fbpx
23 May 2019

RACS5 System Integration with KONE DCS Elevators System

Roger Access control
RACS5 System Integration with KONE
The RACS5 system enables the implementation of access control in KONE DCS elevators with KONE group elevator controller (KGC). Two scenarios for RACS 5 and DCS systems operation are available. Based on ELI protocol user can choose destination floors in accordance with previously assigned access rights or based on RCGI protocol the system automatically assigns elevator to user to take such user to destination floor according to previously assigned access rights. In each of the mentioned scenarios, an access terminal (usually proximity reader) is used to identify the user calling the elevator. Such readers can be installed both inside the elevator (COP variant) and outside it (the DOP variant). It is also possible to install the reader in the elevator control panel. The access rights to particular floors are defined in the same way as access rights to doors including among others schedules, calendars, exceptions and special access modes such as unlocked mode, locked mode or emergency access modes. The elevator call is made with user identifier and it enables to distinguish elevator call type (personal lift, goods elevator, etc.). The configuration of floor access rights is possible with RACS 5 system management software (VISO). The MC16-EVK controller and the MCI16-EVK communication interface which acts as a gateway to the elevator management server are required for integration with the KONE DCS elevator system. The MC16-EVK controller supports 128 floors. The integration with KONE DCS system is available in the licensed version of the VISO EX management software. RACS5 System Integration with KONE
15 Apr 2019
RBH ACCESS CONTROL integra 32

Access Control RBH integra32

RBH Integra32Security Management System seamlessly integrates Access Control, Intrusion Alarms, Elevator Control, CCTV & DVR, Biometric Authentication, Photo ID, Building Automation, and ON and Offsite Alarm Monitoring, into an elegant and versatile building management and security system.

Access Control RBH integra32
RBH ACCESS CONTROL integra 32
RBH ACCESS CONTROL integra 32

Access Control RBH integra32

Integra32’s advanced .NET architecture is specifically designed to take advantage of Microsoft Windows operating systems. This user-friendly software ensures that security management needs are met easily and economically with minimal training

With a fully featured client or Web browser access to system management, Integra32 addresses all security management needs for small and medium-size businesses and organizations. There is no limit to system expansion with an in-place upgrade path to our AxiomV Enterprise Security Management System

Here are some of the features included

Integration with RBH View

Integration with RBH Biometric readers

Mobile App

Web Client

Upgrades within the same version

Support for Blueline Readers

Support for Free UHSC mobile credentials

Support for IOC8

Integra32 Security Management System seamlessly integrates Access Control, Intrusion Alarms, Elevator Control, CCTV & DVR, Biometric Authentication, Photo ID, Building Automation, and ON and Offsite Alarm Monitoring, into an elegant and versatile building management and security system. Integra32’s advanced .NET architecture is specifically designed to take advantage of Microsoft Windows operating systems. This user-friendly software ensures that security management needs are met easily and economically with minimal training. With a fully featured client or Web browser access to system management, Integra32 addresses all security management needs for small and medium-size businesses and organizations. There is no limit to system expansion with an in-place upgrade path to our AxiomV Enterprise Security Management System. Here are some of the features included…
  • Integration with RBH View
  • Integration with RBH Biometric readers
  • Mobile App
  • Web Client
  • Upgrades within the same version
  • Support for Blueline Readers
  • Support for Free UHSC mobile credentials
  • Support for IOC8

13 Jun 2018
automatic-systems

Automatic Systems Security Gates

Automatic Systems Security Gates.

AUTOMATIC SYSTEMS is a world leader in the automation of secure entrance control. The company has been designing and manufacturing pedestrian, vehicle and passenger access systems for nearly 50 years.
Founded in 1969, Automatic Systems has developed a unique know-how in the design of high-end obstacles, one-person detection and throughput management making it a brand renowned for the high quality of its products in terms of performance and reliability. The company is part of the Bolloré group, assurance of a long-term investment strategy and stability for the company. Our large worldwide business network includes offices and subsidiaries in Belgium, France, Spain, the United Kingdom, The Netherlands, Germany, Canada, China and the United States, a vast international network of distributors and local partners, as well as 5 manufacturing plants (3 in Belgium and 1 in France, Canada) and 3 R&D sites.
  • Every day, more than 90 million people use Automatic Systems’ equipment worldwide.
  • Automatic Systems’ public transportation products are in use in 25 countries.
tripod-turnstile-trilane2

Automatic Systems Security Gates

strongly believes that a customer is a partner and a supply contract a long-term commitment to service and quality. Our products are designed to suit the purposes and requirements of our clients who can always rely on us. Automatic system trilane-1 At Automatic Systems we know that the only way to stay at the forefront of market trends and customer requirements is by innovating and mastering technology. That’s why we invest heavily in Research & Development and have highly advanced resources and expertise for all equipment components. automatic-systems Operating worldwide, we provide a network of sales, customer service and maintenance programs, technical support, spare parts and training facilities. Our partners have also privileged access to the full documentation of Automatic Systems via our extranet platform, Partnerweb.

Automatic Systems High Security

Some sites, such as military, industrial facilities, government buildings… demand a high level of security. For these applications, Automatic Systems provides security barriers, a range of bollards and retractable barriers (road blockers) that enable you to protect your site, while selectively authorizing the passage of certain vehicles.
Automatic Systems is a world leader in the automation of secure entrance control. Moreover, we are one of the few companies which designs and manufactures equipment for all access control segments: pedestrian, vehicle and passenger.

For over 45 years, with over 200 000 products in use in 150 countries globally, Automatic Systems is renowned for its innovativeness, high performance and reliability. Currently, there are more than 90 million daily users of Automatic Systems equipment worldwide.
27 Mar 2018
RBH ACCESS CONTROL

RBH ACCESS CONTROL

RBH ACCESS CONTROL SINCE 1995

RBH ACCESS CONTROL
RBH ACCESS CONTROL
Since 1995 we have been designing and manufacturing Enterprise Access Control and Security Management systems for Canadian and International markets. Through the years we have taken pride in delivering high innovation levels and feature rich products. We continuously invest in research and development, as well as improvements to the manufacturing and distribution aspects of our business.
RBH ACCESS CONTROL
RBH ACCESS CONTROL

Our Products

  • Software – from an Enterprise to Small Business solutions, we have packages specifically tailored to a customer’s needs. Utilizing the latest in Microsoft platform technology we deliver responsive and reliable software on the desktop, server and over the web.
  • Hardware – our robust controllers work in the harshest of environments and in a variety of applications all over the globe. Employing open interface protocols we allow for a great selection of available identification devices from proximity, to fingerprint and iris, as well as a myriad of other technologies available on the market today.
  • Identification Devices – in addition to the ability to connect readers and other 3rd party devices, we offer a line of proximity, long range and biometric readers. These bring added value and reliability as well as a great branding opportunity to our partners.

RBH ACCESS CONTROL Advantages

  • Our software is produced by an in-house software development team with a strong emphasis on long term life cycle support and complete control of the code base.
  • Our hardware engineers design our controllers and other devices in close cooperation with the RBH Access Control software development team to ensure that all the important features are embedded directly into our equipment’s firmware, while ensuring robust, “bullet proof” performance out in the field.
  • Our products are designed and manufactured in Canada with strong attention to Quality Control with up to date components and manufacturing techniques.
  • Our components are designed and manufactured under one roof which is the first step to ensuring quality and advanced design.
03 Mar 2018
WHAT IS BIOMETRICS?

WHAT IS Idemia MORPHO BIOMETRICS?

Idemia MORPHO BIOMETRICS Biometry literally means "measurement of life". In a broader sense, it designates the quantitative study of living beings. It covers a wide range of applications, including anthropology and medicine. The term biometrics also refers to all processes used to recognize, authenticate and identify persons based on certain physical or behavioral characteristics. THESE CHARACTERISTICS MUST BE: UNIVERSAL so that everybody can use them + UNIQUE to unequivocally distinguish between different persons + INVARIABLE to ensure they can be used throughout a person's lifetime + RECORDABLE so they can be collected and stored + MEASURABLE to enable comparisons WHAT ARE THE DIFFERENT TYPES OF BIOMETRICS?

Biometrics can be divided into three main categories of characteristics:

Idemia MORPHO BIOMETRICS * Morphology: the form and structure of organisms. ** These two biometric types may be considered both morphological and behavioral characteristics.
WHAT IS BIOMETRICS USED FOR?

TO IDENTIFY A PERSON. Identification answers the question: “Who is this person?” Identification (1:N) consists of matching biometric data among a large number of persons registered in a database.
Idemia MORPHO BIOMETRICS
TO AUTHENTICATE A PERSON’S IDENTITY. Authentication answers the question: “Is this person really Mr. X?”  Authentication (1:1) consists of verifying that biometric data, for example which is recorded on a passport chip, is the same as for the person holding the passport.
TO AUTHENTICATE A PERSON'S IDENTITY. Authentication answers the question: "Is this person really Mr. X?"  Authentication (1:1) consists of verifying that biometric data, for example which is recorded on a passport chip, is the same as for the person holding the passport.
Idemia MORPHO BIOMETRICS

Each biometric has its advantages and drawbacks, depending on its degree of variability over time, the quality of capture and how often is used. For example, a person’s voice may be subject to occasional or even permanent changes.

Idemia MORPHO BIOMETRICS is specialized in the three major biometric modalities, namely fingerprintface and iris recognition. These three types of biometrics are especially reliable and effective, while being easy to deploy and use.

FINGERPRINT RECOGNITION

Each person has his or her own unique fingerprints – even identical twins have different fingerprints. A fingerprint comprises about a hundred major features, called minutiae. In most cases, a match between around a dozen minutiae is needed to prove that two fingerprints are identical, and establish a person’s identity to a very high degree of certainty.

FACIAL RECOGNITION

Facial recognition software is capable of identifying an individual according to their facial morphology. Its effectiveness depends on several key factors, including the quality of the captured image, the power of the identification algorithms (which compare, for example, spacing between the eyes), as well as the reliability of the databases used (the larger the database, the greater the probability of identifying a person), etc.

IRIS RECOGNITION

The iris is the colored part of the eye, behind the cornea. It is formed before birth and its appearance changes very little during a person’s life. A person’s right iris is as different from the left iris as it is from another person’s iris. And the irises of identical twins are as different from each other as are the irises of two persons chosen at random. This distinction makes iris recognition a very reliable identification technique, even if the person concerned is wearing glasses or contact lenses. Idemia MORPHO BIOMETRICS

The fast-growing number of connected devices (smartphones, tablets, etc.) goes hand in hand with the increasingly critical nature of the applications and content we can find on them. Times have changed, and we live in a world where mobility reigns. However, the typical uses and security behaviors that worked at home on a PC are more difficult to apply on the move, where passwords have reached their limits. But, more than ever, we still have to protect our data, transactions and our identity.

Idemia MORPHO BIOMETRICS is one answer: a simple wave of the hand, pressing a finger on a scanner, or looking at a camera for a second is enough to authenticate our identity. Biometrics facilities the life of users who are increasingly mobile and connected, offering a simple alternative authentication solution to the traditional password and PIN.
AUTHENTICATION METHODS RANKED BY ORDER OF SECURITY
Idemia MORPHO BIOMETRICS

BIOMETRICS: SIMPLER THAN A PASSWORD FOR AUTHENTICATION

Biometrics means you no longer have to use unwieldy passwords. To be effective, a password has to meet four demanding criteria: it has to be changed frequently, be complex, you must not use the same one for different accounts and, above all, it must not be written down! For people on the move, biometric authentication is easier than entering a complex password several times a day.

BIOMETRICS AS A WEAPON AGAINST IDENTITY THEFT

Unlike passwords, biometrics is the only method that establishes a link between our physical and digital identities. This helps us prevent identity theft, enabling us to prove that a person accessing an account or device is really who he or she claims to be. Stealing biometric data without the person’s knowledge, and then reproducing it in a useable form is not as easy as stealing a password and using it remotely.

BIOMETRICS MAKES LARGE-SCALE THEFT VERY DIFFICULT

While it’s relatively easy to access thousands of accounts with stolen passwords in just a few seconds, it’s much harder to hack biometric databases. In addition to gaining access to biometric data, thieves also have to be able to produce fakes for each stolen element, and use them with the appropriate detector – thus eliminating the possibility of any large-scale attack. While the number of PIN codes is limited to the digits between 0000 and 9999, biometric data is unlimited.