Integrated Security Solution - PowerPoint PPT Presentation

1 / 26
About This Presentation
Title:

Integrated Security Solution

Description:

Ingersoll Rand Integrated Security Solution – PowerPoint PPT presentation

Number of Views:114
Avg rating:3.0/5.0
Slides: 27
Provided by: AdityaA2
Category:

less

Transcript and Presenter's Notes

Title: Integrated Security Solution


1
Ingersoll Rand
  • Integrated Security Solution

2
(No Transcript)
3
The Presentation
  1. Introduction
  2. Challenges
  3. The Solution Total Integration
  4. Biometric
  5. Access Control / TA
  6. Perimeter and Gates
  7. Architectural Hardware
  8. Digital Video Surveillance
  9. Conclusion

4
Who is Ingersoll Rand?
Security Technologies
Industrial Technologies
  • Corporate Worldwide Facts
  • Fortune 500 Company
  • 135 year Old, Completed 100 years
  • on New York Stock Exchange
  • Over 100 manufacturing facilities
  • Exports products to more than 150 countries
  • Over US 10 billion in annual sales
  • 50,000 employees worldwide

Compact Vehicle Technologies
Construction Technologies
5
Industrial Technologies
Construction Technologies
Compact Vehicle Technologies
Security Technologies
Climate Control Technologies
Locks Trim
Fire Doors Door Controls
Access TA Productivity
Digital Video Surveillance
6
Security Technologies
Global Networked Security Solution with time and
attendance personnel scheduling
LEVEL 4 Total Security Integration
Network Access control including Biometrics,
Perimeter and CCTV
LEVEL 3 Access Control and Surveillance
Standalone electronic access Controlled openings
LEVEL 2 Electronics
Basic Door hardware and master key System
LEVEL 1 Mechanical Access/ Egress including Fire
Doors
7
Central Control Room
WAN
Mechanical Access Control
WAN
8
Security Technologies
Access Control
Time Attendance, Productivity
9
Biometric Devices Since 1986
  • Biometric devices are electronic means of
    measuring unique characteristics or actions of a
    person, and are used to identify, or verify the
    identity of, an individual.
  • Recognition Systems, Inc., a division of
    Ingersoll-Rand, is the worldwide leader in
    Biometric access control, time and attendance,
    and personal identification products.
  • The company, founded in 1986, pioneered the
    commercialization of biometrics using its
    patented technologies.
  • Recognition Systems brings the true security and
    convenience of biometric technology easily within
    reach of most access control applications.

10
Biometrics
What are Biometrics? Automatic methods to verify
the identity of an individual using a physical
characteristic or behavioral trait
How Biometrics Fit into Security
  • Things you have
  • Keys, cards, badges
  • Things you know
  • PINs, Passwords
  • Things you are
  • Biometrics
  • The only positive identifier

11
Benefits of Biometrics
  • Access is about people, not tokens
  • A card based system grants access to pieces of
    plastic, not people
  • Whom ever knows the password gains access
  • Only a biometric can insure its the right PERSON
    gaining access
  • Cards and PINs can be
  • shared, lost, or stolen
  • Cost Savings
  • Membership applications
  • Convenience
  • High deterrent value
  • Minimizes losses from theft and tampering

12
How to compare Biometrics
  • FAR False Accept Rate
  • Letting the bad guys in
  • All Biometrics make mistakes, some more than
    others
  • FRR False Reject Rate
  • NOT letting the good guys in
  • This rate is for normal access control the most
    important
  • At least 99 of all people are good, 1 is bad
  • Hassle Factor How many problems I have
  • When people cannot be verified
  • When people cannot be enrolled
  • If bad guys are let in
  • The combined effect of the above

13
Why False Reject is Key?
  • A False Reject can occur with EVERY use of the
    system
  • A False Accept can ONLY occur when an
    unauthorized person makes an attempt
  • There are a lot more good guys!

The False Reject rate will determine if it stays
on the wall
14
An Example
  • A company has 100 employees.
  • Each person uses the door 4 times per day
  • 400 transactions per day
  • or
  • 2000 transactions per week

15
An Example
A 1.0 False Reject Rate of would predict 20
problems per week 2000 transactions X 1.0 20
A 0.1 False Reject Rate would yield 2 problems
in the same week! 2000 transactions X 0.1 2
Remember, there are only 100 employees!
16
Types of Biometrics
Face Recognition
Fingerprint Reader
Iris Recognition
Handkey Reader
17
Relative Performance
Source United States General Accounting Office
Technology Assessment
18
Relative Performance
Source United States General Accounting Office
Technology Assessment
19
BIOMETRIC HAND KEY READER
  • Features
  • Provides the ultimate in system reliability .
  • Door operation and monitoring.
  • Stand alone or networked operation .
  • Card emulation mode .
  • Multiple auxiliary inputs and outputs .
  • Definable time zones .

How it works
  • ID is made by the size and shape of your hand
  • 3-D image is acquired
  • 31,000 points analyzed
  • Over 90 unique measurements taken
  • Lengths
  • Widths
  • Thickness
  • Surface area
  • 9 byte template is generated

20
Using a HandReader
  • Present MIFARE/ iClass Smartcard
  • Place hand on plate
  • Gently touch finger pins
  • LEDs indicate when hand is in proper position
  • 9 byte template is generated
  • HandReader compares template to current hand
    placement
  • User is verified in less than 1 second
  • User is given a customized message (optional)

21
Benefits
  • Reliability
  • 1,500,000 units installed
  • Available from RSI for over three decades
  • Installed, operating and serviced in over 80
    countries
  • Security without hassle
  • High security for large populations
  • Comfort and acceptance, very easy to enroll and
    use
  • Template is small, easy to store and cannot be
    turned around
  • User acceptance
  • 15 people per minute can move through an entrance
  • People use their hands to open doors, it is a
    natural verification!
  • Custom limits can be set for specific users

22
FEAR FACTOR
FINGERPRINT FACTORS HANDKEY
Of top part of finger TEMPLATE Complete palm
USAGE Top part of finger used as a signature, hence can be misused by miscreants USAGE Cannot use the finger template since the image would then be blurred
SEASONS ENVIRONMENT
Sweaty / moist / dry- scaly fingers cannot be identified by the reader Summer/ Rains/ winter No such problem encountered
Oily/ soiled fingers cannot be identified by the reader Food No such problem encountered
Bruised/ bandaged fingers not identifiable WOUNDS Palm can be identified despite a cut / bandaged finger.
If details of employee who is sacked or left organization not deleted- employee can still enter. Fingerprint stored at once stays same. SACKED EMPLOYEE (Every hand and finger undergoes gradual changes) Hand key revises/ updates template each time the employee shows his hand. If sacked employee returns after a long time, his hand will not be identified
1 out 50 fingerprints are not readable hence difficult to enroll ENROLLMENT No such problem encountered
23
Access Control Software Features
  • Security Standards
  • Meets industrial data center security standards
  • Secure individual administration rights over part
    or all of the system
  • Run secure individual reports by login
  • Tools
  • Video imaging/Integrated Badging
  • Global anti-passback
  • Options
  • Visitor tracking software optional web
    interface available
  • Digital video retrieval for event/video recall
  • Customized user reports via Crystal Reports
    Writer
  • Software can run as a single client or
    multi-client

24
System Configuration
Elevator Reader
Elevator Reader
Workstation 1 of 50
Biometric Reader 1
Reader 4
Main Entrance
Smart Card Reader4
Reader 8
Service
Biometric Reader 6
Control Room
Attendance recording
Biometric Reader 6
Badging Station
Geoffrey File Server
Stores
Biometric Reader 1
Maintenance
Biometric Reader 1
ID Badging Station/ Workstation 48 of 50
Smart Card Reader 6
Luggage
Gymnasium
Biometric Reader 1
Workstation 49 of 50
25
WAN
Workstation
Workstation
Site 1
Site 2
File Server
ID Badging Station/ Workstation 48 of 50
Other Site
Workstation
Redundant File Server
Workstation
Workstation
26
Total Integrated Security Solution
CCTV
CCTV
CCTV
Control Control
Control Centre
Gate Security
27
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com