SNCB-NMBS NEW YEARS     HAPPENING     26 Januari 2012
AGENDA 13h30   Welcome Drink 14h00   Presentation Sandrine Cocks (OPTEX)          >> Outside detection technologies 15h00 ...
WELCOME TO THE            OPTEXIntrusion Detection Solutions        26th January 2012 New Year Celebration 2012       With...
OPTEX Group       (1)                                              OPTEX(DONGGUAN) CO., LTD.       (2)                    ...
OPTEX Technology                                                        Security                                          ...
OPTEX Group History    1979   Established in Japan    1980   Developed worlds first infrared detector for automatic door  ...
Optex Business Domain                        7
OPTEX Layer Protection Concept   Layer 3             Facility             Protection REDSCAN                              ...
OPTEX Brand Familiy                      Security Solutions      “blue brand”           “red brand”          “grey brand” ...
REDWALL Product Line-Up            Passive and Active Infra Red and Laser Detection Systems                               ...
REDWALL Product Line-Up                                       L                          ◇ Brand known as The Best High Re...
REDWALL Product Line-Up                          REDSCAN Laser Detector                                                   12
Product overview       Laser Scan detector RLS-3060 utilises „Time of Flight‟        technology.       RLS-3060 does not...
Features of RLS-3060        30m radius for 190 degrees        Vertical and horizontal detection area        Unique dete...
Detection principle                                                                       Time of Flight (TOF) method     ...
Detection areas                  REDSCAN, RLS-3060 can be installed vertically                  and horizontally. Therefor...
CCTV Convergence: PTZ Dome with the Laser Scan DetectorLaser scan detector can identifyhuman location in the detection ar...
Benefits of Redscan detector  REDSCAN detector has 190 degree detection area. Therefore,          No dead spot detection ...
Detection areas setting – Detection area      H1                                    Horizontal detection area             ...
DSCAN MANAGER (PC SETUP software)     REDSCAN                             PC    Ethernet port(RJ-45)             Visualiz...
Redscan technologies ・Area   masking  Activate after 60seconds if 50% or more detection area will be changed to less than ...
Redscan technologies ・Fog Cancellation function   Our special algorism allow to detect human even in fog situation. (Paten...
Advantage for Installation REDSCAN can refresh the ground shape automatically every hour for changes in snow or vegetation...
Advantage for Installation The REDSCAN automatically detects and learns the contours of the ground wherever you install!!,...
Advantage for Installation REDSCAN can be installed at an angle to a wall, reducing installing cost dramatically!!It is no...
Advantage for Installation   Revolution of installation!! REDSCAN can make detection area whatever you want.   It‟s one of...
Applications    Electric substation
Applications       Perimeter surveillance with PTZ camera                                           B2                    ...
Applications - Prisons     Perimeter surveillance with vertical detection area
Vertical Application
Vertical Application  Any attempt to climbover or enter through the    fence rails will be         detected
Vertical Application
Vertical Application                    Any attempt to climb                  over or enter through the                   ...
Angled Application
Angled ApplicationRedscan can be mountedat an angle to extenddetection area inside, oroutside main perimeterwith multiple ...
Advantage for Installation  Perimeter surveillance for Narrow boundary!!   REDSCAN  can installed in a narrow boundary zone.
Advantage for Installation   Early detection for fence lines!! REDSCAN can detect a person: Lifting,   Climbing or Cutting...
Application example for REDSCANBuilding surface protection   Roof protection
Reference example - On going project -             Facility protection for Utility company in USA Application: Activation ...
Reference example - On going project -          Perimeter protection for Nuclear Power Plant   Application:               ...
Reference example - On going project -   Multi Client Data Center server              protectionApplication:Redscan detect...
Reference example - On going project -      Railroad safety applicationApplication:Redscan detects people and vehicles inr...
Anti Graffiti System                       High Mounted detector                       4 -10 meters                       ...
Anti Graffiti System                       CCTV Dome Camera                       Will view up to 4 zones                 ...
Reference example - On going project -   Virtual gates at High Security SiteApplication:To create a virtual gate in conjun...
Reference example - On going project -               Vehicle DetectionApplication:Redscan can detect vehicles only as they...
Reference example - On going project -   Indoor Ceiling protection of offices            and warehouseApplication:To detec...
Reference example - On going project - Security and Safety on Underground               railwayApplication:To detect peopl...
Reference example - On going project -        Perimeter protection for Prison    Application:    Protection of perimeter o...
Application example - On going project - Roof protection for Cash Transit Company                          65ft. /        ...
Reference example - On going project - Protection from damage to planes in               hangersApplication: Talon Air mai...
Two laser scannersfor each front andback side of thehanger, horizontallymounted to create a“virtual curtain”
Virtual curtain fromthe outside: Even ifdoors stay open, anyunauthorised accesswill be detected.
Separatecompartments withinthe hanger, made of      Top-view,virtual curtains allow   inside thefor tight asset          h...
Application example - On going project -   Building boundary protection for Data center       Application:       Protectio...
Reference example - On going project -      Perimeter protection for VIP conference hall                                  ...
Reference example - On going project -        Unauthorized access monitoring for Airport         Application:         To a...
Reference example - On going project -  VIP House protection  Current status:  Already the system has been installed and w...
Reference example - On going project -  Left Package Detection  Application: To trigger an alarm in the event of a package...
Reference example - On going project -        Art protection for museum in USA Application: Protection of art on walls by ...
RVR Perimeter Detection without Fence line Customer Requirements: A warehouse storing high value electrical goods wanted h...
Railway Crossing Protection Customer Requirements: To provide an alarm for an oncoming train to stop in the event of a per...
Digital (TCP/IP) Monitoring System                                                                PTZ-Dome Camera         ...
Analog (Relay Outputs) Monitoring System – 1                                                                         PTZ-D...
Analog (Relay Outputs) Monitoring System – 2                                                                         PTZ-D...
Thank you.
AGENDA 13h30   Welcome Drink 14h00   Presentation Sandrine Cocks (OPTEX)          >> Outside detection technologies 15h00 ...
AGENDA 13h30   Welcome Drink 14h00   Presentation Sandrine Cocks (OPTEX)          >> Outside detection technologies 15h00 ...
Gunnebo New Year Happening Brussels              Jan 23 2012
Gunnebo – a large pannel for customers & applications            Accès                    Intrusion                       ...
Focus on :
Identification for what ?  Site protection                      Building accès                               Inside accès ...
SMI Server typical architecture for access                   Poste de surveillance                                        ...
Secure Wave – general architecture                                                                                        ...
Electronic identification
Actual RFID technologies Segmentation by technologies:     •     Frequencies     •     RFID Chips orTranspondors     •    ...
Application en CA: architecture type SMI Server                   Poste de surveillance                                   ...
RFID       Standards ISO       internationaux                  MEMORY   µP                  card
RF : Radio Fréquence Schéma normatif : L’ISO 18000         ISO 18000-2            ISO 18000-3          ISO 18000-7        ...
Contactless smart cards           ISO 14 443 part B                                  ISO 14 443 part AGouvernement        ...
Mifare® range                       Mifare® Plus           Mifare®Stockage                                    DESFire EV1T...
Biometric readers (finger print)                                                  Identification 1:3000 (ou 1:5000)       ...
IDLock   equipements for doors                        Plaque béquille                           Intégration               ...
Focus on :
Securuty triptych                               Risk & threat         Technical solutions                   Organisational...
Security level consideration for RFID                                                                                  Ris...
More applications in the smart card         Identification,         accès aux locaux                                      ...
Multiple application using Mifare® Classic & DESFire smartcards                 Mifare Classic 4Ko                        ...
SMI-Server & « Mifare®»                       SMI                         SMI                    SMI+                     ...
New solutions pour la biométrie                    New MA terminal                        VP série                        ...
Choix des technologies                                                        Comparaison (*) des techniques             ...
Criteria & positionning                 New FV
Données techniques & comparaisons                                 Empreintes digitales             Iris             Facial...
Facteurs d’acceptation           IBG international©                                Effort : effort requis par lutilisateur...
Conclusion   Q/A
Merci de votre attention
AGENDA 13h30   Welcome Drink 14h00   Presentation Sandrine Cocks (OPTEX)          >> Outside detection technologies 15h00 ...
Thank you
26.01.2012 Presentation NMBS Day
26.01.2012 Presentation NMBS Day
Upcoming SlideShare
Loading in …5
×

26.01.2012 Presentation NMBS Day

1,480 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,480
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

26.01.2012 Presentation NMBS Day

  1. 1. SNCB-NMBS NEW YEARS HAPPENING 26 Januari 2012
  2. 2. AGENDA 13h30 Welcome Drink 14h00 Presentation Sandrine Cocks (OPTEX) >> Outside detection technologies 15h00 Coffee break 15h30 Actual and future access technologies >> Gunnebo Competence Center Francis Deneu 16h30 New Year’s reception
  3. 3. WELCOME TO THE OPTEXIntrusion Detection Solutions 26th January 2012 New Year Celebration 2012 With Gunnebo
  4. 4. OPTEX Group (1) OPTEX(DONGGUAN) CO., LTD. (2) OPTEX TECHNOLOGIES INC. EAST COAST OFFICE OPTEX DUBAI BRANCH (3) OPTEX-FIBERSENSYS (4) OPTEX CO.,LTD. OPTEX KOREA CO.,LTD. (5) OPTEX INCORPORATED OPTEX SECURITY SP Z.O.O. OPTEX ELECTRONICS (TAIWAN),LTD. OPTEX TECHNOLOGIES INC. OPTEX SECURITY SAS (6) OPTEX (H.K.),LTD. SECUMATIC B.V. OPTEX (EUROPE),LTD. Employees world-wide: 1100 (7) Net Sales in 2010: YEN 17.4 Billion ( EUR 150 FARSIGHT SECURITY SERVICES LTD. Mio)  15% growth Net Sales in 2011 YEN 20.4 Billion (forecast; EUR 175 Mio)  17% growth (8)
  5. 5. OPTEX Technology Security Application Communications technology Entrance control Application Far Infrared Ray Recording (FIR) Infrared Imaging-related Factory Automation technology technology Application Near Infrared Ray (NIR) Analysis Environment Protection Control Application Technology Safety Transportation processing Application OPTEX Core Technology=Sensing Technology 5
  6. 6. OPTEX Group History 1979 Established in Japan 1980 Developed worlds first infrared detector for automatic door Launched security sensor for Japan domestic market 1985 Established OPTEX (USA),INC in California, USA 1986 Start sales in UK through distributor 1991 Established OPTEX (EUROPE) LTD Open stock to public market in Japan 2001 Went on Tokyo stock exchange market section 2 OPTEX(EUROPE),LTD. acquired Security Enclosures Ltd. in UK 2003 Went on Tokyo stock exchange market section 1 Acquired Farsight Security Service Ltd in UK Established OPTEX Korea Co. Ltd, Korea Established OPTEX Security Sp.z.o.o., Warsaw, Poland 2010 Acquired FIBERSENSYS in Portland, USA 2011 Established OPTEX (EUROPE) Branch Office in Dubai, UAE 6
  7. 7. Optex Business Domain 7
  8. 8. OPTEX Layer Protection Concept Layer 3 Facility Protection REDSCAN t Camera Layer 0 Layer 2 Outside Perimeter Outdoor Field Zone Layer 1 Perimeter Line REDSCAN REDSCAN & PTZ Camera SIP 8
  9. 9. OPTEX Brand Familiy Security Solutions “blue brand” “red brand” “grey brand” Commercial & High End Infrared Fiber-Optic Detection Housing Detection Systems Systems
  10. 10. REDWALL Product Line-Up Passive and Active Infra Red and Laser Detection Systems 10
  11. 11. REDWALL Product Line-Up L ◇ Brand known as The Best High Reliability ◇ No.1 Market Share in UK ◇ 350,000 Detectors are working today ◇ Strong Sales & Technical Support Team 11
  12. 12. REDWALL Product Line-Up REDSCAN Laser Detector 12
  13. 13. Product overview  Laser Scan detector RLS-3060 utilises „Time of Flight‟ technology.  RLS-3060 does not require any PC for operation. It can be connected to PTZ camera, video transmitter or DVR.  RLS-3060 has 4 or 8 detection area segments and linked outputs. It can match PTZ control applications.  RLS-3060 can recognize the size, speed and distance of objects within the 30M range. Processing with our detection algorithm, it recognize human targets and avoids false alarm factors.
  14. 14. Features of RLS-3060  30m radius for 190 degrees  Vertical and horizontal detection area  Unique detection algorithm  4 or 8 independently adjustable detection areas for PTZ camera control with TCP/IP output  Four independent N.O. Relay outputs  Form C master alarm output  Automatic area setting function  Environmental disqualification circuit  Trouble output  Tamper output
  15. 15. Detection principle Time of Flight (TOF) method By calculating the time during Scanning mechanism which a emitted beam returns after hitting the object, the distance to the object can be RX optic TX optic measured. ADD LD Signal processing Sensing resolution = 0.25 degree At 30m distance, detection width is only 13cm. Redscan is sampling every 0.25 degree. It means that Redscan protects 180 degree area with 720 beams and 190 degree area with 760 beams. Size of beam spot is approx 20cm distance at 30m
  16. 16. Detection areas REDSCAN, RLS-3060 can be installed vertically and horizontally. Therefore, its can make horizontal and vertical detection area. Detection range is 100ft. (30m) radius, 190 degree.
  17. 17. CCTV Convergence: PTZ Dome with the Laser Scan DetectorLaser scan detector can identifyhuman location in the detection area.Utilizing the location information fromthe detector, PTZ camera can becontrolled to capture the human.Combination of PTZ camera and Laserscan detector can be ideal solution forefficient video surveillance.
  18. 18. Benefits of Redscan detector REDSCAN detector has 190 degree detection area. Therefore,  No dead spot detection area setting  Very flexible detection area setting  Very precise detection area setting REDSCAN has capability to recognize the intrusion location and 4 or 8 detection area segments and linked output. Therefore,  Best match for PTZ camera preset controlConventional PIR Laser Scan SensorHorizontal detection area Horizontal detection area Vertical detection area
  19. 19. Detection areas setting – Detection area H1 Horizontal detection area 190 “H1” mode degree The unit can cover 30m x 1m detection range just for perimeter protection. “H2” mode H2 The unit can cover 30m radius 190 degree arc wide area 190 degreeSuggestedInstallation Vertical detection areaHeight 4m “V”mode V It can cover approx 60m maximum Ground detection area spread that functions like an invisible wall. Alternatively the 190 degree detection area can be matched to an existing wall or fence thus providing early warning of intrusion.
  20. 20. DSCAN MANAGER (PC SETUP software) REDSCAN PC Ethernet port(RJ-45)  Visualized detection area  Easy detection area setting on PC software  Other detector setting on PC software
  21. 21. Redscan technologies ・Area masking Activate after 60seconds if 50% or more detection area will be changed to less than 30cm from the unit. ・Area rotating Activate after 300seconds if 30% or more detection area will be changed ・Sensor trouble Activate if there are something wrong for the Laser power or the motor spin.
  22. 22. Redscan technologies ・Fog Cancellation function Our special algorism allow to detect human even in fog situation. (Patent pending) Video ・DQ output Acts as early warning system and triggers when visibility is reduced to 150m. Unit is stable to 30m actual visibility
  23. 23. Advantage for Installation REDSCAN can refresh the ground shape automatically every hour for changes in snow or vegetation growth. Auto Refresh area learning REDSCAN automatically adjusts for environmental changes. (When the Auto mode switch P2 selected. If P1 position selected, detection area is fixed.)
  24. 24. Advantage for Installation The REDSCAN automatically detects and learns the contours of the ground wherever you install!!, even for uneven ground. REDSCAN Ex. Active photo beam 60m 60m REDSCAN saves time for design & installation and therefore costs.
  25. 25. Advantage for Installation REDSCAN can be installed at an angle to a wall, reducing installing cost dramatically!!It is not necessity to install sensors with fenceline for perimeter security. REDSCAN willbring a new installation design to save timeand cost.
  26. 26. Advantage for Installation Revolution of installation!! REDSCAN can make detection area whatever you want. It‟s one of headache for installers to make detection area whatever they want, however REDSCAN make it quite easy.
  27. 27. Applications Electric substation
  28. 28. Applications Perimeter surveillance with PTZ camera B2 B1 A1 A2H1 mode makes narrow detection area justfor perimeter protection.
  29. 29. Applications - Prisons Perimeter surveillance with vertical detection area
  30. 30. Vertical Application
  31. 31. Vertical Application Any attempt to climbover or enter through the fence rails will be detected
  32. 32. Vertical Application
  33. 33. Vertical Application Any attempt to climb over or enter through the fence rails will be detected Each detector will output up to eight separate alarm outputs via IP for integration into camera presets for rapid alarm verification
  34. 34. Angled Application
  35. 35. Angled ApplicationRedscan can be mountedat an angle to extenddetection area inside, oroutside main perimeterwith multiple detectionzones
  36. 36. Advantage for Installation Perimeter surveillance for Narrow boundary!! REDSCAN can installed in a narrow boundary zone.
  37. 37. Advantage for Installation Early detection for fence lines!! REDSCAN can detect a person: Lifting, Climbing or Cutting fences Normally it‟s difficult to create detection areas outside of fence lines, however REDSCAN can do that.
  38. 38. Application example for REDSCANBuilding surface protection Roof protection
  39. 39. Reference example - On going project - Facility protection for Utility company in USA Application: Activation of a sprayer of red dye in event of attempted graffiti on doors
  40. 40. Reference example - On going project - Perimeter protection for Nuclear Power Plant Application: Current status: Protection over fence to avoid to break pumping facility. 3 on going project in the world as test stage.
  41. 41. Reference example - On going project - Multi Client Data Center server protectionApplication:Redscan detects people from one clientattempting to sabotage another clients server– On going project in USA
  42. 42. Reference example - On going project - Railroad safety applicationApplication:Redscan detects people and vehicles inrailroad crossing to support the person whooperate the crossing gate. CROSSING CLEAR CRSSING OBSTRUCTED
  43. 43. Anti Graffiti System High Mounted detector 4 -10 meters Preset Dome Camera will view zone when breached – unaffected by passing train 4 Addressable Zones
  44. 44. Anti Graffiti System CCTV Dome Camera Will view up to 4 zones set by „pencil thin laser detection beam
  45. 45. Reference example - On going project - Virtual gates at High Security SiteApplication:To create a virtual gate in conjunction with anaccess control system to authorize access
  46. 46. Reference example - On going project - Vehicle DetectionApplication:Redscan can detect vehicles only as theyapproach gates, facilities or parking areasand ignore people
  47. 47. Reference example - On going project - Indoor Ceiling protection of offices and warehouseApplication:To detect intrusion through ceiling or roof inoffices and warehouse.
  48. 48. Reference example - On going project - Security and Safety on Underground railwayApplication:To detect people or packages falling ontorailway tracks or attempts to enter the tunnel
  49. 49. Reference example - On going project - Perimeter protection for Prison Application: Protection of perimeter of the boundary to prevent break out of prison.
  50. 50. Application example - On going project - Roof protection for Cash Transit Company 65ft. / 20m 131ft. / 40m
  51. 51. Reference example - On going project - Protection from damage to planes in hangersApplication: Talon Air maintains a secure area forworkers to move while providing a unique alarm systemfor possible damage to the planes while getting towedinto the hanger. In addition, it provides their customersvalue added safety measures that protect their planes.
  52. 52. Two laser scannersfor each front andback side of thehanger, horizontallymounted to create a“virtual curtain”
  53. 53. Virtual curtain fromthe outside: Even ifdoors stay open, anyunauthorised accesswill be detected.
  54. 54. Separatecompartments withinthe hanger, made of Top-view,virtual curtains allow inside thefor tight asset hangersecurity.
  55. 55. Application example - On going project - Building boundary protection for Data center Application: Protection of perimeter of buildings
  56. 56. Reference example - On going project - Perimeter protection for VIP conference hall PTZ camera Photo beam REDSCAN Current status: Already the system has been installed and commissioning has been done.
  57. 57. Reference example - On going project - Unauthorized access monitoring for Airport Application: To avoid unauthorized access to the inside of secured area from the public area in the airport.
  58. 58. Reference example - On going project - VIP House protection Current status: Already the system has been installed and worked well.
  59. 59. Reference example - On going project - Left Package Detection Application: To trigger an alarm in the event of a package being left for 30 seconds
  60. 60. Reference example - On going project - Art protection for museum in USA Application: Protection of art on walls by REDSCAN with video monitoring, it could be efficient video monitoring and reduce man guard cost.
  61. 61. RVR Perimeter Detection without Fence line Customer Requirements: A warehouse storing high value electrical goods wanted high performance detection with short zone lengths for Remote Video Response for the site that did not have a fence line installed Redscan Solutions: Install 19 x Redscan units to create a vertical detection virtual fence line around the perimeter with 15 m zone length interfacing with PTZ and Static cameras and connected to a RVR Monitoring station Benefits of Using Redscan: Redscan can recognize the shape of uneven terrain and create detection area very easily without any gap at the ground level. Very high level of human capture performance whilst it ignores wildlife and has short zones length for precise intruder identification with a PTZ camera Existing Solutions and Problems: Active Infrared Beam – Long zone length or many ugly AIR towers Video Analytics are susceptible to missed activations due to changing lighting / shadows and are expensive 61
  62. 62. Railway Crossing Protection Customer Requirements: To provide an alarm for an oncoming train to stop in the event of a person or vehicle being stuck or trapped the crossing when the barriers are lowered Redscan Solutions: Install 2 Redscan and create two layers of detection to cover the crossing area and will detect a person laying down on the tracks or a car stopped on the tracks Integration with PTZ and fixed camera and capture clear picture of the target automatically and send alarm to central control room to stop the train Benefits of Using Redscan: Redscan can be used to create a precise detection area Existing Solutions and Problems: Radar is a very expensive option has problems in detecting small humans and suffers from unreliable detection in harsh weather and not able to set a precise detection pattern 62
  63. 63. Digital (TCP/IP) Monitoring System PTZ-Dome Camera Camera view transmitted to NVR via CAT5 cable Camera to pre-set positions via CAT5 cable OPTEX RLS-3060 Laser Detectors ... Camera Output on Screen 192.168.000.001 192.168.000.002 192.168.000.003 192.168.000.254 Alarm-Signal to NVR via CAT-5 Cable switch/router (every 100m) Network Video Recorder (NVR)
  64. 64. Analog (Relay Outputs) Monitoring System – 1 PTZ-Dome Camera Camera view transmitted to NVR via CAT5 cable Camera to pre-set positions via CAT5 cable OPTEX RLS-3060 Laser Detectors ... 8 Outputs 8 Outputs 8 Outputs 8 Outputs 8 Outputs Camera Output Alarm Cable (7.02 16-core) on Screen Alarm Input Expansion Alarm Input Expansion Module Module Alarm-Signal to NVR/DVR RS485 Telemetry Cable Network Video Recorder (NVR)
  65. 65. Analog (Relay Outputs) Monitoring System – 2 PTZ-Dome Camera 4 Zone-Alarm-Outputs per scanner driving camera to pre-set positions Camera view transmitted to NVR via Coaxial Cable Alarm Cable (7.02 8-core) OPTEX RLS-3060 Laser Detectors ... 4 Outputs 4 Outputs 4 Outputs 4 Outputs 4 Outputs Camera Output Alarm Cable (7.02 8-core) on Screen Alarm Input Expansion Alarm Input Expansion Module Module Alarm-Signal to NVR/DVR RS485 Telemetry Cable Network Video Recorder (NVR)
  66. 66. Thank you.
  67. 67. AGENDA 13h30 Welcome Drink 14h00 Presentation Sandrine Cocks (OPTEX) >> Outside detection technologies 15h00 Coffee break 15h30 Actual and future access technologies >> Gunnebo Competence Center Francis Deneu 16h30 New Year’s reception
  68. 68. AGENDA 13h30 Welcome Drink 14h00 Presentation Sandrine Cocks (OPTEX) >> Outside detection technologies 15h00 Coffee break 15h30 Actual and future access technologies >> Gunnebo Competence Center Francis Deneu 16h30 New Year’s reception
  69. 69. Gunnebo New Year Happening Brussels Jan 23 2012
  70. 70. Gunnebo – a large pannel for customers & applications Accès Intrusion Supervision Vidéo Gunnebo
  71. 71. Focus on :
  72. 72. Identification for what ? Site protection Building accès Inside accès Informatique room Work Station access
  73. 73. SMI Server typical architecture for access Poste de surveillance Intranet Poste de Postes distants Poste d’exploitationpersonnalisation Infrastructures réseaux du Client SM400 Produits Gunnebo SM10x Identification for persons Identification for vehicle
  74. 74. Secure Wave – general architecture SecurInstaller® SecurManager® for configuration and technical maintenance (local & Local serial line (service) management remote) (RS232) RS232-1 Main transmission channel Ethernet ou Ethernet TCP/IP SecurManager® Centrale RS232-2 remote stations Backup transmission channel (RTC / RNIS) RS232-5 Audio I2C et Remote monitoring I2C RS232-2 station (or Ethernet) caméras RS485-1&2 Echelon4/8/16 mic For each MIB : - 8 inputs (5 levels) 120  - 1 Tamper Echelon I/O bus 30 MIB modules max - 4 outputs 120  120  2 peripheral busses(RS485) – 2 x 31 equipments max 120 
  75. 75. Electronic identification
  76. 76. Actual RFID technologies Segmentation by technologies: • Frequencies • RFID Chips orTranspondors • Usages (detection range : Proximity, Vicinity, Mid range , Long Range) 10 KHz 100KHz 1MHz 10 MHz 400 MHz 900 MHz 10Ghz Transpondeurs passifs Transpondeurs actifs (ou passifs) communications en champ proche communications longues distances 125 KHz 134 KHz 3,25 MHz 13,56 MHz 433,92 MHz 868 MHz 2,45 GHz 5,8 GHz Basses fréquences Hautes Fréquences Ultra Hautes fréquences Hyper fréquences Bande 100- 500 KHz Bande 10 à- 100 MHz Bande UHF Bande 1GHz à 10GHz 850 - 950 MHz
  77. 77. Application en CA: architecture type SMI Server Poste de surveillance Intranet Poste de Postes distants Poste d’exploitationpersonnalisation Infrastructures réseaux du Client SM400 Produits Gunnebo SM10x Identifications des personnes Identifications des véhicules
  78. 78. RFID Standards ISO internationaux MEMORY µP card
  79. 79. RF : Radio Fréquence Schéma normatif : L’ISO 18000 ISO 18000-2 ISO 18000-3 ISO 18000-7 ISO 18000-6 ISO 18000-4 ISO 18000-5 Identification animale ISO 14223 ISO 18092 ISO 117845 ISO 15693 (Voisinage) ISO 11784 ISO 14443 ( Proximité) 125 KHz 13,56 MHz 433 MHz 900 MHz 2,45 GHz 5,8 GHz Bande LF Bande HF Ultra Hautes fréquences Bande Hyper 100- 135 KHz 10 à- 100 MHz Bande UHF 1GHz à 10GHz 850 - 950 MHz
  80. 80. Contactless smart cards ISO 14 443 part B ISO 14 443 part AGouvernement µProcesseurs GouvernementBank OperatorsHealthcare TransportsTransports Access Control Smart card Multos (*) Smart card BMS2 Smart card CPS3 (*) Mifare® DESFire Smart card Monéo Mifare® DESFire EV1 Smart card Calypso Memory (wirered) Transports Access Control Mifare® Plus Mifare® Classic Fidelity Mifare® UL Ticketing(*) ces cartes sont bi protocoleISO 14443 part A et part B
  81. 81. Mifare® range Mifare® Plus Mifare®Stockage DESFire EV1Taille mémoire 2Ko, 4Ko 2Ko, 4Ko, 8KoStructure de la Fixe: Flexible :mémoire Secteurs, blocs fichiersFonctions d’accès MAD1, MAD2 MAD3Lecture/écriture Compteurs,et Multi Bloc Fichiers d’historiqueAutres fonctionsStandard ISO14443A-3 et -4 ISO14443A-4Composants Logique câblée µ ProcesseurCrypto embarquée Mifare® Classic Mifare® Plus Mifare® DESFire EV1Crypto1 Oui Oui (level 1, 2) NonDES, 3DES, Non Non Oui3K3DESAES Non Oui (level 2,3) OuiN° SérieUID (Tag) 4 octets (32b) 4 ou 7 octets 4 ou7 octets
  82. 82. Biometric readers (finger print) Identification 1:3000 (ou 1:5000) Authentification 1:1 Badges Mifare® Classic & DESFireIdentification 1:500Authentification 1:1Badges Mifare® Classic & DESFire Identification 1:500 (ou 1:3000) Authentification 1:1 Badges Mifare® Classic & DESFire
  83. 83. IDLock equipements for doors Plaque béquille Intégration Autonome niveau Concentrateur d’accès Plaque béquille Wireless Cylindres autonomes Dispo en 2011 partir de 2012/2013
  84. 84. Focus on :
  85. 85. Securuty triptych Risk & threat Technical solutions Organisational solution Security management: Identity managment  Security application Best practices Equipments Access cards
  86. 86. Security level consideration for RFID Risk level ID Management & Sécurité des accès Identification physiques & logiques sécurisée & Identifications multiples Simple Identification Lecture de données Lecture de données Simple lecture d’un sécurisées par clés sécurisées par clés support d’accès d’accès & cryptages d’identification des données Sécurité électronique Pas de mise en place de Mise en place d’une stratégie de sûreté stratégie de sûreté
  87. 87. More applications in the smart card Identification, accès aux locaux Carte multi-applications Gunnebo Authentification biométrique (Emp digitales) Accès autonomes
  88. 88. Multiple application using Mifare® Classic & DESFire smartcards Mifare Classic 4Ko ® Mifare DESFire ® Data blocs structure Data files structure Secteur O MAD Master file (Root) SMI ID Secteur a, Bloc 0 (Identification) Secteur a, Bloc 1 Tag sécurisé Secteur a, Bloc 2 Applications Secteur a, Bloc 3 SMI ID SMI Bio Secteur b, Bloc 0 Informations Code ID (Authentification ) Secteur b, Bloc 1 biométriques Biométrie 1:1 Secteur b, Bloc 2 Secteur b, Bloc 3 SMI Bio Informations Biométriques SMI IDLock Secteur c, Bloc Données 0 Accès Secteur c, Bloc IDLock 1 SMI IDLock autonomes Secteur c, Bloc 2 Secteur c, Bloc 3 Données IDLock Secteur d, Bloc 0 Autres Informations Autres Other application Secteur d, Bloc Données 1 Secteur d, Bloc 2 Secteur d, Bloc 3 Autres données
  89. 89. SMI-Server & « Mifare®» SMI SMI SMI+ Identification + IDLockType de badge CA BIOMifare® UL Lecture TAG NON NONMifare® 1KC Lecture TAG OUI Nous consulter Lecture Mifare®sécuriséMifare® 4KC Lecture TAG OUI OUI Lecture Mifare® sécuriséMifare® Plus Lecture TAG NON NONMifare® DESFire Lecture TAG NON Nous consulter (Bio ADP uniquement)Mifare® DESFire EV1 Lecture TAG OUI OUI Lecture fichier (*) (**) (*) (*) SMI V2-4 ( et +) (**) Lecteur bio compatibles DESFire EV1
  90. 90. New solutions pour la biométrie New MA terminal VP série MA facial série ( L1) New SDK Q1/2012 New product 2013
  91. 91. Choix des technologies  Comparaison (*) des techniques biométriques les plus utilisées en fonctions des coûts et du niveau deCosts sécurité recherché . Hand geometry Iris Sign Retin Face recognition Finger vein Fingerprint Voice (*) ICB source Niveau de sécurité
  92. 92. Criteria & positionning New FV
  93. 93. Données techniques & comparaisons Empreintes digitales Iris Facial Incapacité denrôler 0.1% 1 à 2% 0% Acceptés par défaut 0.01% 0.0001% 1% Refusés par défauts 0,50% 0,20% 2-10% New FV Increase accuracy Reduce the non enrôlment case La probabilité pour que deux iris différents donnent le même Iris Code est de 1 sur 1052. Il faut environ un quart de seconde pour localiser liris et une seconde pour générer le code correspondant
  94. 94. Facteurs d’acceptation IBG international© Effort : effort requis par lutilisateur Intrusiveness : niveau de perception par lutilisateur du test comme intrusif Cost : coût de la technologie (lecteurs, capteurs, etc...) Accuracy : efficacité de la méthode (capacité à identifier quelquun)
  95. 95. Conclusion Q/A
  96. 96. Merci de votre attention
  97. 97. AGENDA 13h30 Welcome Drink 14h00 Presentation Sandrine Cocks (OPTEX) >> Outside detection technologies 15h00 Coffee break 15h30 Actual and future access technologies >> Gunnebo Competence Center Francis Deneu 16h30 New Year’s reception
  98. 98. Thank you

×