Your SlideShare is downloading. ×
0
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

26.01.2012 Presentation NMBS Day

548

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
548
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. SNCB-NMBS NEW YEARS HAPPENING 26 Januari 2012
  • 2. AGENDA 13h30 Welcome Drink 14h00 Presentation Sandrine Cocks (OPTEX) >> Outside detection technologies 15h00 Coffee break 15h30 Actual and future access technologies >> Gunnebo Competence Center Francis Deneu 16h30 New Year’s reception
  • 3. WELCOME TO THE OPTEXIntrusion Detection Solutions 26th January 2012 New Year Celebration 2012 With Gunnebo
  • 4. OPTEX Group (1) OPTEX(DONGGUAN) CO., LTD. (2) OPTEX TECHNOLOGIES INC. EAST COAST OFFICE OPTEX DUBAI BRANCH (3) OPTEX-FIBERSENSYS (4) OPTEX CO.,LTD. OPTEX KOREA CO.,LTD. (5) OPTEX INCORPORATED OPTEX SECURITY SP Z.O.O. OPTEX ELECTRONICS (TAIWAN),LTD. OPTEX TECHNOLOGIES INC. OPTEX SECURITY SAS (6) OPTEX (H.K.),LTD. SECUMATIC B.V. OPTEX (EUROPE),LTD. Employees world-wide: 1100 (7) Net Sales in 2010: YEN 17.4 Billion ( EUR 150 FARSIGHT SECURITY SERVICES LTD. Mio)  15% growth Net Sales in 2011 YEN 20.4 Billion (forecast; EUR 175 Mio)  17% growth (8)
  • 5. OPTEX Technology Security Application Communications technology Entrance control Application Far Infrared Ray Recording (FIR) Infrared Imaging-related Factory Automation technology technology Application Near Infrared Ray (NIR) Analysis Environment Protection Control Application Technology Safety Transportation processing Application OPTEX Core Technology=Sensing Technology 5
  • 6. OPTEX Group History 1979 Established in Japan 1980 Developed worlds first infrared detector for automatic door Launched security sensor for Japan domestic market 1985 Established OPTEX (USA),INC in California, USA 1986 Start sales in UK through distributor 1991 Established OPTEX (EUROPE) LTD Open stock to public market in Japan 2001 Went on Tokyo stock exchange market section 2 OPTEX(EUROPE),LTD. acquired Security Enclosures Ltd. in UK 2003 Went on Tokyo stock exchange market section 1 Acquired Farsight Security Service Ltd in UK Established OPTEX Korea Co. Ltd, Korea Established OPTEX Security Sp.z.o.o., Warsaw, Poland 2010 Acquired FIBERSENSYS in Portland, USA 2011 Established OPTEX (EUROPE) Branch Office in Dubai, UAE 6
  • 7. Optex Business Domain 7
  • 8. OPTEX Layer Protection Concept Layer 3 Facility Protection REDSCAN t Camera Layer 0 Layer 2 Outside Perimeter Outdoor Field Zone Layer 1 Perimeter Line REDSCAN REDSCAN & PTZ Camera SIP 8
  • 9. OPTEX Brand Familiy Security Solutions “blue brand” “red brand” “grey brand” Commercial & High End Infrared Fiber-Optic Detection Housing Detection Systems Systems
  • 10. REDWALL Product Line-Up Passive and Active Infra Red and Laser Detection Systems 10
  • 11. REDWALL Product Line-Up L ◇ Brand known as The Best High Reliability ◇ No.1 Market Share in UK ◇ 350,000 Detectors are working today ◇ Strong Sales & Technical Support Team 11
  • 12. REDWALL Product Line-Up REDSCAN Laser Detector 12
  • 13. Product overview  Laser Scan detector RLS-3060 utilises „Time of Flight‟ technology.  RLS-3060 does not require any PC for operation. It can be connected to PTZ camera, video transmitter or DVR.  RLS-3060 has 4 or 8 detection area segments and linked outputs. It can match PTZ control applications.  RLS-3060 can recognize the size, speed and distance of objects within the 30M range. Processing with our detection algorithm, it recognize human targets and avoids false alarm factors.
  • 14. Features of RLS-3060  30m radius for 190 degrees  Vertical and horizontal detection area  Unique detection algorithm  4 or 8 independently adjustable detection areas for PTZ camera control with TCP/IP output  Four independent N.O. Relay outputs  Form C master alarm output  Automatic area setting function  Environmental disqualification circuit  Trouble output  Tamper output
  • 15. Detection principle Time of Flight (TOF) method By calculating the time during Scanning mechanism which a emitted beam returns after hitting the object, the distance to the object can be RX optic TX optic measured. ADD LD Signal processing Sensing resolution = 0.25 degree At 30m distance, detection width is only 13cm. Redscan is sampling every 0.25 degree. It means that Redscan protects 180 degree area with 720 beams and 190 degree area with 760 beams. Size of beam spot is approx 20cm distance at 30m
  • 16. Detection areas REDSCAN, RLS-3060 can be installed vertically and horizontally. Therefore, its can make horizontal and vertical detection area. Detection range is 100ft. (30m) radius, 190 degree.
  • 17. CCTV Convergence: PTZ Dome with the Laser Scan DetectorLaser scan detector can identifyhuman location in the detection area.Utilizing the location information fromthe detector, PTZ camera can becontrolled to capture the human.Combination of PTZ camera and Laserscan detector can be ideal solution forefficient video surveillance.
  • 18. Benefits of Redscan detector REDSCAN detector has 190 degree detection area. Therefore,  No dead spot detection area setting  Very flexible detection area setting  Very precise detection area setting REDSCAN has capability to recognize the intrusion location and 4 or 8 detection area segments and linked output. Therefore,  Best match for PTZ camera preset controlConventional PIR Laser Scan SensorHorizontal detection area Horizontal detection area Vertical detection area
  • 19. Detection areas setting – Detection area H1 Horizontal detection area 190 “H1” mode degree The unit can cover 30m x 1m detection range just for perimeter protection. “H2” mode H2 The unit can cover 30m radius 190 degree arc wide area 190 degreeSuggestedInstallation Vertical detection areaHeight 4m “V”mode V It can cover approx 60m maximum Ground detection area spread that functions like an invisible wall. Alternatively the 190 degree detection area can be matched to an existing wall or fence thus providing early warning of intrusion.
  • 20. DSCAN MANAGER (PC SETUP software) REDSCAN PC Ethernet port(RJ-45)  Visualized detection area  Easy detection area setting on PC software  Other detector setting on PC software
  • 21. Redscan technologies ・Area masking Activate after 60seconds if 50% or more detection area will be changed to less than 30cm from the unit. ・Area rotating Activate after 300seconds if 30% or more detection area will be changed ・Sensor trouble Activate if there are something wrong for the Laser power or the motor spin.
  • 22. Redscan technologies ・Fog Cancellation function Our special algorism allow to detect human even in fog situation. (Patent pending) Video ・DQ output Acts as early warning system and triggers when visibility is reduced to 150m. Unit is stable to 30m actual visibility
  • 23. Advantage for Installation REDSCAN can refresh the ground shape automatically every hour for changes in snow or vegetation growth. Auto Refresh area learning REDSCAN automatically adjusts for environmental changes. (When the Auto mode switch P2 selected. If P1 position selected, detection area is fixed.)
  • 24. Advantage for Installation The REDSCAN automatically detects and learns the contours of the ground wherever you install!!, even for uneven ground. REDSCAN Ex. Active photo beam 60m 60m REDSCAN saves time for design & installation and therefore costs.
  • 25. Advantage for Installation REDSCAN can be installed at an angle to a wall, reducing installing cost dramatically!!It is not necessity to install sensors with fenceline for perimeter security. REDSCAN willbring a new installation design to save timeand cost.
  • 26. Advantage for Installation Revolution of installation!! REDSCAN can make detection area whatever you want. It‟s one of headache for installers to make detection area whatever they want, however REDSCAN make it quite easy.
  • 27. Applications Electric substation
  • 28. Applications Perimeter surveillance with PTZ camera B2 B1 A1 A2H1 mode makes narrow detection area justfor perimeter protection.
  • 29. Applications - Prisons Perimeter surveillance with vertical detection area
  • 30. Vertical Application
  • 31. Vertical Application Any attempt to climbover or enter through the fence rails will be detected
  • 32. Vertical Application
  • 33. Vertical Application Any attempt to climb over or enter through the fence rails will be detected Each detector will output up to eight separate alarm outputs via IP for integration into camera presets for rapid alarm verification
  • 34. Angled Application
  • 35. Angled ApplicationRedscan can be mountedat an angle to extenddetection area inside, oroutside main perimeterwith multiple detectionzones
  • 36. Advantage for Installation Perimeter surveillance for Narrow boundary!! REDSCAN can installed in a narrow boundary zone.
  • 37. Advantage for Installation Early detection for fence lines!! REDSCAN can detect a person: Lifting, Climbing or Cutting fences Normally it‟s difficult to create detection areas outside of fence lines, however REDSCAN can do that.
  • 38. Application example for REDSCANBuilding surface protection Roof protection
  • 39. Reference example - On going project - Facility protection for Utility company in USA Application: Activation of a sprayer of red dye in event of attempted graffiti on doors
  • 40. Reference example - On going project - Perimeter protection for Nuclear Power Plant Application: Current status: Protection over fence to avoid to break pumping facility. 3 on going project in the world as test stage.
  • 41. Reference example - On going project - Multi Client Data Center server protectionApplication:Redscan detects people from one clientattempting to sabotage another clients server– On going project in USA
  • 42. Reference example - On going project - Railroad safety applicationApplication:Redscan detects people and vehicles inrailroad crossing to support the person whooperate the crossing gate. CROSSING CLEAR CRSSING OBSTRUCTED
  • 43. Anti Graffiti System High Mounted detector 4 -10 meters Preset Dome Camera will view zone when breached – unaffected by passing train 4 Addressable Zones
  • 44. Anti Graffiti System CCTV Dome Camera Will view up to 4 zones set by „pencil thin laser detection beam
  • 45. Reference example - On going project - Virtual gates at High Security SiteApplication:To create a virtual gate in conjunction with anaccess control system to authorize access
  • 46. Reference example - On going project - Vehicle DetectionApplication:Redscan can detect vehicles only as theyapproach gates, facilities or parking areasand ignore people
  • 47. Reference example - On going project - Indoor Ceiling protection of offices and warehouseApplication:To detect intrusion through ceiling or roof inoffices and warehouse.
  • 48. Reference example - On going project - Security and Safety on Underground railwayApplication:To detect people or packages falling ontorailway tracks or attempts to enter the tunnel
  • 49. Reference example - On going project - Perimeter protection for Prison Application: Protection of perimeter of the boundary to prevent break out of prison.
  • 50. Application example - On going project - Roof protection for Cash Transit Company 65ft. / 20m 131ft. / 40m
  • 51. Reference example - On going project - Protection from damage to planes in hangersApplication: Talon Air maintains a secure area forworkers to move while providing a unique alarm systemfor possible damage to the planes while getting towedinto the hanger. In addition, it provides their customersvalue added safety measures that protect their planes.
  • 52. Two laser scannersfor each front andback side of thehanger, horizontallymounted to create a“virtual curtain”
  • 53. Virtual curtain fromthe outside: Even ifdoors stay open, anyunauthorised accesswill be detected.
  • 54. Separatecompartments withinthe hanger, made of Top-view,virtual curtains allow inside thefor tight asset hangersecurity.
  • 55. Application example - On going project - Building boundary protection for Data center Application: Protection of perimeter of buildings
  • 56. Reference example - On going project - Perimeter protection for VIP conference hall PTZ camera Photo beam REDSCAN Current status: Already the system has been installed and commissioning has been done.
  • 57. Reference example - On going project - Unauthorized access monitoring for Airport Application: To avoid unauthorized access to the inside of secured area from the public area in the airport.
  • 58. Reference example - On going project - VIP House protection Current status: Already the system has been installed and worked well.
  • 59. Reference example - On going project - Left Package Detection Application: To trigger an alarm in the event of a package being left for 30 seconds
  • 60. Reference example - On going project - Art protection for museum in USA Application: Protection of art on walls by REDSCAN with video monitoring, it could be efficient video monitoring and reduce man guard cost.
  • 61. RVR Perimeter Detection without Fence line Customer Requirements: A warehouse storing high value electrical goods wanted high performance detection with short zone lengths for Remote Video Response for the site that did not have a fence line installed Redscan Solutions: Install 19 x Redscan units to create a vertical detection virtual fence line around the perimeter with 15 m zone length interfacing with PTZ and Static cameras and connected to a RVR Monitoring station Benefits of Using Redscan: Redscan can recognize the shape of uneven terrain and create detection area very easily without any gap at the ground level. Very high level of human capture performance whilst it ignores wildlife and has short zones length for precise intruder identification with a PTZ camera Existing Solutions and Problems: Active Infrared Beam – Long zone length or many ugly AIR towers Video Analytics are susceptible to missed activations due to changing lighting / shadows and are expensive 61
  • 62. Railway Crossing Protection Customer Requirements: To provide an alarm for an oncoming train to stop in the event of a person or vehicle being stuck or trapped the crossing when the barriers are lowered Redscan Solutions: Install 2 Redscan and create two layers of detection to cover the crossing area and will detect a person laying down on the tracks or a car stopped on the tracks Integration with PTZ and fixed camera and capture clear picture of the target automatically and send alarm to central control room to stop the train Benefits of Using Redscan: Redscan can be used to create a precise detection area Existing Solutions and Problems: Radar is a very expensive option has problems in detecting small humans and suffers from unreliable detection in harsh weather and not able to set a precise detection pattern 62
  • 63. Digital (TCP/IP) Monitoring System PTZ-Dome Camera Camera view transmitted to NVR via CAT5 cable Camera to pre-set positions via CAT5 cable OPTEX RLS-3060 Laser Detectors ... Camera Output on Screen 192.168.000.001 192.168.000.002 192.168.000.003 192.168.000.254 Alarm-Signal to NVR via CAT-5 Cable switch/router (every 100m) Network Video Recorder (NVR)
  • 64. Analog (Relay Outputs) Monitoring System – 1 PTZ-Dome Camera Camera view transmitted to NVR via CAT5 cable Camera to pre-set positions via CAT5 cable OPTEX RLS-3060 Laser Detectors ... 8 Outputs 8 Outputs 8 Outputs 8 Outputs 8 Outputs Camera Output Alarm Cable (7.02 16-core) on Screen Alarm Input Expansion Alarm Input Expansion Module Module Alarm-Signal to NVR/DVR RS485 Telemetry Cable Network Video Recorder (NVR)
  • 65. Analog (Relay Outputs) Monitoring System – 2 PTZ-Dome Camera 4 Zone-Alarm-Outputs per scanner driving camera to pre-set positions Camera view transmitted to NVR via Coaxial Cable Alarm Cable (7.02 8-core) OPTEX RLS-3060 Laser Detectors ... 4 Outputs 4 Outputs 4 Outputs 4 Outputs 4 Outputs Camera Output Alarm Cable (7.02 8-core) on Screen Alarm Input Expansion Alarm Input Expansion Module Module Alarm-Signal to NVR/DVR RS485 Telemetry Cable Network Video Recorder (NVR)
  • 66. Thank you.
  • 67. AGENDA 13h30 Welcome Drink 14h00 Presentation Sandrine Cocks (OPTEX) >> Outside detection technologies 15h00 Coffee break 15h30 Actual and future access technologies >> Gunnebo Competence Center Francis Deneu 16h30 New Year’s reception
  • 68. AGENDA 13h30 Welcome Drink 14h00 Presentation Sandrine Cocks (OPTEX) >> Outside detection technologies 15h00 Coffee break 15h30 Actual and future access technologies >> Gunnebo Competence Center Francis Deneu 16h30 New Year’s reception
  • 69. Gunnebo New Year Happening Brussels Jan 23 2012
  • 70. Gunnebo – a large pannel for customers & applications Accès Intrusion Supervision Vidéo Gunnebo
  • 71. Focus on :
  • 72. Identification for what ? Site protection Building accès Inside accès Informatique room Work Station access
  • 73. SMI Server typical architecture for access Poste de surveillance Intranet Poste de Postes distants Poste d’exploitationpersonnalisation Infrastructures réseaux du Client SM400 Produits Gunnebo SM10x Identification for persons Identification for vehicle
  • 74. Secure Wave – general architecture SecurInstaller® SecurManager® for configuration and technical maintenance (local & Local serial line (service) management remote) (RS232) RS232-1 Main transmission channel Ethernet ou Ethernet TCP/IP SecurManager® Centrale RS232-2 remote stations Backup transmission channel (RTC / RNIS) RS232-5 Audio I2C et Remote monitoring I2C RS232-2 station (or Ethernet) caméras RS485-1&2 Echelon4/8/16 mic For each MIB : - 8 inputs (5 levels) 120  - 1 Tamper Echelon I/O bus 30 MIB modules max - 4 outputs 120  120  2 peripheral busses(RS485) – 2 x 31 equipments max 120 
  • 75. Electronic identification
  • 76. Actual RFID technologies Segmentation by technologies: • Frequencies • RFID Chips orTranspondors • Usages (detection range : Proximity, Vicinity, Mid range , Long Range) 10 KHz 100KHz 1MHz 10 MHz 400 MHz 900 MHz 10Ghz Transpondeurs passifs Transpondeurs actifs (ou passifs) communications en champ proche communications longues distances 125 KHz 134 KHz 3,25 MHz 13,56 MHz 433,92 MHz 868 MHz 2,45 GHz 5,8 GHz Basses fréquences Hautes Fréquences Ultra Hautes fréquences Hyper fréquences Bande 100- 500 KHz Bande 10 à- 100 MHz Bande UHF Bande 1GHz à 10GHz 850 - 950 MHz
  • 77. Application en CA: architecture type SMI Server Poste de surveillance Intranet Poste de Postes distants Poste d’exploitationpersonnalisation Infrastructures réseaux du Client SM400 Produits Gunnebo SM10x Identifications des personnes Identifications des véhicules
  • 78. RFID Standards ISO internationaux MEMORY µP card
  • 79. RF : Radio Fréquence Schéma normatif : L’ISO 18000 ISO 18000-2 ISO 18000-3 ISO 18000-7 ISO 18000-6 ISO 18000-4 ISO 18000-5 Identification animale ISO 14223 ISO 18092 ISO 117845 ISO 15693 (Voisinage) ISO 11784 ISO 14443 ( Proximité) 125 KHz 13,56 MHz 433 MHz 900 MHz 2,45 GHz 5,8 GHz Bande LF Bande HF Ultra Hautes fréquences Bande Hyper 100- 135 KHz 10 à- 100 MHz Bande UHF 1GHz à 10GHz 850 - 950 MHz
  • 80. Contactless smart cards ISO 14 443 part B ISO 14 443 part AGouvernement µProcesseurs GouvernementBank OperatorsHealthcare TransportsTransports Access Control Smart card Multos (*) Smart card BMS2 Smart card CPS3 (*) Mifare® DESFire Smart card Monéo Mifare® DESFire EV1 Smart card Calypso Memory (wirered) Transports Access Control Mifare® Plus Mifare® Classic Fidelity Mifare® UL Ticketing(*) ces cartes sont bi protocoleISO 14443 part A et part B
  • 81. Mifare® range Mifare® Plus Mifare®Stockage DESFire EV1Taille mémoire 2Ko, 4Ko 2Ko, 4Ko, 8KoStructure de la Fixe: Flexible :mémoire Secteurs, blocs fichiersFonctions d’accès MAD1, MAD2 MAD3Lecture/écriture Compteurs,et Multi Bloc Fichiers d’historiqueAutres fonctionsStandard ISO14443A-3 et -4 ISO14443A-4Composants Logique câblée µ ProcesseurCrypto embarquée Mifare® Classic Mifare® Plus Mifare® DESFire EV1Crypto1 Oui Oui (level 1, 2) NonDES, 3DES, Non Non Oui3K3DESAES Non Oui (level 2,3) OuiN° SérieUID (Tag) 4 octets (32b) 4 ou 7 octets 4 ou7 octets
  • 82. Biometric readers (finger print) Identification 1:3000 (ou 1:5000) Authentification 1:1 Badges Mifare® Classic & DESFireIdentification 1:500Authentification 1:1Badges Mifare® Classic & DESFire Identification 1:500 (ou 1:3000) Authentification 1:1 Badges Mifare® Classic & DESFire
  • 83. IDLock equipements for doors Plaque béquille Intégration Autonome niveau Concentrateur d’accès Plaque béquille Wireless Cylindres autonomes Dispo en 2011 partir de 2012/2013
  • 84. Focus on :
  • 85. Securuty triptych Risk & threat Technical solutions Organisational solution Security management: Identity managment  Security application Best practices Equipments Access cards
  • 86. Security level consideration for RFID Risk level ID Management & Sécurité des accès Identification physiques & logiques sécurisée & Identifications multiples Simple Identification Lecture de données Lecture de données Simple lecture d’un sécurisées par clés sécurisées par clés support d’accès d’accès & cryptages d’identification des données Sécurité électronique Pas de mise en place de Mise en place d’une stratégie de sûreté stratégie de sûreté
  • 87. More applications in the smart card Identification, accès aux locaux Carte multi-applications Gunnebo Authentification biométrique (Emp digitales) Accès autonomes
  • 88. Multiple application using Mifare® Classic & DESFire smartcards Mifare Classic 4Ko ® Mifare DESFire ® Data blocs structure Data files structure Secteur O MAD Master file (Root) SMI ID Secteur a, Bloc 0 (Identification) Secteur a, Bloc 1 Tag sécurisé Secteur a, Bloc 2 Applications Secteur a, Bloc 3 SMI ID SMI Bio Secteur b, Bloc 0 Informations Code ID (Authentification ) Secteur b, Bloc 1 biométriques Biométrie 1:1 Secteur b, Bloc 2 Secteur b, Bloc 3 SMI Bio Informations Biométriques SMI IDLock Secteur c, Bloc Données 0 Accès Secteur c, Bloc IDLock 1 SMI IDLock autonomes Secteur c, Bloc 2 Secteur c, Bloc 3 Données IDLock Secteur d, Bloc 0 Autres Informations Autres Other application Secteur d, Bloc Données 1 Secteur d, Bloc 2 Secteur d, Bloc 3 Autres données
  • 89. SMI-Server & « Mifare®» SMI SMI SMI+ Identification + IDLockType de badge CA BIOMifare® UL Lecture TAG NON NONMifare® 1KC Lecture TAG OUI Nous consulter Lecture Mifare®sécuriséMifare® 4KC Lecture TAG OUI OUI Lecture Mifare® sécuriséMifare® Plus Lecture TAG NON NONMifare® DESFire Lecture TAG NON Nous consulter (Bio ADP uniquement)Mifare® DESFire EV1 Lecture TAG OUI OUI Lecture fichier (*) (**) (*) (*) SMI V2-4 ( et +) (**) Lecteur bio compatibles DESFire EV1
  • 90. New solutions pour la biométrie New MA terminal VP série MA facial série ( L1) New SDK Q1/2012 New product 2013
  • 91. Choix des technologies  Comparaison (*) des techniques biométriques les plus utilisées en fonctions des coûts et du niveau deCosts sécurité recherché . Hand geometry Iris Sign Retin Face recognition Finger vein Fingerprint Voice (*) ICB source Niveau de sécurité
  • 92. Criteria & positionning New FV
  • 93. Données techniques & comparaisons Empreintes digitales Iris Facial Incapacité denrôler 0.1% 1 à 2% 0% Acceptés par défaut 0.01% 0.0001% 1% Refusés par défauts 0,50% 0,20% 2-10% New FV Increase accuracy Reduce the non enrôlment case La probabilité pour que deux iris différents donnent le même Iris Code est de 1 sur 1052. Il faut environ un quart de seconde pour localiser liris et une seconde pour générer le code correspondant
  • 94. Facteurs d’acceptation IBG international© Effort : effort requis par lutilisateur Intrusiveness : niveau de perception par lutilisateur du test comme intrusif Cost : coût de la technologie (lecteurs, capteurs, etc...) Accuracy : efficacité de la méthode (capacité à identifier quelquun)
  • 95. Conclusion Q/A
  • 96. Merci de votre attention
  • 97. AGENDA 13h30 Welcome Drink 14h00 Presentation Sandrine Cocks (OPTEX) >> Outside detection technologies 15h00 Coffee break 15h30 Actual and future access technologies >> Gunnebo Competence Center Francis Deneu 16h30 New Year’s reception
  • 98. Thank you

×