08 Feb 2021 0 Comments By Medhat Ramadan biometric Attendance and access control Devices Access / Entrance Control, face reader, face recognition in Egypt, face recognition systems, Finger print Devices in Egypt, idemia, Idemia Egypt, Idemia Egypt BIOMETRIC Devices, Idemia time and attendance devices, أجهزة بصمة العين, اجهزة البصمة للموظفين, اجهزة بصمة الحضور والانصراف, اجهزة بصمة الوجه, اجهزة بصمة ايديميا مورفو, اجهزة بصمه مورفو, اسعار جهاز الحضور والانصراف الوجة, جهاز بصمة اوروبى IDEMIA’s Top 4 Trends in Biometrics for 2020 IDEMIA’s Top 4 Trends in Biometrics for 2020 IDEMIA’s Top 4 Trends in Biometrics for 2020 As the world leader in biometric solutions, Idemia Biometric devices explore the top four biometric https://www.stc-security.com/wp-content/uploads/2021/02/Trend-1-Use-of-multi-biometric-identification-adds-a-further-level-of-security.mp4 The full potential of biometrics is yet to unfold. The public and private sectors drive its growing usage. In our increasingly connected world, biometrics is set as one of the key enablers of its digital transformation. Today, the biometric industry’s central focus is to protect our identity and improve security for all of us. 1) Use of multi-biometric identification adds a further level of security As the only form of Idemia Biometric devices that leaves a visible trace, our fingerprints were the first biometrics widely used for identity verification. Today, other biometrics such as face, iris, and DNA are commonly used as well. 2020 will see more and more solutions that offer multi-biometric identification. The combination of multiple types of biometrics enhances security and adds granularity. Depending on the nature of transaction or interaction, different levels of security might be needed. We can already unlock our smartphone with either our fingerprint or face, as this is a comparably less sensitive action. In contrast, mobile biometric devices using fingerprints and faces have, for example, been developed for law enforcement agencies, enabling officers to verify the identities of individuals while patrolling the streets. Another example is the national eID card in Nepal. Nepalese citizens can use their ID cards to interact with their bank, which is why both fingerprint and iris data are embedded into the card for maximum security. 2020 will see this trend growing. https://www.stc-security.com/wp-content/uploads/2021/02/Trailer-IDEMIAs-Top-4-Trends-in-Biometrics-for-2020-1_5.mp4 2) Increased exposure of biometrics calls for top-notch technology to secure data Today, public and private sectors alike face the challenge of achieving two aims simultaneously: Enhanced, convenient services in a digital world Prevention of identity theft when using these services Biometrics is the safest way to verify one’s identity. With the assistance of advanced technologies, the verification of identities with biometrics is fast and easy. However, due to their increased usage, biometric data becomes ever more exposed. On top of this, the trend of storing data in the cloud increasingly includes even the most sensitive data. From startups to large multinationals, cloud computing has revolutionized the way many organizations store and interact with data. It facilitates easier data management, flow and sharing. Biometric data is arguably one of the most sensitive types of data that one can get hold of. 2020 will be all about developing ways to provide extremely tight cyber security to protect biometric data – in the cloud or wherever it might be stored, processed or shared. Three ways of securing data will ensure we can continue to benefit from convenient services and security at the same time, and feel confident in sharing our data: Secure multi-party computation. While securing data in rest and in transit is quite common, the trickiest part is to secure data that is being processed. Traditionally, the processing party had to be able to ‘see’ data to be able to work with it. The risk connected with this method is significantly reduced when the work of processing the data is shared between different parties. It means that there is not one central player processing all the open, vulnerable data, but several contributors. Only by breaching the data processed by each player would the data make sense to the malicious perpetrator. In 2020, we will see a much wider application of this methodology. Verifiable computing. For the security of biometric data, this is a very interesting trend in data processing, which will further develop in 2020. Verifiable computing means that one central entity can outsource the computing of data to another potentially unknown, not previously verified entity, while maintaining verifiable results. In the world of biometrics this could mean that we could do the matching of our own data to verify our identity, for example on our smartphone (i.e. the unknown, not verified entity), without anyone doubting the validity of the computing we have done. This would mean that we control our biometric data at all times and it would never leave our own device. Homomorphic encryption. Homomorphic encryption already protects data both at rest and in transit. However, the Holy Grail that we will see developing in 2020 is to apply this encryption technology also to data that is being processed. The goal is simple – to ensure the data processor cannot decipher or even understand the content that is being processed. It is a method of performing calculations on encrypted information, without decrypting it first. In 2020, we will see a movement towards standardizing homomorphic encryption on a worldwide level. The standard will give a boost towards the aim of using encrypted biometric data while computing. With this last step, end-to-end data privacy can be achieved, given that at no moment in time data is exposed without protection. https://www.stc-security.com/wp-content/uploads/2021/02/Trend-2-Increased-exposure-of-biometrics-calls-for-top-notch-technology-to-secure-data.mp4 3) Wide-spread adoption of facial recognition technology With high performance levels in terms of speed and accuracy, it is no wonder that we will see a wide adoption of facial recognition technology in 2020. Already over the last few years, many use cases have demonstrated how this technology brings convenience and security. It is one of the least intrusive biometric identification methods because it requires little behavioral adaptation. Today, facial recognition is already used to enable security and convenience. It is, for example, an important facilitator to manage the increasing number of travelers globally. In Europe, over 18 countries are using facial recognition, allowing 200 million passengers to cross borders using their face1. Banks have also started to deploy biometric-based systems, so users no longer need to visit branch offices when opening new bank accounts. They simply capture a picture of their ID and take a selfie. Liveness check functionalities permit the customer to prove who they are with a few movements of their head, ensuring a photo or video of them is not used to impersonate them2. As facial recognition continues to be widely implemented, what are some of the new use cases we should expect to see in 2020? Protection of public places with video analytics. Enhanced video analytics add intelligence to existing video surveillance. This technology will in 2020 play an increasingly important role in providing effective solutions to detect threats. Combined with efficient incident response platforms, video analytics enable the law enforcement community to react quickly when a person of interest is detected in a vulnerable area. The analytics provided can be compliant with the strictest data protection laws; detecting biometrics, i.e. face, is by far not their only capability. Next year, we expect to see this type of tool widely offered and therefore a sharp increase in its use. Facial recognition in new industries. While most use cases for facial recognition involve the public sector, many technically advanced industries are expected to implement facial recognition technology for security and convenience as well – like the automotive industry. In 2020, more and more proofs of concept will emerge enabling drivers to access their vehicles and start the engine by simply showing their face. Thanks to facial recognition, the vehicle will automatically adjust the temperature settings, move the seat precisely to fit physical characteristics and preferences and load personalized data, including music playlists and navigation settings into the infotainment system. Moreover, facial recognition replaces the need to look for physical keys (or mobile devices) to open a vehicle and drive away. This improves security by defeating “relay attacks”, where the signal from a car key is captured by the perpetrator within the vicinity of the car using a special device, and car hijacking attempts as the car can only be driven by recognized drivers. https://www.stc-security.com/wp-content/uploads/2021/02/Trend-3-Wide-spread-adoption-of-facial-recognition-technology.mp4 4) Development of a regulatory and ethical framework for the use of facial recognition Facial recognition technology offers significant problem-solving potential for both security- and convenience-related use cases. Yet as its use is based on monitoring people’s movements, this specific type of biometric data is particularly personal. Citizens have to keep control of their biometric data. They need to know how their data is used, how long it is saved and for what reason. To address unease, 2019 has already seen several attempts to develop regulatory and, arguably more importantly, ethical frameworks that define the way facial recognition technology should be used. IDEMIA expects this trend to grow in 2020, with national initiatives being escalated to a continental or even global level. As a leading provider in the industry, IDEMIA encourages the cooperation between governments, the private sector and providers of the technology to define a framework that allows all stakeholders and end-users to benefit from this technology while addressing the public’s concerns. https://www.stc-security.com/wp-content/uploads/2021/02/Trend-4-Development-of-a-regulatory-and-ethical-framework-for-the-use-of-facial-recognition.mp4 Idemia Biometric devices Idemia Biometric devices Idemia Biometric devices
16 Jan 2021 0 Comments By Medhat Ramadan biometric Attendance and access control Devices face reader, face recognition in Egypt, face recognition systems, idemia, Idemia Egypt, Idemia Egypt BIOMETRIC Devices, Idemia time and attendance devices, اجهزة بصمة الوجه, اجهزة حضور وانصراف الموظفين, اجهزة حضور وانصراف ببصمة الوجه, اسعار جهاز الحضور والانصراف الوجة VisionPass Idemia VisionPass To protect their premises, organizations need access control solutions that provide a high level of security but not to the detriment of employees’ experience, which requires ease and speed of use. Bearing those key constraints in mind, IDEMIA involved partners and end-users in the development of VisionPass, the ultimate face recognition device for access control. In this product, IDEMIA associated its latest advances in Artificial Intelligence and facial recognition algorithms with a state-of-the-art optical set combining 2D, 3D and infra-red cameras in order to meet the expectations of the most demanding clients. The result? A robust, reliable and powerful device, providing near-motion 1-second verification through multiple angles and in all light conditions, and resistant to all kinds of spoofing attempts. Unique performance Thanks to the association of a state-of-the-art optical set combining 2D/3D/IR cameras with IDEMIA’s latest advances in AI and image processing, VisionPass provides both a high level of security and real user convenience. True security VisionPass incorporates IDEMIA’s latest spoof detection mechanisms and is capable of coping with face changes (change of haircut, glasses, helmet, etc.). Easy deployment VisionPass can be deployed at any location: indoor or outdoor. In addition to biometrics, it natively supports Prox, iClass, MIFARE, DESFire cards and PIN codes. Contact Details Star Technology for light current systems Co. Headquarter:-Address: 15 Al Fareek Ali Amer St. Nasr City Tel: +(202) 22730200 – 22730300 – 22730400 GSM: + (2 012)02013020 GSM: + (2 011)54000933 GSM: + (2 011)54000939 E-Mail: mramadan@stc-security.com Website: https://www.stc-security.com Sales Department 01150007381 – 01148009052 – 01142954520 – 01149044332
13 Dec 2020 0 Comments By Medhat Ramadan Smart Solutions public transportation solution, smart solutions Passenger Information Software Passenger Information Software Unisign Passenger Information Software was developed specifically for use in railway and other public transport systems. It makes it possible to centrally manage a large number of stations (stations) over an IP network infrastructure. Passenger information devices at all stations can be monitored and managed centrally. In the case of problems on the route, for example in the event of a fault, the time of arrival at the station is calculated taking into account the line density, as there is information in the system of exactly where the vehicles being tracked are located. With the passenger information software, vehicles can be monitored over the internet, and the system is integrated with mobile phone operators, allowing vehicles to learn the arrival information of the vehicles via SMS. Instant InformationInform the passengers by displaying information such as station information, up-to-date news, cultural and art events, weather information on the screens. Saving on timePrevent the passengers from waiting in vain on stations with instant notices. Smart TimingCreate all management and automatic announcements in the way you want with intelligent timing system. Real Time Location InformationInform passengers by accessing real-time location information about the vehicles being tracked. Emergency NotificationsProvide immediate intervention to the scene by detecting the accident, disaster, malfunctions instantly. by Star Technology for light current systems
22 Oct 2020 23 Comments By Medhat Ramadan biometric Attendance and access control Devices اجهزة الحضور والانصراف, اجهزة بصمة الحضور والانصراف, اجهزة بصمة الوجه, اجهزة حضور وانصراف, اجهزة حضور وانصراف ببصمة الوجه, اسعار جهاز الحضور والانصراف الوجة, جهاز بصمة الوجه, جهاز بصمة وجه جهاز بصمة وجه كورى جهاز بصمة وجه كورى Ubio-X Face ستار تكنولوجى لانظمة التيار الخفيف تقدم جهاز بصمة الوجه الاول من نوعه فى العالم من انتاج شركة يونيون الكورية. يستطيع الجهاز التعرف على بصمة الوجه من مسافة ثلاثة امتار كما يمكنه العمل فى الاجواء الخارجية بدرجة حماية IP65 يمكن الجهاز تخزين عشرون الف بصمة وجه كما يمكنه تخزين عشرة ملايين حركة. جهاز بصمة وجه كورى Nitgen UBio-X Face The Latest Face Recognition Algorithm Technology Supporting Walk-Through and Multiple Face Authentication. Nitgen UBio-X Face supports a deep learning algorithm and a face authentication from a distance up to 3 meters and maximum 4 people at the same time when users walk through gates. Ubio-x Face-gates Contactless Solution for a New Era with Liveness Face Detection and Anti-Spoofing Function. UBio-X Face meets the needs of user liveness detection even wearing a mask, and prevents attempts with fake faces such as 3D face mask, face photo, and face printed paper. face Mask detection 36°C Accurate Temperature Detection with Thermal Camera and Thermal Module. UBio-X Face can detect face temperature and identify a user’s face at the same time. Therefore, it accurately determines the information ofthe accessing user. When users are not wearing mask, it warns user to wear mask.Temperature control Safe, Easy and Convenience. With the highest level of device security, it encrypts biometric credentials and user information and sends all the information to a server. It also allows users to enroll by taking a photo with a smartphone and uploading it to the server remotely. Supports Various Installation Environments. UBio-X Face can authenticate faces in a low-light or dark environment through the IR recognition technology and its auxiliary lighting. With IP65 rating, the device supports both indoor and outdoor use, and supports POE (Optional) and various installation environment. Biometric: Face Dust & Waterproof: IP65 CPU: Cortex-A9 Quad Core 1.0GHz Memory: 2GB RAM + 16GB Flash Memory Display: 5”Color Touch Screen Interface: External I/O, TCP/IP, RS-232, RS-485, Wiegand, PoE (Optional),HID Prox, iClass (Optional) Dimension: (W x H x D) mm 94 x 224 x 35.5. Application fields: Construction Sites, Medical Centers, Religious Facilities, Events and Commercial Facility. Capacity: Up to 500,000 Users (1Card : 1User) Up to 20,000 Users (1Face : 1User) Face 1:20,000 < 1sec Event Logs : 10,000,000 Photo Logs : 20,000
16 Oct 2020 0 Comments By Medhat Ramadan Car Parking Management Systems automatic parking system, Came Parking Management System, Car park system, guidance system, ابواب اوتوماتيكية, ابواب جراج سيارات, اسعار ابواب الجراج, البوابات الالكترونية, انظمة الجراجات الاتوماتيكية Car Parking Management System Came Car Parking Management System Came PS Token The transponder-token solution for managing walk-ins. Automatic parking with transponder token Car Parking Management System Came MAIN FEATURES User-friendly parking management system with transponder token. Designed to manage walk-in (occasional) users. Also manages permit holders that have the handy transponder cards. Its modularity and flexibility make the Ps Token ideal for complex set ups, such as on multi-level parking or ones with several entry and exit points. PS Barcode The solution with barcode ticket for managing occasional users Automatic parking with barcode ticket MAIN FEATURES System for managing occasional customers and permit holders. The system is customizable according to the facility’s actual needs. It cuts operating costs and increases profitability. Ideal for establishing commercial agreements with both public and private sector entities. Extremely modular and efficient service. PS Easy The simple solution for managing small parking areas with fixed toll charges Simplified automatic parking MAIN FEATURES Simplified coin-operated fixed-rate pay-to-park system Single unit for managing entries or exits, made of sturdy plate steel. Control of the associated barrier and control of the opening after payment is received. An extremely simple low-cost solution, especially designed to meet the needs of typical small parking facilities. SOFTWARE LINCE 6.0 Lince 6.0 is CAME Parkare’s revolutionary cloud-based car park management system Off street management software Lince 6.0 is CAME Parkare’s revolutionary cloud-based car park management system, that offers real time car park monitoring with the use of a web browser as well as Lince 6.0’s smart app for PC, tablet and smartphone. This powerful online system provides up to the minute information and data reports on live parking systems situated across the globe, at the touch of a button. Simple to use and intuitive, the Lince 6.0 system combines cloud-based ingenuity with local hardware capabilities to provide a complete car park management system. Main Features Web browser enabled. Web responsive for PC, tablet and smartphone. Real-time parking monitoring, control and maintenance. Multiple parking views based on access privileges. Multi-tenant services. Web-based reporting services. Technical Overview High availability at specialised datacentres. Geo-redundancy of data and servers. Vertical auto-scaling (more power in servers at high demand moments). Horizontal auto-scaling (more servers online at high demand moments). Server maintenance and updates on the cloud, no on-premises maintenance required. Lince 6 web reports Statistic reports including: payments, products, invoices and receipts. Card records. Sales, balances refills. Movements and errors. Alarms and exceptions. Reports card consumptions. pool groups. deferred payment. In the reports, you can apply filters by dates, car parks, terminals, type of users and products; view graphics or details: exports to PDF, Word, Excel, Image, CSV, XML and MHTML. Web app to monitor and control Monitor the state of all the car parks. Monitor the state of the terminals in a car park. Monitor and control one terminal. You can see the real state of the terminal and associated cameras while performing actions on the terminal. Monitor and control the active alarms of a terminal. You can perform actions on the affected devices. Monitor and control the advices of one or all the parking lots, including: exceptions, alarms, user messages. OPTIMA Vehicle Guidance System The Optima automatic vehicle guidance system for parking facilities permits real-time parking facility occupancy control, which uses the information obtained to register and indicate the location and shortest path to available spaces to users. Rapid detection and indication of free spaces means an immediate increase in parking facility vehicle turnover and, therefore, profitability. Additional benefits: Increased fire safety in the parking facility, thanks to the system’s built-in temperature sensors. Centralized, independent set-up for each sensor, including height, adapting to the specific form of each parking facility. Optimization of electricity consumption in the car park, thanks to automatic adjustment of the lighting depending on various configurable factors. More efficient use and distribution, thanks to the sequential occupancy system by zones (fully configurable). All these features are based on establishing a true communications network that integrates the volumetric presence sensors and/or ultrasound vehicle traffic sensors, indicator signs, vehicle barriers, and a computerized central unit.