Securitys Range and Capabilities

Security's Range and Capabilities

There are apps for that

Smartphones and tablets are revolutionizing the way we communicate and entertain ourselves. We talk or text with family and friends from virtually anywhere in the world or watch a music video to pass time waiting for a train. But do you also want to control your company’s video surveillance cameras from virtually anywhere in the world? Or perhaps extend your access control system beyond facility walls? Today, there are apps for that.

The mobility and convenience offered by handheld devices has caught the attention of manufacturers and integrators, who are now marketing numerous security solutions. Many video technologies offer apps allowing users to view video, control PTZ cameras, integrate video analytics, and start and stop recording. In some cases, video also can be integrated with Google Earth to quickly link incidents to a geographic location.

There also are numerous mobile solutions being offered to augment access control systems. By making the guard, the credential and the reader mobile, the range of security is being greatly expanded. And with these devices capable of working over cellular, RF or Wi-Fi networks, security solutions are becoming viable in places and situations that, until recently, would have been unavailable or cost prohibitive.

Access Control Goes Mobile

Most of today’s smartphones and tablets have intelligence that is comparable to the components of a typical access control system. As such, they are now being asked to handle many of the activities performed by traditional readers, credentials and workstations.

Here’s an example of the new mobile technologies at work with hardened, handheld remote card readers. A Canadian petrochemical plant often has 10 or more busloads of trainees enter a facility. Corporate security policy requires that staff maintain an accurate list of plant occupants and validate credentials of all individuals coming and going. When a bus stops at the main gate, a guard enters the vehicle with a wireless, handheld card reader. He swipes each passenger’s credential to validate cardholder-specific identity information and an associated photo on the reader’s screen. A green check mark on the screen indicates the person is cleared for entry; a red “X” means this passenger is not currently authorized to enter the facility. The entire process takes only minutes and confines the trainees within the bus until everyone is authorized to be on site.

The same procedure is repeated at the end of the day to make certain everyone who is supposed to leave is doing so. When connected to the wireless network, information from the reader is wirelessly transmitted to a head-end system located in the facility’s command center. If network connectivity is interrupted, the device has the intelligence to operate autonomously until communication is re-established.

This type of reader also is valuable as a mustering tool during an emergency. As employees, vendors and registered visitors reach an assigned muster point, they present their ID cards to a safety officer carrying the handheld reader. The reader will provide a list of any missing persons that can be shared with local first responders.

Handheld readers can provide remote enrollment sites at large facilities such as ports that use government-issued TWIC cards or other personal identity verification (PIV) credentials. By handling the authentication at the facility perimeter, the person is enrolled in the database, which can save time for the person at other identity access points within the facility.

Near-field Communication Enhances Security

Another major step in the continued development of mobile access control is based on the technology known as near-field communication (NFC). This technology allows for the high-frequency, wireless exchange of data between two devices, such as a card reader and a smartphone, separated by no more than about four inches.

There are already many NFC-enabled smartphones that contain credit and debit card information allowing end users to make payments for retail purchases. This is a rapidly growing area in the retail industry. But the same phone-and-chipset combination also has tremendous potential for access control applications.

Two test projects conducted by major access system manufacturers provide an idea of how this technology can work. One Swedish hotel allows guests to replace standard room keys with their NFCequipped mobile phones. After making a reservation at the hotel, guests receive a text message asking them to check in using their phones. Once they do so, either before or as they arrive at the hotel, the NFC chip’s key function is activated.

The guest no longer has to stand at the reception desk to receive a mag stripe or proximity card as a room key. Instead, he or she goes directly to a pre-assigned room, holds the phone to the door and it unlocks. By holding the phone next to a service panel in the room, a guest also can use the NFC function to call reception, book a taxi or get the latest Internet weather forecast. Guests using this solution reported saving more than 10 minutes in the arrival process.

Smartphones Simplify access control

NFC technology has tremendous potential for use in facilities such as office buildings and college dormitories. A recently completed project at a major western U.S. university allowed students living in one residence hall to open door locks using NFC-enabled smartphones. The technology also simplifies the administration of the access control system by supporting over-the-air credentialing and use restrictions. An overwhelming majority of the participants said using a smartphone to unlock a door was as convenient as using a campus ID card. And, nearly all students said they would be interested in using their phones for other campus applications such as accessing the recreation center and paying for meals, tickets and merchandise.

With the intelligence residing in the NFC-enabled smartphone, it will be easier than ever to use the cellular network to deliver keys to new employees and vendors and alter the rules for the use of each digital key.

For example, an employee or a vendor at a government facility may have already received approval for access only to find a door where access is denied. With a traditional access card, the person would be required to return to the security operations center to have authorization for that door added. But with NFC and a smartphone, that authorization could be added remotely by simply calling the security desk. The process would take seconds rather than many minutes to complete.

NFC-enabled smartphones can send secure signals to unlock not only open doors, but also desk drawers, file cabinets, storage closets, drug carts and other valuable properties. The infrastructure required for these locks is usually less expensive than that of a standard online card reader, yet, combined with the smartphone, it can create an audit trail to show who has accessed an asset and when.

These less-expensive solutions allow for robust access systems to be applied in areas that may have previously been considered cost prohibitive.

Smartphones also can provide peace of mind for individual workers or students who may feel threatened as they move about a corporate or college campus late at night. They can make a duress call to the security command center, where the phone’s GPS capabilities can pinpoint the call on a campus map. With virtually all students now carrying a mobile phone, it may be possible in the future to reduce the number of remote intercoms and communication stations on campus.

Mobile Devices Deliver Remote Video

Imagine this scenario: A large, often-unmanned utility substation has suffered repeated acts of vandalism from thieves looking to steal copper and other valuable materials. The utility operator installed cameras around the site perimeter in an effort to deter thieves and otherwise monitor any potential criminal activity. The company’s security director is watching a weekend football game in his living room when his smartphone beeps with an e-mail alert warning of an alarm at the substation. He picks up his tablet and opens an app that allows him to pan and zoom the cameras to see real-time video from the site. The problem turns out to be no more serious than a deer repeatedly running into the perimeter fence, and he goes back to enjoying his game.

Without the advantages of this mobile application, the security director would have to respond to an alarm by either going to the site or sending someone else to investigate the disturbance. The delivery of video to mobile devices saves time and resources.

With the proliferation of handheld devices, security command centers are becoming mobile. An organization can provide greater situational awareness for mobile-device carrying guards, officers and other first responders as they roam or perform other vital jobs. This helps officers approaching a potentially dangerous situation with valuable video information that can help save lives and protect property. And those same devices can transmit video back to the command center, where superiors can determine if additional backup is required.

In the field, security officers and guards involved in sobriety checks and pat downs can use mobile devices to record or transmit real-time video to the command center. This can help protect the officer if the suspect later claims mistreatment.

Without the need for cabling or even a corporate Wi-Fi network, cameras using cellular networks to transmit data offer tremendous flexibility in placement. A word of warning before deployment: verify the volume of data to be streamed and check out the cost of data plans from network providers. Adjusting for a slower frame rate, lower resolution or higher compression can reduce bandwidth problems and save money.

More organizations are integrating audio along with video into the security operation to provide more information to the security command center about the nature of events in the field. Some organizations also are connecting these mobile devices to emergency notification systems, intercoms and external loudspeakers, allowing officers at an event to communicate directly with the larger community.

Working with IT

Getting started with a mobile security infrastructure is relatively easy and inexpensive. It quickly puts more capabilities into the hands of more people. But it does add to the existing infrastructure, so that will involve working with the IT department. Even though many of these mobile devices use 3G cellular networks and not an organization’s enterprise network, IT staff members still want to know that all data being transmitted to network servers is properly encrypted and password protected. They will want to limit data stored on mobile devices in order to protect mobile apps and users from information theft and other malicious activity.

IT may require audit logs to record attempted logins, login times and the username to help identify suspicious activity. Since mobile devices are far more likely to be lost or stolen than a desktop computer, IT will want the ability to remotely wipe the memory of a smartphone or tablet, erasing all proprietary information.

Also, IT will appreciate an open system that supports a variety of mobile devices from various manufacturers. That will allow security departments to choose from available devices without necessarily having to purchase additional equipment and/or enter into new longterm contracts with wireless service providers.

Many IT departments may require the development of a virtual private network, or VPN, for transmitting mobile data. The VPN uses a public cellular network to connect mobile devices in the field. But, by encrypting the data on the VPN, an organization helps ensure security by making it extremely difficult for anyone intercepting the data to read it.

Security to Become Increasingly Mobile

Consumers have largely driven this smart device phenomenon, and it shows no signs of slowing any time in the foreseeable future. According to The Economist, 90 percent of the world’s population now has access to wireless connectivity, and by 2015 the number of mobile devices in use will equal the world’s population.

Sales of these devices have continued largely unaffected by a down global economy.

Smartphones, tablets, mobile readers and related technologies represent a new and greatly expanded way of providing security—from a single-site operation to a global enterprise-based organization. With careful planning, these mobile technologies can offer secure remote monitoring, video surveillance and access control solutions to provide benefits such as increased situational awareness and readiness for a wide variety of incidents.

And as manufacturers and security service providers continue to add new applications, the opportunities for mobile security will only increase dramatically in the near term.

This article originally appeared in the December 2011 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3