POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
RFID Access Control System March, 2003 Softrónica.
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
Adding SMS functionality to WhatsUp Gold
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Static Transfer Switch
Model W Wall Mount Static Transfer Switch. Why choose a model W static transfer switch? Increases power availability. Integrated maintenance bypass. True.
A new Network Concept for transporting and storing digital video…………
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
January 2005 An Introduction to Entro 5 The Access Security Group.
BioScrypt (OVP) 4G Lite Series
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
System Components Hardware overview for Apollo ACS.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
Certificate and Key Storage Tokens and Software
Intelligent Pharmaceutical Packaging Electronic Data Capturing system to improve data quality and cut time in clinical trials with unparalleled cost efficiency.
GV-Control Center Overview
G4 Control and Management Solution for Data- Centers and Computer Rooms.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
Information Security for Managers (Master MIS)
January 2005 Bewator Entro 5 An introduction.
Number Five Software One provider Multiple Solutions professional card design software The most flexible and powerful solution for card issuing! The best.
Truly Powerful. Flexibility, Scalability, Reliability User Friendly Software  Predefined parameters  Scaled down for easy admin  Personalised reporting.
10 February Doors Software Overview. 10 February This presentation is an overview of the basic fundamentals of the Doors software. –Host computer.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Module 7: Fundamentals of Administering Windows Server 2008.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Additional Security Tools Lesson 15. Skills Matrix.
1 NexSentry Command Center Powerful security management system with UNIX server and Windows NT 4 Operator Stations.
Use it, Interconnect it, AutoMate IT™ ( Based on the FlexiMax 9000 Technology)
Module 9: Fundamentals of Securing Network Communication.
SMS Module Model : SB-DN-SMS/IP Configuration of SMS Module.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
1 ARC reporting ARCCerny Verze INTERNET ARC events reporting Control panel 3. PSTN Telephone network - CID 1. GSM network – GPRS IP CID.
Communications & Networks National 4 & 5 Computing Science.
HDL-MGSM.431. Description MGSM.431 is an automation module based on GSM monitoring and controlling. Being at a great distance you can operate a target.
New product introduction:
verifone HQtm Estate Management Solution
1. 2 A scalable, feature-rich VMS solution, delivers enterprise- level performance along with freedom of choice, enabling system customization and compatibility.
SEMINAR ON P.L.C. SUBMITTED BY HRIDAY MUKHERJEE AMIT DEBNATH SOMNATH SHIL
Remote monitoring solutions to protect mission critical infrastructures Remote monitoring and control solutions to guard your mission-critical IT equipment.
Introducing VAX: Vicon’s New Access Control System.
Component 8/Unit 1bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical.
Serial / Ethernet Converter - IE-CS-2TX-XRS232/485
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
COSEC ARC IP based Access Control Panel.
Maintain, Manage And Monitor Outdoor Systems Remotely
A scalable, feature-rich VMS solution, delivers enterprise-level performance along with freedom of choice, enabling system customization and compatibility.
Study course: “Computing clusters, grids and clouds” Andrey Y. Shevel
The Client/Server Database Environment
Solutions: Backup & Restore
IP-AK2 Access Control Solution
Wavestore Integrates…
An Introduction to Computer Networking
Chapter 8: Monitoring the Network
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Module 2 OBJECTIVE 14: Compare various security mechanisms.
2N Access Unit 2.0 Multi-technology access control readers.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system

Balancing securtiy, cost and convenience Security Advanced encryption Copying PIN eaves- dropping Convenience Easy to use Contact-less Mobility X X = target position Cost Card Reader System integration

Securing the PIN A typical PC is not secure PIN/Passwords entered from the computer's keyboard are easily intercepted by Trojans Information stored as files on a computer’s hard disc is easily copied by Trojans Keys must be stored outside the computer PINs must be entered on a device outside the computer Cryptographic operations must be performed outside the computer

Today - security, cost or convenience Smart Cards Security: Need advanced external keypad reader to secure PIN over the Internet Cost: Expensive keypad readers Convenience: Sensitive, not for outdoor use RFID / Proximity cards Security: Information can be read out remotely and needs advanced external keypad reader to secure PIN over the Internet. Cost: Expensive readers Convenience: Robust, contact-less and convenient

Combining security, cost and convenience + Smart Card Intelligent and high security, can not be read out remotely Large data storage + RFID Card Contact-less + Keypad reader Prevents PIN interception PIN-on-Card

Introducing the PIN-on-Card (POC) Highest level of security Security resides on the card, not reader or system 128-bit AES ( RSA, 3DES ) PIN never leaves the card Secure data storage (32 kBytes) Low cost Robust cards and readers, no slot, no moving parts Low cost for readers High convenience One card - multiple systems/functionality Contact-less High level of automation

POC Security System - for interoperability PIN-on-Card (POC) POC Wall reader POC Desktop reader Physical I/O Ethernet TCP/IP LonWorks FTT-10 GSM/SMS/GPRS X10 RS232+485 POC Controller Client PC COM/ActiveX TCP/IP POC Server software SNMP COM/ActiveX SQL ODBC POC Management software COM/ActiveX XML

Core features of POC Security System “Virtual” Access Control The POC is used to login to programs and services “Physical” Access Control The POC is used to open doors, control alarms etc. Alarms Integration of burglar, fire and duress alarms Control and system interoperability Control and integration to third-party systems Programmable Logic Control (PLC) Very flexible configuration options Remote system administration The system can be securely managed and monitored remotely Off line operation Full security even when not connected to a PC

Typical system setup WorkstationPOC reader LAN TCP/IP Network Server application and Database LonWorks Network LonMark Nodes POC Controller 2 POC readers POC Controller POC reader WorkstationPOC reader GSM GSM LonWorks Network POC Cont. POC Cont. X 10 Powerline comm. POC Cont. POC reader X 10 node X 10 node

POC Controller unit features Highly integrated, multi-functional control unit Functional logic fully programmable 6 Alarm monitoring inputs with fault detection for standard alarm sensors 5 Control outputs for lock strikes, indicators etc. Connects to 2 wall mounted POC readers Integrated Abloy 8164 NetLock interface Integrated Ethernet interface Integrated FT/10 LonWorks® field bus Integrated X10 interface Integrated GSM/GPRS module for SMS messaging and host communication Integrated backup power - up to 60 hours

POC Security System Management Software Fully programmable in a Programmable Logic Control (PLC) like manner, gives a very high degree of flexibility System- and card management is also secured with a PIN-on-Card Full system security and integrity, even when operated over the Internet COM Component based, enables third-party extensions SNMP extension agent allows system monitoring within existing network management tools

Remote system administration System administration rights are verified with a PIN-on-Card Strong authentication allows secure system administration, even over the Internet. Events and alarms can be received as SMS Events can be monitored with SNMP without affecting system security

Programmable Logic Control (PLC) The POC Controller can be viewed as a large switch matrix Complex functions and dependencies are fully programmable and can be finely tuned Inputs and access control status together with tools as logic expressions, timers and flip-flops can control the full behavior of the system SMS, LonWorks® SNVTs and X10 can also used as control terms

System Interoperability POC Security System seamlessly integrates with LonWorks® installations through Standard Network Variable Types (SNVTs) Direct interfacing between POC Security System and components from 100+ third-party vendors The integrity of the security system is maintained Information about access control and alarm status can affect the rules for the Building Automation (BA) system Information in the BA system can affect the rules for the access control and alarm system

Conclusion Strong identity and audit trail throughout the system One system/control unit for overall security needs One system/control unit provides cost effective infrastructure and administration One card for all needs Combining high security, low cost and high convenience Security Conven- ience X Cost X = POC Security System