NSRL MCR-Free Access for NSRL A.Rusek P.Ingrassia J.Reich.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

Easy to use Ability to attach policies/procedures to call types Ability to schedule calls in advance Officer safety alerts Robust search capabilities.
1 of : Multi-Currency Payments / DA0813 Last updated: Project Walkthrough: Multi-Currency Payments Multi-Currency Payments.
Agile Route Shopper Tracker Shopperception: Using a KINECT to build real world Google Analytics.
Microcontrollers Engineering Science. Microcontrollers - Intro Microcontrollers are used in a lot of systems that we use in every day life. Microwaves,
Monitors & Blocking Synchronization 1. Producers & Consumers Problem Two threads that communicate through a shared FIFO queue. These two threads can’t.
Systems Analysis and Design 9th Edition
Systems Analysis and Design 8 th Edition Chapter 3 Managing Systems Projects.
Jump into Release 1 Pepper. Goals for End of Class Project delivery Diagrams (new class & firm state, use, context, sequence) Agile cycles with SCRUM.
Copyright © Blue-Wireless Pty Ltd 2005 SoftBX Windows Mobile™ (Pocket PC) Wi-Fone Training & User Guide for.
Jennifer Goodall, Nick Webb, Katy DeCorah
Chapter 11 - Monitoring Server Performance1 Ch. 11 – Monitoring Server Performance MIS 431 – created Spring 2006.
1 Chapter 8 Designing Small Programs. 2 A ‘Procedure’ v A set of instructions which describe the steps to be followed in order to carry out an activity.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Topics of Discussion:  Introduction  Identify & describe the protocols & processes for: Lockouts Sheltering in Place Lockdown Evacuation  Active Shooter.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
Toolkit 4.
GIF++ ACCESS SYSTEM Dorothea Pfeiffer GIF++ Project Meeting Thanks to: V. Martins De Sousa Dos Rios, D. Vaxelaire, D. Haasler.
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
Hospital Asset Tracking
Use Case Description Hospital Asset Tracking. Introduce the scenario – This scenario prototypes tracking valuable assets leaving the hospital building.
1 Project Control Kathy S. Schwaig. 2 What is Project Control? Project control is the continuous monitoring of the project for deviations from plan (time,
OSF/ISD Project Portfolio Management Framework January 17, 2011.
Micropos MiniTouch Pump Control System The Micropos Pump Control and Convenience Store scanning system will run on any of the Minitouch Series hardware.
Canyon Adventure Technology David Maung, Tristan Reichardt, Dan Bibyk, Juan Roman Department of Computer Science and Engineering The Ohio State University.
Anti-Passback Controlling flow and occupancy. Overview Named after ‘passback’ – passing back a card after going through a door / gate / turnstile FEATURES:
Welcome! Congratulations! You are qualified to participate in Room Selection ! The information contained within these slides will guide you through.
Welcome to the Manage Inventory lesson for the North Carolina Immunization Branch. Contents: Adding Inventory Modifying Inventory Inventory Reports **
3D password Umesh ECE.
Lowe’s Certification and Accreditation.  Systems Boundaries and Functions  Vulnerabilities, Threats, and Threat Sources  Annual Loss Expectancy  Identification.
I A I Infrared Security System and Method US Patent 7,738,008 June How Does It Work? June 2010 I A I = Infrared Applications Inc.
©2009, Tom McKendree Biplanes ©2009, Tom McKendree.
GAME102 - INTRO WHILE LOOPS G. MacKay. Fundamental Control Structures  STRAIGHT LINE  CONDITIONAL  LOOPS.
Reports. Report Summary Warehouse Reports Returned Material Serial Numbers Not Found This report list the serial numbers of material returned which were.
Artificial Intelligence in Game Design Complex Steering Behaviors and Combining Behaviors.
+ WELCOME TO HEALTH Orientation and Overview. + Today we will… Go over classroom expectations Review the grading system and content Introduce the class.
WHAT AM I FORGETTING? project description: As we leave our homes each day, the three most common items we need to bring with us include our keys, wallets.
Staff Training. Synchronized Style Serving All Front of House dinning staff will use hand style serving, otherwise known as synchronized serving, when.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Realtime Robotic Radiation Oncology Brian Murphy 4ECE.
Human Resources 1 G-Top Global Workflow Employee View September 2014.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Week 12 - Wednesday.  What did we talk about last time?  Matching  Stable marriage  Started Euler paths.
KEYS Scott Gajewski ART 389A Spring Contents Premise Getting Started -Players -Set-up -Materials Rules -Basics -Points System -Multiple Players.
Mystery of Closer Donna Magnuson A/R Consultant. Agenda  Why should I close?  Closing Transactions  Pre-closing Process  Closing  Review of the Reports.
Human Activity Recognition at Mid and Near Range Ram Nevatia University of Southern California Based on work of several collaborators: F. Lv, P. Natarajan,
Attendance Management Work time with APACS. Overview APACS can take attendance to see what cardholders were on site and for how long Reports can also.
Signaling on the CCR Tyler Raulin. Overview of Signals Rules: – Red Light There is a train in the next section of track The turnout is not turned correctly.
Artificial Intelligence in Game Design Lecture 8: Complex Steering Behaviors and Combining Behaviors.
PROBLEM/SOLUTION. PROBLEM AND SOLUTION Depending upon the text, the reader could find one problem with one solution or one problem with multiple solutions.
Page 1 Orchard Harvest ™ LIS Training Order Patient Samples.
Gates Winkler Jordan Samuel Fei Yin Shen 9 September 2009 Virtual Wallet Design Proposal To create a handheld device which will save money and time through.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Step 1 Lead Notifications Dear Partner, New leads have been assigned to your organization based on customer preference and are available for you.
Vehicle Management System Adopted successfully with I.D., wireless Vehicle Management Systems (VMS) for Parking, Residential Societies.
3D Password.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Track-While-Scan (TWS)
DISPENSE.
Your Personal Protection & Safety Smartphone App
Shooting Target Practice Opposed
PARKING AUTOMATION SYSTEM
Point of Use Dispensing
Emergency Procedures All Information Contained in this presentation is found in the FSD1 School Emergency Procedures Manual with the exception of school.
Configuring Cluster Communications
Change Assurance Dashboard
Defensive Play Heading Back to Goal
Wavestore Integrates…
! Delete Slide There are five common variations for operator training
Presentation transcript:

NSRL MCR-Free Access for NSRL A.Rusek P.Ingrassia J.Reich

NSRL MCR-Free Access  Trimmed Down System (compared to 1 st presentation)  System Description  Intellivision Samples  Failure Rates  Proposed Commissioning Scheme

System Description  Three systems: Iris Scanner, Token System (proximity card), Video Turnstile.  Require iris scan for both release and recapture of the token. This ties the token to the eyeball at both ends of the process.  Use proximity card technology to enforce the carrying of token during access.  Use the video technology to monitor and count people walking through the gate. Key Tree Iris Scanner Card Reader PLC Server Gate

Intellivision Samples  Multiple people tracking  Two people in close proximity  People counting.

PLC Server Card Reader Key Tree Iris Scanner Gate To estimate the failure rate for the integrated system, we will look at two parts separately: 1) The first is the camera(s) outside the gate with the iris scanner/token dispenser system. 2) The second is the camera(s) inside the gate, along with the two card readers.

Key Tree Iris Scanner PLC Server User walks into coverage area of the camera, and is assigned a “yellow” status, that is, user is recognized as human, but not cleared to enter the gate. Upon iris-scanning and receiving a token, the user’s status changes to “green”, that is, both human and clear for entry through the gate. First Stage, Outside the Gate Gate

Key Tree Iris Scanner PLC Server Second user walks into coverage area of the camera, and is assigned a “yellow” status, that is, user is recognized as human, but not cleared to enter the gate. If the user attempts to enter the open gate, the server will assign a “red” designation to the user and alert the PLC which will respond with a sweep drop. Failure at this stage would be somehow changing the status of the user to “green” without issuing a token. Either the user just walks into the coverage area and is assigned “green” status, or actually attempts to get a token, fails, yet the server still assigns a “green” status. This failure is estimated to occur once in 10,000 entrances (0.0001) First Stage, Outside the Gate Gate

Card Reader PLC Server User walks into coverage area of the camera, and is assigned a “yellow” status, that is, user is recognized as human, but not cleared to enter the gate. Upon one proximity-card detection the user’s status changes to “green”, that is, both human and clear for entery through the gate. Failure at this stage would be somehow changing the status of the user to “green” without detecting a token. This failure is estimated to occur once in 1,000 entrances (0.001) Second Stage, Inside the Gate Gate

Key Tree Iris Scanner Card Reader User walks into coverage area of the camera, and is assigned a “yellow” status, that is, user is recognized as human, but not cleared to enter the gate. Upon iris-scanning and receiving a token, the user’s status changes to “green”, that is, both human and clear for entry through the gate. User then walks into overlap area of the cameras, and his “green” status is handed over to the second area camera. One proximity-card detection will preserve the user’s “green” status and clear the user to walk through the gate. Failure here would be somehow changing the status of the user to “green” without issuing a token AND allowing the user to enter without detection of a token. The failure rate here is (0.0001)*(0.001) = , that is one in 10M. UNLESS…………………. Unless the failure is due to the inability of the camera to resolve an individual. In that case, the failure may be shared, to some extent, by other cameras, and straight multiplication of the individual failure rates is not legitimate. PLC Server Combined Stages Solutions: More cameras, at different angles. IR cameras. Gate

Key Tree Iris Scanner Card Reader User walks into coverage area of the camera, and is assigned a “green” status (user is already in). The inside proximity card reader is used to arm the door and to enforce the requirement that the token be carried by the user during the access. The user then walks through the door and returns the token. The token will not capture if the iris scan does not match the one which was used to release it. Upon recapture of the token, the server returns the User to “yellow” status and the PLC closes the loop. Failure here would require that the cameras over-count the exiting people, that the card reader agree with this count (one user carrying two tokens), and all tokens capture successfully in the token tree. The failure rate here is estimated to be (0.001)*(0.0001)*(0.0001) = that is, one in PLC Server Card Reader Combined Stages Gate

The “Nightmare” Scenario  User and tailgater enter the coverage area together and are counted by all cameras as one person.  They pause at the token dispensing station together and the user gets one token.  They stay together as they walk through the gate and are counted as one person by all cameras involved.  Only the user leaves the target room, returns the token and the target room is cleared for beam with the tailgater inside. Not realistic. Constitutes a malicious act. We can take credit for training.

A More Realistic Scenario  User and enters the coverage area alone and takes one token  User then goes to the edge of the coverage area and picks up one end of a small, heavy item requiring two people to carry. The other end is manned by a person who has no token.  They walk through the gate and are counted as one person by all cameras involved.  Only the user leaves the target room, returns the token and the target room is cleared for beam with the token-less user inside. We think the cameras can pick this up(?) We can take credit for training.

Proposed Commissioning Scheme  Have the new key tree and proximity card readers installed and tested, during operations if possible.  Install video system and study its performance while using existing system. Try to challenge the system and find its limits and weaknesses.  If there are problems, fix them.  Use the new system, monitored by a designated person at NSRL. This person will report findings to the committee and at that time a decision will be made to accept the system as is, or assign action items to be met before full endorsement.