and PINs can be
- shared, lost, or stolen
- Cost Savings
- Membership applications
- Convenience
- High deterrent value
- Minimizes losses from theft and tampering
12How to compare Biometrics
- FAR False Accept Rate
- Letting the bad guys in
- All Biometrics make mistakes, some more than
others - FRR False Reject Rate
- NOT letting the good guys in
- This rate is for normal access control the most
important - At least 99 of all people are good, 1 is bad
- Hassle Factor How many problems I have
- When people cannot be verified
- When people cannot be enrolled
- If bad guys are let in
- The combined effect of the above
13Why False Reject is Key?
- A False Reject can occur with EVERY use of the
system - A False Accept can ONLY occur when an
unauthorized person makes an attempt - There are a lot more good guys!
The False Reject rate will determine if it stays
on the wall
14An Example
- A company has 100 employees.
- Each person uses the door 4 times per day
- 400 transactions per day
- or
- 2000 transactions per week
15An Example
A 1.0 False Reject Rate of would predict 20
problems per week 2000 transactions X 1.0 20
A 0.1 False Reject Rate would yield 2 problems
in the same week! 2000 transactions X 0.1 2
Remember, there are only 100 employees!
16Types of Biometrics
Face Recognition
Fingerprint Reader
Iris Recognition
Handkey Reader
17Relative Performance
Source United States General Accounting Office
Technology Assessment
18Relative Performance
Source United States General Accounting Office
Technology Assessment
19BIOMETRIC HAND KEY READER
- Features
- Provides the ultimate in system reliability .
- Door operation and monitoring.
- Stand alone or networked operation .
- Card emulation mode .
- Multiple auxiliary inputs and outputs .
- Definable time zones .
How it works
- ID is made by the size and shape of your hand
- 3-D image is acquired
- 31,000 points analyzed
- Over 90 unique measurements taken
- Lengths
- Widths
- Thickness
- Surface area
- 9 byte template is generated
20Using a HandReader
- Present MIFARE/ iClass Smartcard
- Place hand on plate
- Gently touch finger pins
- LEDs indicate when hand is in proper position
- 9 byte template is generated
- HandReader compares template to current hand
placement - User is verified in less than 1 second
- User is given a customized message (optional)
21Benefits
- Reliability
- 1,500,000 units installed
- Available from RSI for over three decades
- Installed, operating and serviced in over 80
countries - Security without hassle
- High security for large populations
- Comfort and acceptance, very easy to enroll and
use - Template is small, easy to store and cannot be
turned around - User acceptance
- 15 people per minute can move through an entrance
- People use their hands to open doors, it is a
natural verification! - Custom limits can be set for specific users
22FEAR FACTOR
FINGERPRINT FACTORS HANDKEY
Of top part of finger TEMPLATE Complete palm
USAGE Top part of finger used as a signature, hence can be misused by miscreants USAGE Cannot use the finger template since the image would then be blurred
SEASONS ENVIRONMENT
Sweaty / moist / dry- scaly fingers cannot be identified by the reader Summer/ Rains/ winter No such problem encountered
Oily/ soiled fingers cannot be identified by the reader Food No such problem encountered
Bruised/ bandaged fingers not identifiable WOUNDS Palm can be identified despite a cut / bandaged finger.
If details of employee who is sacked or left organization not deleted- employee can still enter. Fingerprint stored at once stays same. SACKED EMPLOYEE (Every hand and finger undergoes gradual changes) Hand key revises/ updates template each time the employee shows his hand. If sacked employee returns after a long time, his hand will not be identified
1 out 50 fingerprints are not readable hence difficult to enroll ENROLLMENT No such problem encountered
23Access Control Software Features
- Security Standards
- Meets industrial data center security standards
- Secure individual administration rights over part
or all of the system - Run secure individual reports by login
- Tools
- Video imaging/Integrated Badging
- Global anti-passback
- Options
- Visitor tracking software optional web
interface available - Digital video retrieval for event/video recall
- Customized user reports via Crystal Reports
Writer - Software can run as a single client or
multi-client
24System Configuration
Elevator Reader
Elevator Reader
Workstation 1 of 50
Biometric Reader 1
Reader 4
Main Entrance
Smart Card Reader4
Reader 8
Service
Biometric Reader 6
Control Room
Attendance recording
Biometric Reader 6
Badging Station
Geoffrey File Server
Stores
Biometric Reader 1
Maintenance
Biometric Reader 1
ID Badging Station/ Workstation 48 of 50
Smart Card Reader 6
Luggage
Gymnasium
Biometric Reader 1
Workstation 49 of 50
25WAN
Workstation
Workstation
Site 1
Site 2
File Server
ID Badging Station/ Workstation 48 of 50
Other Site
Workstation
Redundant File Server
Workstation
Workstation
26Total Integrated Security Solution
CCTV
CCTV
CCTV
Control Control
Control Centre
Gate Security
27(No Transcript)