 
        
        
        Security's Range and Capabilities
        There are apps for that
        
        
			- By Brandon Arcment
- Dec 01, 2011
Smartphones and tablets are revolutionizing the way we
  communicate and entertain ourselves. We talk or text
  with family and friends from virtually anywhere in the
  world or watch a music video to pass time waiting for a
  train. But do you also want to control your company’s video surveillance
  cameras from virtually anywhere in the world? Or perhaps extend
  your access control system beyond facility walls? Today, there
  are apps for that.
  
The mobility and convenience offered by handheld devices has
  caught the attention of manufacturers and integrators, who are now
  marketing numerous security solutions. Many video technologies offer
  apps allowing users to view video, control PTZ cameras, integrate
  video analytics, and start and stop recording. In some cases, video
  also can be integrated with Google Earth to quickly link incidents to
  a geographic location.
  
There also are numerous mobile solutions being offered to augment
  access control systems. By making the guard, the credential
  and the reader mobile, the range of security is being greatly expanded.
  And with these devices capable of working over cellular, RF
  or Wi-Fi networks, security solutions are becoming viable in places
  and situations that, until recently, would have been unavailable or
  cost prohibitive.
  
Access Control Goes Mobile
  
Most of today’s smartphones and tablets have intelligence that is
  comparable to the components of a typical access control system.
  As such, they are now being asked to handle many of the activities
  performed by traditional readers, credentials and workstations.
  
Here’s an example of the new mobile technologies at work with
  hardened, handheld remote card readers. A Canadian petrochemical
  plant often has 10 or more busloads of trainees enter a facility.
  Corporate security policy requires that staff maintain an accurate list of plant occupants and validate credentials of all individuals coming
  and going. When a bus stops at the main gate, a guard enters the vehicle
  with a wireless, handheld card reader. He swipes each passenger’s
  credential to validate cardholder-specific identity information and an
  associated photo on the reader’s screen. A green check mark on the
  screen indicates the person is cleared for entry; a red “X” means this
  passenger is not currently authorized to enter the facility. The entire
  process takes only minutes and confines the trainees within the bus
  until everyone is authorized to be on site.
  
The same procedure is repeated at the end of the day to make certain
  everyone who is supposed to leave is doing so. When connected to
  the wireless network, information from the reader is wirelessly transmitted
  to a head-end system located in the facility’s command center.
  If network connectivity is interrupted, the device has the intelligence
  to operate autonomously until communication is re-established.
  
This type of reader also is valuable as a mustering tool during an
  emergency. As employees, vendors and registered visitors reach an
  assigned muster point, they present their ID cards to a safety officer
  carrying the handheld reader. The reader will provide a list of any
  missing persons that can be shared with local first responders.
  
Handheld readers can provide remote enrollment sites at large
  facilities such as ports that use government-issued TWIC cards or
  other personal identity verification (PIV) credentials. By handling the
  authentication at the facility perimeter, the person is enrolled in the
  database, which can save time for the person at other identity access
  points within the facility.
  
Near-field Communication Enhances Security
  
Another major step in the continued development of mobile access
  control is based on the technology known as near-field communication
  (NFC). This technology allows for the high-frequency, wireless
  exchange of data between two devices, such as a card reader and a
  smartphone, separated by no more than about four inches.
  
There are already many NFC-enabled smartphones that contain
  credit and debit card information allowing end users to make payments
  for retail purchases. This is a rapidly growing area in the retail
  industry. But the same phone-and-chipset combination also has tremendous
  potential for access control applications.
Two test projects conducted by major access system manufacturers
  provide an idea of how this technology can work. One Swedish
  hotel allows guests to replace standard room keys with their NFCequipped
  mobile phones. After making a reservation at the hotel,
  guests receive a text message asking them to check in using their
  phones. Once they do so, either before or as they arrive at the hotel,
  the NFC chip’s key function is activated.
  
The guest no longer has to stand at the reception desk to receive
  a mag stripe or proximity card as a room key. Instead, he or she goes
  directly to a pre-assigned room, holds the phone to the door and it
  unlocks. By holding the phone next to a service panel in the room,
  a guest also can use the NFC function to call reception, book a taxi
  or get the latest Internet weather forecast. Guests using this solution
  reported saving more than 10 minutes in the arrival process.
  
Smartphones Simplify access control
  
NFC technology has tremendous potential for use in facilities such as
  office buildings and college dormitories. A recently completed project
  at a major western U.S. university allowed students living in one residence
  hall to open door locks using NFC-enabled smartphones. The
  technology also simplifies the administration of the access control
  system by supporting over-the-air credentialing and use restrictions.
  An overwhelming majority of the participants said using a smartphone
  to unlock a door was as convenient as using a campus ID card.
  And, nearly all students said they would be interested in using their
  phones for other campus applications such as accessing the recreation
  center and paying for meals, tickets and merchandise.
  
With the intelligence residing in the NFC-enabled smartphone,
  it will be easier than ever to use the cellular network to deliver keys
  to new employees and vendors and alter the rules for the use of each
  digital key.
For example, an employee or a vendor at a government facility
  may have already received approval for access only to find a door
  where access is denied. With a traditional access card, the person
  would be required to return to the security operations center to have
  authorization for that door added. But with NFC and a smartphone,
  that authorization could be added remotely by simply calling the security
  desk. The process would take seconds rather than many minutes
  to complete.
  
NFC-enabled smartphones can send secure signals to unlock not
  only open doors, but also desk drawers, file cabinets, storage closets,
  drug carts and other valuable properties. The infrastructure required
  for these locks is usually less expensive than that of a standard online
  card reader, yet, combined with the smartphone, it can create an audit
  trail to show who has accessed an asset and when.
  
These less-expensive solutions allow for robust access systems to
  be applied in areas that may have previously been considered cost
  prohibitive.
  
Smartphones also can provide peace of mind for individual workers
  or students who may feel threatened as they move about a corporate
  or college campus late at night. They can make a duress call to
  the security command center, where the phone’s GPS capabilities can
  pinpoint the call on a campus map. With virtually all students now
  carrying a mobile phone, it may be possible in the future to reduce the
  number of remote intercoms and communication stations on campus.
  
Mobile Devices Deliver Remote Video
  
Imagine this scenario: A large, often-unmanned utility substation has
  suffered repeated acts of vandalism from thieves looking to steal copper
  and other valuable materials. The utility operator installed cameras
  around the site perimeter in an effort to deter thieves and otherwise
  monitor any potential criminal activity. The company’s security
  director is watching a weekend football game in his living room when
  his smartphone beeps with an e-mail alert warning of an alarm at the
  substation. He picks up his tablet and opens an app that allows him
  to pan and zoom the cameras to see real-time video from the site. The
  problem turns out to be no more serious than a deer repeatedly running
  into the perimeter fence, and he goes back to enjoying his game.
  
Without the advantages of this mobile application, the security
  director would have to respond to an alarm by either going to the site
  or sending someone else to investigate the disturbance. The delivery
  of video to mobile devices saves time and resources.
  
With the proliferation of handheld devices, security command centers
  are becoming mobile. An organization can provide greater situational
  awareness for mobile-device carrying guards, officers and other
  first responders as they roam or perform other vital jobs. This helps
  officers approaching a potentially dangerous situation with valuable
  video information that can help save lives and protect property. And
  those same devices can transmit video back to the command center,
  where superiors can determine if additional backup is required.
  
In the field, security officers and guards involved in sobriety
  checks and pat downs can use mobile devices to record or transmit
  real-time video to the command center. This can help protect the officer
  if the suspect later claims mistreatment.
Without the need for cabling or even a corporate Wi-Fi network,
  cameras using cellular networks to transmit data offer tremendous flexibility in placement. A word of warning before deployment: verify
  the volume of data to be streamed and check out the cost of data
  plans from network providers. Adjusting for a slower frame rate, lower
  resolution or higher compression can reduce bandwidth problems
  and save money.
  
More organizations are integrating audio along with video into
  the security operation to provide more information to the security
  command center about the nature of events in the field. Some organizations
  also are connecting these mobile devices to emergency notification
  systems, intercoms and external loudspeakers, allowing officers
  at an event to communicate directly with the larger community.
  
Working with IT
  
Getting started with a mobile security infrastructure is relatively easy
  and inexpensive. It quickly puts more capabilities into the hands of
  more people. But it does add to the existing infrastructure, so that will
  involve working with the IT department. Even though many of these
  mobile devices use 3G cellular networks and not an organization’s
  enterprise network, IT staff members still want to know that all data
  being transmitted to network servers is properly encrypted and password
  protected. They will want to limit data stored on mobile devices
  in order to protect mobile apps and users from information theft and
  other malicious activity.
  
IT may require audit logs to record attempted logins, login times
  and the username to help identify suspicious activity. Since mobile
  devices are far more likely to be lost or stolen than a desktop computer,
  IT will want the ability to remotely wipe the memory of a smartphone
  or tablet, erasing all proprietary information.
  
Also, IT will appreciate an open system that supports a variety
  of mobile devices from various manufacturers. That will allow security
  departments to choose from available devices without necessarily
  having to purchase additional equipment and/or enter into new longterm
  contracts with wireless service providers.
  
Many IT departments may require the development of a virtual
  private network, or VPN, for transmitting mobile data. The VPN
  uses a public cellular network to connect mobile devices in the field.
  But, by encrypting the data on the VPN, an organization helps ensure
  security by making it extremely difficult for anyone intercepting the
  data to read it.
Security to Become Increasingly Mobile
  
Consumers have largely driven this smart device phenomenon, and
  it shows no signs of slowing any time in the foreseeable future. According
  to The Economist, 90 percent of the world’s population now
  has access to wireless connectivity, and by 2015 the number of mobile
  devices in use will equal the world’s population.
  
Sales of these devices have continued largely unaffected by a down
  global economy.
Smartphones, tablets, mobile readers and related technologies represent
  a new and greatly expanded way of providing security—from a
  single-site operation to a global enterprise-based organization. With
  careful planning, these mobile technologies can offer secure remote
  monitoring, video surveillance and access control solutions to provide
  benefits such as increased situational awareness and readiness for
  a wide variety of incidents.
  
And as manufacturers and security service providers
  continue to add new applications, the opportunities
  for mobile security will only increase
  dramatically in the near term.
        
        
        
        
        
        
        
        
        
        
        
        
        This article originally appeared in the December 2011 issue of Security Today.