Top Banner
Integrated Security Solution Ingersoll Rand
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

Integrated Security Solution

Ingersoll Rand

Page 2: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

Insert Footer 2

Page 3: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

3

The PresentationThe Presentation

1. Introduction

2. Challenges

3. The Solution – Total Integration

4. Biometric

5. Access Control / T&A

6. Perimeter and Gates

7. Architectural Hardware

8. Digital Video Surveillance

9. Conclusion

Page 4: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

4

Who is Ingersoll Rand?

Corporate Worldwide Facts :

• Fortune 500 Company

• 135 year Old, Completed 100 years

on New York Stock Exchange

• Over 100 manufacturing facilities

• Exports products to more than 150 countries

• Over US $10 billion in annual sales

• 50,000 employees worldwide

Industrial TechnologiesSecurity Technologies

Compact Vehicle Technologies

Climate Control Technologies

Construction Technologies

Page 5: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

5

AccessT&A

Productivity

Security Technologies

Climate Control

Technologies

Locks & Trim

Fire Doors &Door Controls

Industrial Technologies

Construction Technologies

Compact Vehicle

Technologies

Digital VideoSurveillance

Perimeter Protection

System

Page 6: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

7

WAN

WAN

HingesCloserPush Bar/LockMechanical Access Control

Central ControlRoom

Global/Multi Facility Integrated Solution

Site 1

Site 2

Site 3 Site 4

LAN/WAN

LAN/WAN

LAN/WAN

LAN/WAN

Site 1 Site 2

Site 3Site 4

H.Q

Network Security

LAN/RS485

Control Room

Page 7: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

8

Security TechnologiesSecurity Technologies

Fire DoorPanic Device

Surveillance System

Biometrics

Access Control

Time & Attendance,ProductivityPerimeter Protection

System

Page 8: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

9

…Biometric Devices Since 1986

• Biometric devices are electronic means of measuring unique

characteristics or actions of a person, and are used to identify,

or verify the identity of, an individual.

• Recognition Systems, Inc., a division of Ingersoll-Rand, is the

worldwide leader in Biometric access control, time and

attendance, and personal identification products.

• The company, founded in 1986, pioneered the

commercialization of biometrics using its patented technologies.

• Recognition Systems brings the true security and convenience

of biometric technology easily within reach of most access

control applications.

Page 9: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

10

BiometricsWhat are Biometrics?What are Biometrics?Automatic methods to verify the Automatic methods to verify the identity of an individual using a identity of an individual using a physical characteristic or behavioral physical characteristic or behavioral traittrait

How Biometrics Fit into Security

Things you haveKeys, cards, badges

Things you knowPINs, Passwords

Things you areBiometricsThe only ‘positive

identifier’

1234

Page 10: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

11

Benefits of Biometrics

Access is about people, not tokens– A card based system grants access to pieces of

plastic, not people– Whom ever knows the password gains access

Only a biometric can insure it’s the right PERSON gaining access

Cards and PINs can be shared, lost, or stolen• Cost Savings

– Membership applications• Convenience• High deterrent value

– Minimizes losses from theft and tampering

Page 11: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

12

How to compare Biometrics

FAR: False Accept RateLetting the bad guys in

All Biometrics make mistakes, some more than others

FRR: False Reject RateNOT letting the good guys in

This rate is for “normal” access control the most important

At least 99% of all people are good, 1% is bad

Hassle Factor: How many problems I haveWhen people cannot be verified

When people cannot be enrolled

If bad guys are let in

The combined effect of the above

Page 12: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

13

Why False Reject is Key?

• A False Reject can occur with EVERY use of the system

• A False Accept can ONLY occur when an unauthorized person makes an attempt

• There are a lot more good guys!

The False Reject rate will determine if it stays on the wall

Page 13: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

14

An Example

• A company has 100 employees.

• Each person uses the door 4 times per day

400 transactions per dayor

2000 transactions per week

Page 14: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

15

A 1.0% False Reject Rate of would predict 20 problems per week 2000 transactions X 1.0% = 20

1.0%=

A 0.1% False Reject Rate would yield 2 problems in the same week! 2000 transactions X 0.1% = 2

0.1%=

Remember, there are only 100 Remember, there are only 100 employees!employees!

An Example

Page 15: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

16

Types of Biometrics

Handkey Reader Fingerprint Reader Face Recognition Iris Recognition

Page 16: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

17

Relative Performance

Characteristic Facial Fingerprint Iris Hand

  3.3-70% 0.2-36% 1.9-6% 0-5%

False Accept Rate

0.3-5% 0-8% < 1% 0-2.1%

User acceptance Potential for privacy misuse

Association with law enforcement, hygiene

User resistance, usage difficulty

Hygiene

Enrollment time About 3 min About 3 min 30 sec

About 2 minutes 15 seconds

About 1 minute

Transaction time 10 seconds 9-19 seconds 12 seconds 6-10 seconds

Template size 84-1,300 bytes 250-1,000 bytes 512 bytes 9 bytes

Vulnerability Show picture Artificial fingers or reactivated latent prints

High resolution picture of iris

None

False Reject Rate

Source: United States General Accounting Office Technology Assessment

Page 17: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

18

Relative Performance

Characteristic Facial Fingerprint Iris Hand

  3.3-70% 0.2-36% 1.9-6% 0-5%

False Accept Rate

0.3-5% 0-8% < 1% 0-2.1%

User acceptance Potential for privacy misuse

Association with law enforcement, hygiene

User resistance, usage difficulty

Hygiene

Enrollment time About 3 min About 3 min 30 sec

About 2 minutes 15 seconds

About 1 minute

Transaction time 10 seconds 9-19 seconds 12 seconds 6-10 seconds

Template size 84-1,300 bytes 250-1,000 bytes 512 bytes 9 bytes

Vulnerability Show picture Artificial fingers or reactivated latent prints

High resolution picture of iris

None

False Reject Rate

Source: United States General Accounting Office Technology Assessment

comfort < 70% < 36% < 6% < 5%

security < 5% < 8% < 1% < 2.%

Page 18: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

19

BIOMETRIC HAND KEY READERFeatures Provides the ultimate in system reliability .

Door operation and monitoring.

Stand alone or networked operation .

Card emulation mode .

Multiple auxiliary inputs and outputs .

Definable time zones .

How it worksID is made by the size and shape of your hand

3-D image is acquired

31,000 points analyzed

Over 90 unique measurements taken• Lengths

• Widths

• Thickness

• Surface area

9 byte template is generated

Page 19: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

20

Using a HandReader

• Present MIFARE®/ iClass Smartcard

• Place hand on plate

• Gently touch finger pins

• LED’s indicate when hand is in proper position

• 9 byte template is generated

• HandReader compares template to current hand placement

• User is verified in less than 1 second

• User is given a customized message (optional)

Page 20: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

21

Benefits

Reliability 1,500,000 units installed Available from RSI for over three decades Installed, operating and serviced in over 80 countries

Security without hassle High security for large populations Comfort and acceptance, very easy to enroll and use Template is small, easy to store and cannot be turned around

User acceptance 15 people per minute can move through an entrance People use their hands to open doors, it is a natural verification! Custom limits can be set for specific users

Page 21: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

22

FEAR FACTORFINGERPRINT FACTORS HANDKEY

Of top part of finger TEMPLATE Complete palm

USAGE Top part of finger used as a signature, hence can be misused by miscreants

USAGE Cannot use the finger template since the image would then be blurred

SEASONS & ENVIRONMENT

Sweaty / moist / dry- scaly fingers cannot be identified by the reader

Summer/ Rains/ winter No such problem encountered

Oily/ soiled fingers cannot be identified by the reader

Food No such problem encountered

Bruised/ bandaged fingers not identifiable

WOUNDS Palm can be identified despite a cut / bandaged finger.

If details of employee who is sacked or left organization not deleted- employee can still enter. Fingerprint stored at once stays same.

SACKED EMPLOYEE (Every hand and finger undergoes

gradual changes)

Hand key revises/ updates template each time the employee shows his hand. If sacked employee returns after a long time, his hand will not be identified

1 out 50 fingerprints are not readable; hence difficult to enroll

ENROLLMENT No such problem encountered

Page 22: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

23

Access Control Software Features

• Security Standards– Meets industrial data center security standards– Secure individual administration rights over part or all of the system– Run secure individual reports by login

• Tools– Video imaging/Integrated Badging– Global anti-passback

• Options– Visitor tracking software – optional web interface available– Digital video retrieval for event/video recall– Customized user reports via Crystal Reports Writer– Software can run as a single client or multi-client

Page 23: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

24

Reader #4

Reader #8

Geoffrey File Server

Workstation 1 of 50+

ID Badging Station/ Workstation 48 of 50+

Workstation 49 of 50+

Biometric Reader #6

Smart Card Reader#4

Biometric Reader #1

Elevator Reader

Elevator Reader

Main Entrance

Badging Station

Service

Control Room

Attendance recording

Maintenance

Gymnasium

System Configuration

Biometric Reader #6

Biometric Reader #1

Smart Card Reader #6

Luggage

StoresBiometric Reader #1

Biometric Reader #1

Page 24: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

25

WAN

ID Badging Station/ Workstation 48 of 50+

Workstation

Redundant File Server

Workstation

File Server

Workstation

Workstation

Workstation

Site 1 Site 2

Other Site

Page 25: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

26

Total Integrated Security Solution

CCTV

ControlControl

ControlCentre

CCTV

CCTV

Gate Security

Page 26: Integrated Security Solution Ingersoll Rand. Insert Footer 2.

27