TABLE OF CONTENTS. I. Purpose and Scope... 2 II. Standards... 3

Size: px
Start display at page:

Download "TABLE OF CONTENTS. I. Purpose and Scope... 2 II. Standards... 3"

Transcription

1 Technical Team: CFM Group Approval: Page 1 of 14 TABLE OF CONTENTS I. Purpose and Scope... 2 II. Standards Section 1: Mandatory Requirements Section 2: Access Card - General Features Section 3: Access Cards - Hardware and Software Section 4 : Access Card - Credential Options Section 5: Access Card - Format Options Section 6: Card Reader Features and Functionalities Section 7: Card Reader Hardware Configurations Options Section 8: Door Type and Operational Role (table) sample below Section 9: Industry Standards / Applicable Codes Section 10: Warranty III. Related Standards IV. Exceptions or Waiver Requirements V. Requests for Clarification VI. References VII. Key Terms & Glossary VIII. Document History... 14

2 Technical Team: CFM Group Approval: Page 2 of 14 I. PURPOSE AND SCOPE The purpose of the One Card System Standard is to enable the, Districtwide, (the District, nine colleges, and related satellite offices) to have one database allowing a single Card for all students, staff, and faculty to access services, parking and secure areas (such as doors, labs, etc.) bookstore and cafeteria transactions, and financial aid services. The goal is to standardize on a single card format that will deliver enhanced security, improved usability and performance, and reduce the system configuration complexity and effort in managing card holder administration. The card format must support a large number of users and automate provisioning of accounts to reduce college staff needed to support these systems. A. Standardize on a Single Card One card that will work districtwide, eliminate duplicate card numbers, one location to manage versus many. B. One Database One enterprise database reduces admin costs, support, training, back-ups, data base administration, and licensing. C. Factor existing equipment into plan Costs are kept down by utilizing the existing infrastructure such as wiring, electric locking hardware, power supplies and sensors. D. Trend ownership costs to zero Utilize latest card reader technology to move toward NFC (Near field communication); thus the need for physical cards may be phased out. This standard is intended for use in all construction or for renovation projects, which revamp existing classroom and facility space throughout the. This standard will ensure that the One Card System Standard throughout the will adhere to established performance criteria, design standards, and operation specifications. This standard will provide parameters but will require interpretation and adjustment to the specific situations presented by instructional and academic needs across the and its diverse programs, departments and facilities.

3 Technical Team: CFM Group Approval: Page 3 of 14 II. STANDARDS 1. Section 1: Mandatory Requirements The Physical Security One Card System must have the following mandatory requirements: 1.1 Scalable and integrates with existing physical security systems 1.2 Meets ISO 15693/14443B for contactless communications 1.3 Diversified read/write keys that allow complex applications and provide for future expansion 1.4 No-battery design MHz read/write contactless smart card technology for high-speed, reliable communications with high data integrity 1.6 Offers consistent read range not affected by body shielding or variable environmental conditions 1.7 Upgradable, extensible features 2. Section 2: Access Card - General Features The District has selected the HID iclass SE MHz contactless smartcard as the standard for all new construction. This card is highly secure, delivers trust based security, and provides new levels of use and performance. The iclass SE MHz smartcard platform will be used with the iclass SE card readers. The access card shall have the following general features: 2.1 Photo ID Compatible Print directly to the card with a direct image or thermal transfer printer. 2.2 Trusted Identity Platform (TIP) Enabled Provides trusted identity within a secure ecosystem of interoperable products. 2.3 Multi-Layered Security Ensures data authenticity and privacy through the multi-layered security of HID s SIO. 2.4 SIO Data Binding Inhibits data cloning by binding an object to specific credential. 2.5 Mutual authentication, encrypted data transfer, and 64-bit diversified keys for read/write capabilities.

4 Technical Team: CFM Group Approval: Page 4 of 14 Extends private security by protecting uniquely keyed credentials, SIOs and programming update keys. 3. Section 3: Access Cards - Hardware and Software 3.1 Hardware Sensors Locking hardware Lenel panels 3.2 Software Capable of using assigned passwords to define levels of system operation for each operator from basic monitoring to full control of the system databases User-friendly, menu-driven Windows environment; and unlimited capacity to accommodate doors, supervised alarm inputs, control relays, controllers, and users Capable of arming and disarming alarm points both manually and automatically by time of day and day of week Capability to display alarm information on a graphic floor plan.

5 Technical Team: CFM Group Approval: Page 5 of Near Field Communication (NFC) (Recommended) NFC is the latest technology in the credential field. The most recent mobile devices are NFC compatible and can be used as a credential. More and more students have personal mobile devices that they carry with them. By deploying NFC compatible card readers, is in a position to leverage the use of mobile devices as the holder of the end users credentials Utilizes ones personal mobile device as a credential Very secure Adds no operating costs 4. Section 4: Access Card - Credential Options 4.1 Form factors Most people are familiar with access cards; the expected shape for access cards is often referred to as CR80 and has a nominal size of x The shape is derived from the ISO 7810 specification which governs Banking and ID cards. 4.2 Mobile Device The future direction is to leverage the public s overwhelming adoption of the personal mobile device. Not only can these devices incorporate access control technology, but they can add additional layers of security with device authentication. 5. Section 5: Access Card - Format Options The District has selected the 46-bit format to be used with the iclass SE family of credentials, readers, and programming cards. This section defines the access card format Bit (Recommended) Upcoming custom format developed due to the managed 35-bit format being exhausted The reserved segments of this format have been consumed forcing the adoption of a new standard. Many end users are exceeding the 1 million unique card number limit Supports approximately 1 billion unique card numbers Compatible with Lenel OnGuard (OnGuard can be configured to support this format) Can be managed by manufacturer

6 Technical Team: CFM Group Approval: Page 6 of Section 6: Card Reader Features and Functionalities This section defines features and functionalities of the card reader. 6.1 Securely read, interpret, and authenticate access control data from MHz contactless smart card credentials by providing: Customized security protection through support of the device-independent Secure Identity Object (SIO) portable credential methodology to provide enhanced security and performance features Unique read selection that enables reading of the Secure Identity Object (SIO) Participates in an advanced, bounded and trust-based security system utilizing the Trusted Identity Platform TM (TIP) architecture Guaranteed compatibility to read all HID data formats and ensuring card-to-reader interoperability in multi-location installations and multi-card and reader populations when used with genuine HID products Backwards compatibility with legacy MHz contactless smart card access control formats (E.g. 26-bit, 32, 35-bit, 37-bit, 56-bit, and HID Corporate 1000 formats).

7 Technical Team: CFM Group Approval: Page 7 of 14 Compatibility across the product line shall be assured without the need of special programming 6.2 Security Technology and Features Secure Identity Object (SIO) enabled Support the standards-based, device-independent Security Identity Object (SIO) portable credential methodology to ensure data authenticity and privacy Reside on any number of identity devices, such as iclass SE, MIFARE Classic SE, and MIFARE DESFire EV1 SE credentials Certified end-point (TIP Node) within a Trusted Identity Platform (TIP) infrastructure TIP shall provide a scalable, on-demand, secure identity delivery system that validates, registers and provides lifecycle management support for certified trusted end-point contactless smart card readers Increase security by narrowing the possibility of unwanted configuration changes and denials of service. The contactless smart card reader shall utilize TIP-enabled secure configuration of contactless smart card readers with counters and uniquely diversified configuration cards Utilize Secure Element Technology to protect keys and cryptographic functions to the international standard Evaluation Assurance Level (EAL) Configurable to utilize Velocity Checking to provide breach resistance against electronic attacks that invoke multiple improper authentication attempts Configurable to provide multiple hierarchical degrees of key compatibility for accessing the smart card access control data. Compatibility shall be provided for the following key structure options: Compatibility with the standard SIO and iclass access control application data model to ensure convenient off the shelf compatibility with iclass SE and iclass credentials Compatibility with higher security SE Elite credential programmer that uniquely assigns a reader and credential keyset that provides site-specific security.

8 Technical Team: CFM Group Approval: Page 8 of Usability Features Simplify troubleshooting through Anti-passback Notification that the card has already been processed and it must be removed from reader field temporarily prior to processing again Provide enhanced user feedback options through the use of clear and bright tri-colored LEDs configurable to support any three color combinations (RGB - Red, Green, and Blue) Enable ease of installation through identical wiring methods as legacy and 125 khz proximity readers Enable backwards compatibility with legacy MHz access control formats (E.g. 26- bit, 32, 35-bit, 37-bit, 56-bit, and HID Corporate 1000 formats) Provide a full product line of compatible products including readers, readers with integral keypads and, credentials and cards without the need of special programming Universal compatibility with most access control systems by outputting card data in compliance with the SIA AC-01 Wiegand standard Configurable to provide Clock-and-Data output Allow reader firmware to be upgraded in the field without the need to remove the reader from the wall through the use of factory-provided Programming Cards Allow for secure installation practices through mounting methods utilizing tamper resistant screws Ability to transmit an alarm signal via and integrated optical tamper switch if an attempt is made to remove the reader from the wall. The tamper switch shall be programmable to provide a selectable action to provide a selectable action compatible with various tamper communication schemes provided by access control panel manufacturers. The selectable action shall include one of the following: The reader open collector line changes from a high state (5V) to a low state (Ground) During a tamper state, the I m Alive message is inverted..

9 Technical Team: CFM Group Approval: Page 9 of Ability of an on-line I m Alive message so the reader s functional health can be monitored at all times when paired with a compatible access control panel Customizable reader behavior options either from the factory, or defined in the field through the use of pre-configured command cards. Reader behavior programming options shall include: Audio/Visual Templates for card reads, and attack detection Velocity Check timing and thresholds Optical tamper actions RF scan delay Hold Mode Intelligent Power Management Key diversifiers Key rolling CSN output configuration Data Model prioritization Default LED color Hold mode Programmable audio/visual indication An audio beeper shall provide various tone sequences to signify: access granted, access denied, power up, and diagnostics A high-intensity red/green/blue (RGB) light bar shall provide clear visual status. The light bar shall provide uniform distribution of light eliminating individual bright spots Ability to upgrade its application code through the use of pre-configured firmware cards. This feature shall allow previously installed readers be reconfigured to modify their behavior and capabilities as the project environment evolves Ability for mounting to standard electrical boxes through the use of universal international mounting holes. 6.4 Performance Features Enable user prioritization of high-frequency/high-frequency credential reads. Technology prioritization shall synchronize a site s credential technology read priority to the access panel configuration while reducing unintended credential reads.

10 Technical Team: CFM Group Approval: Page 10 of Provide consistent optimal read range by implementing an auto-tune function that adjusts for manufacturing tolerances to enhance consistency of performance from reader to reader Field programmable to provide secure upgrades for migration and extended lifecycle Provide optimal read range and read speed for increased access control throughput. 6.5 Environmental and Sustainability Features Reduce power consumption by as much as 75% through the use of Intelligent Power Management (IPM) technology Manufactured with 10% recycled material to provide the potential of LEEDS building credits in new construction projects Compliant with Restriction of Hazardous Substances directive (RoHS) restricting the use of specific hazardous materials found in electrical and electronic products. The substances banned under RoHS are lead (Pb), mercury (Hg), cadmium (Cd), hexavalent chromium (CrVI), polybrominated biphenyls (PBB) and polybrominated diphenyl ethers (PBDE) Contactless smart card reader shall be manufacturers with 10.5% (Pigtail) and 11% (Terminal Strip). 6.6 Designed for low current operation to enable contactless smart card migration from most legacy proximity applications without the need to replace existing access control panels and/or power supplies. 6.7 Provisioned through secure connections utilizing Trusted Identity Platform s TM Secure Delivery Infrastructure (SDI) where all cryptographic keys governing system security are delivered with end-to-end privacy and integrity. 7. Section 7: Card Reader Hardware Configurations Options The District has selected the iclass SE card readers that support the secure MHz contactless reader technology. This section defines the card reader hardware configuration. 7.1 Single Technology Card/Reader and Lenel Panels (Recommended) Higher initial cost One card

11 Technical Team: CFM Group Approval: Page 11 of One database Lowest operational cost due to training, database administration, licensing and roadmap to use of NFC a card-less system. 8. Section 8: Door Type and Operational Role (table) sample below No. DOOR TYPE & OPERATIONAL ROLE 1. Doors Public to Secure Areas To electronically secure, monitor, record and grant access control of locked doors leading from public areas to secure areas including open/closed conditions and to prevent unauthorized attempts to access through them. 2. Doors from public to sterile areas To electronically secure, monitor, record and grant access control of locked doors leading from public areas to sterile areas including open/closed conditions and to prevent unauthorized attempts to access through them. 3. Elevator doors from public to sterile areas To electronically secure, monitor, record and grant access control of elevator doors per floor leading from public areas to sterile areas including open/closed conditions and to prevent unauthorized attempts to access through them. 4. Vehicle or pedestrian gates To electronically secure, monitor, record and grant access control of vehicle and pedestrian gates leading from public areas to secured areas including open/closed conditions and to prevent unauthorized attempts to access through them. 5. Monitored roof hatch/door alarm point. To electronically monitor, and record doors leading from any area to the roof including open/closed conditions and to detect unauthorized attempts to access through them. 6. Manually activated emergency alarm point. To electronically monitor, and record a manually activated emergency button type alarm resulting in the dispatch to specific location. 7. Doors from public to restricted areas To electronically secure, monitor, record and grant access control of locked doors leading from public areas to restricted areas including open/closed conditions and to prevent unauthorized attempts to access through them.

12 Technical Team: CFM Group Approval: Page 12 of 14 No. DOOR TYPE & OPERATIONAL ROLE 8. Doors from restricted to public areas To electronically secure, monitor, record and grant access control of locked doors leading from restricted areas to public areas including open/closed conditions and to prevent unauthorized attempts to access through them. 9. Section 9: Industry Standards / Applicable Codes 9.1 Meet worldwide radio and safety regulatory compliance including: UL294 (US) cul (Canada) FCC Certification (US) IC (Canada) CE (EU) C-tick (Australia, New Zealand) SRRC (China) MIC (Korea) NCC (Taiwan) ida (Singapore) 9.2 Comply with the following 13.56MHz-related standards to ensure product compatibility and predictability of performance: ISO ISO 14443A ISO 14443B 10. Section 10: Warranty 10.1 Lifetime warranty against defects in materials and workmanship.

13 Technical Team: CFM Group Approval: Page 13 of 14 III. RELATED STANDARDS *These standards will be made available at a date and time to be determined by the District. Instructions on how to access these standards will be supplied at that time. IV. EXCEPTIONS OR WAIVER REQUIREMENTS Compliance Failure to comply with the exception or waiver requirements and process will lead to [insert] V. REQUESTS FOR CLARIFICATION A request for clarification on any of the standards listed above may be ed to [insert address]. In order to be considered, the request must include the following information: The specific standard number and title What aspect of the standard needs clarification One or two solutions VI. REFERENCES Convergint Technologies Subject Matter Experts (SME s) VII. KEY TERMS & GLOSSARY Key Terms Must means that the item or course of action is absolutely required. Shall means that the District intends that the supplier or consultant adhere to the instruction or command. Will means that the existing District systems or conditions require the item or course of action. Optional means that the consultant may choose to include or omit a particular item according to its preference. However, the item chosen must still interoperate or function with the District s existing systems.

14 Technical Team: CFM Group Approval: Page 14 of 14 Minimum of means that the stated item or course of action meets the standard but may be superseded. Glossary The following terms are defined as follows: Need means that the item or course of action is essential and it will be absolutely required at the time indicated in the standard. (e.g., a high level risk assessment needs to be performed ) Call for means that the item or course of action is absolutely required. Are to be provided means that the item or course of action must be supplied in order to meet the standard. May be required if means that if the condition stated in the standard is met, the capability, performance expectation, or any other description in the standard is absolutely required. Recommended means that the course of action is in accordance with (Insert Applicable Area such as Security) Best Practices and should be adopted. Not Recommended means that a course of action is not consistent with (Insert Applicable Area) Best Practices and/or other laws, codes, or requirements and should not be adopted. May/Might/Can mean optional. The items specified using this language may be included or omitted depending upon the consultant/vendor s preferences. However, even if one particular item is optional, the item chosen must still interoperate or function with the District s existing systems. Preferred/encouraged mean that one item or course of action is favored over other optional courses of action because of proven favorable outcomes. Acceptable means that the item or course of action is only a minimum, and the consultant may supersede the quality or performance of that item or course of action. VIII. DOCUMENT HISTORY REV # DATE PAGE, PARA # CHANGE DESCRIPTION OF CHANGE APPROVAL SIGNATURE & DATE

iclass SE Platform Solutions The New Standard in Access Control

iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.

More information

Orig. Date: Control No.: ITSTD VoIP INFORMATION TECHNOLOGY STANDARD Title: VoIP to the Desktop Rev. Date: Rev. No.

Orig. Date: Control No.: ITSTD VoIP INFORMATION TECHNOLOGY STANDARD Title: VoIP to the Desktop Rev. Date: Rev. No. Technical Team: CFM Group Approval: Page 1 of 11 TABLE OF CONTENTS I. Purpose... 2 II. Standards... 3 1. Section 1: Overview... 3 2. Section 2: Pre implementation Guidelines... 3 3. Section 3: Voice over

More information

Identiv TS Readers. Ordering Guide. October 2016

Identiv TS Readers. Ordering Guide. October 2016 Identiv TS Readers Ordering Guide October 2016 Table of Contents Introduction... 3 Identiv TS Readers Description... 3 TS Reader Ordering Processes... 5 Installation and User Manual... 9 Compliance and

More information

multiclass MHz Contactless and 125 khz Proximity Cards and Readers

multiclass MHz Contactless and 125 khz Proximity Cards and Readers multiclass 13.56 MHz Contactless and 125 khz Proximity Cards and Readers With our unique card technology read selection feature, customers have endless card management flexibility, with security and simplicity.

More information

TECHNOLOGY SOLUTIONS BRIEF

TECHNOLOGY SOLUTIONS BRIEF TECHNOLOGY SOLUTIONS BRIEF Sponsored by How a Credential is Read In this Paper Knowing more about access technologies work can help you evaluate your choices in this area Learn to better understand how

More information

ML V/24V Electro-Magnetic Internal Door Lock

ML V/24V Electro-Magnetic Internal Door Lock www.turnstiles.us / www.entrapass.com / 8641 S. Warhawk Road, Conifer, CO 80433 / 303-670-1099 ML 600 12V/24V Electro-Magnetic Internal Door Lock Powerful electro-magnetic door locks are the most convenient

More information

FACIAL RECOGNITION TERMINAL SYSTEM

FACIAL RECOGNITION TERMINAL SYSTEM StoneLock is a global leader in designing and manufacturing secure access control solutions. We are proud to build and design the most secure, reliable and user-friendly access control products for both

More information

TABLE OF CONTENTS. I. Purpose and Scope... 2 II. Standards... 3

TABLE OF CONTENTS. I. Purpose and Scope... 2 II. Standards... 3 Rev. Date: Technical Team: CFM Group Approval: Page 1 of 18 Rev. No.: R0 TABLE OF CONTENTS I. Purpose and Scope... 2 II. Standards... 3 1. Section 1: Mandatory Requirements... 3 2. Section 2: Functional

More information

iclass SE How to Order Guide

iclass SE How to Order Guide iclass SE How to Order Guide D0055, Release D. December 0 The most current version of this document is available for download at: https://www.hidglobal.com/document-library To check order status go to:

More information

ACR880 GPRS Portable Smart Card Terminal

ACR880 GPRS Portable Smart Card Terminal ACR880 GPRS Portable Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1.

More information

eh880 Secure Smart Card Terminal

eh880 Secure Smart Card Terminal eh880 Secure Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1. MCU Cards...

More information

iclass SE How to Order Guide

iclass SE How to Order Guide iclass SE How to Order Guide D0055, Release E.0 November 05 The most current version of this document is available for download at: https://www.hidglobal.com/document-library To check order status go to:

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

L-1 Fingerprint Reader Solutions. V-Flex 4G

L-1 Fingerprint Reader Solutions. V-Flex 4G L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in

More information

Security Expert Smartcard Reader Mini

Security Expert Smartcard Reader Mini [ MINI ] Security Expert 1 Security Expert Smartcard Reader Mini The Security Expert Smartcard Reader provides a complete multi-technology smart card RFID solution. Compatible with all Wiegand data capable

More information

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24 Bluetooth mobile solutions APPLICATION NOTE / FAQ Page 1 on 24 Table of Contents I. Introduction... 5 II. Bluetooth Smart technology General principles... 5 III. Frequently Asked Questions... 5 A. STid

More information

ACR120 Technical Specifications version 3.1 January 2007

ACR120 Technical Specifications version 3.1 January 2007 Version 3.1 01-2007, Email: info@acs.com.hk Website: www.acs.com.hk ACR120 Contactless Reader/Writer 1.0 Introduction The ACR120 is a compact and cost-effective contactless reader and writer. It is developed

More information

Ground Master Monitor Installation, Operation and Maintenance

Ground Master Monitor Installation, Operation and Maintenance USER GUIDE TB-9078 Ground Master Monitor Installation, Operation and Maintenance Made in the United States of America The Ground Master Monitor and its accessories are available as the following item numbers:

More information

SF Series User Manual

SF Series User Manual SF Series User Manual Version: 1.2 Date: July, 2011 About This Document: This document introduces the operations of SF series product. For the product installation, please refer to installation instruction.

More information

Powering the enterprise-grade mobile access experience.

Powering the enterprise-grade mobile access experience. Brochure Mobile Reader Pro The new standard for mobile access. Powering the enterprise-grade mobile access experience. Finally, a mobile access solution that integrates seamlessly with existing access

More information

Credential Programmer How to Order Guide

Credential Programmer How to Order Guide Credential Programmer How to Order Guide D0054, B.2 December 203 The most current version of this document is available for download at: http://www.hidglobal.com/documents/credential_programmer_htog_en.pdf

More information

The Next Generation of Credential Technology

The Next Generation of Credential Technology The Next Generation of Credential Technology Seos Credential Technology from HID Global The Next Generation of Credential Technology Seos provides the ideal mix of security and flexibility for any organization.

More information

Improving the Student Experience with a Unified Credential. Jeff Staples VP Market Development Blackboard Transact

Improving the Student Experience with a Unified Credential. Jeff Staples VP Market Development Blackboard Transact Improving the Student Experience with a Unified Credential Jeff Staples VP Market Development Blackboard Transact 93% High school students who say campus technology is a key factor in their college selection

More information

Card Enrollment Station. User Manual UD05870B

Card Enrollment Station. User Manual UD05870B Card Enrollment Station User Manual UD05870B User Manual 2017 Hangzhou Hikvision Digital Technology Co., Ltd. This manual is applied for D8E series card enrollment station. It includes instructions on

More information

VIS-3102 Installation Manual

VIS-3102 Installation Manual Access Control Black with Clear Border Card Reader Only Compatible with Wiegand 26 and 34 Bit VIS-3102 Installation Manual User Manual COPYRIGHT 2015 Visionis Technology. ALL RIGHTS RESERVED. Any and all

More information

Spoofing iclass and iclass SE

Spoofing iclass and iclass SE Introduction The concept of emulating (spoofing) security access cards has become more and more difficult with the introduction of smart card technology. The older proximity based RFID access cards were

More information

Controller Cardax FT Controller The CardaxFT Controller 5000 is the intelligent field controller in the CardaxFT security system.

Controller Cardax FT Controller The CardaxFT Controller 5000 is the intelligent field controller in the CardaxFT security system. The features described in this data sheet are being progressively added to the CardaxFT Controller (5000 Series) during 2002/2003. Please contact Cardax for further information. Cardax FT Controller 5000

More information

product overview CRASH

product overview CRASH product overview CRASH e back up everyone, everywhere PROe Software Continuous backup for business Use CrashPlan PROe for continuous, cross-platform backup that works everywhere, enabling users to easily

More information

Readers and Credentials. from Security Technologies

Readers and Credentials. from Security Technologies Readers and Credentials from Security Technologies Simplifying the security industry like never before. Ingersoll Rand s aptiq and XceedID readers and credentials not only feature cutting-edge security

More information

PW6000 Modular Access Control System PW6000 Intelligent Controllers and Modules

PW6000 Modular Access Control System PW6000 Intelligent Controllers and Modules Modular Access Control System The next generation of the PW-Series family improves on the existing PW technology to offer superior features and benefits. The PW-Series Modular Control System is an advanced

More information

Empower your phone to open new doors

Empower your phone to open new doors Empower your phone to open new doors Introducing Lenel BlueDiamond Unmatched experience in mobile credentialing BlueDiamond leverages United Technologies Corporation s 17 years of experience developing

More information

GV-AS/EV Controller. User s Manual

GV-AS/EV Controller. User s Manual GV-AS/EV Controller User s Manual Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. AS100.110.120.210.400.410.810-EV48-C

More information

Datenblatt / Specifications. ACR880 GPRS Portable Smart Card Terminal. idvation GmbH

Datenblatt / Specifications. ACR880 GPRS Portable Smart Card Terminal. idvation GmbH Datenblatt / Specifications ACR880 GPRS Portable Smart Card Terminal Otto-Hesse-Straße 19 / T5 D-64293 Darmstadt Phone +49 6151 9926567 Fax +49 6151 3689296 Table of Contents 1.0. Introduction... 3 2.0

More information

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.

More information

aptiq Multi-technology readers Overview Features and benefits Accommodates interior, exterior, metal, and non-metal installation environments

aptiq Multi-technology readers Overview Features and benefits Accommodates interior, exterior, metal, and non-metal installation environments aptiq Multi-technology readers Overview Features and benefits aptiq multi-technology readers by Allegion are designed to simplify your access control solutions. Transition your system from proximity to

More information

Student ID card and campus security solutions. Colleges and universities

Student ID card and campus security solutions. Colleges and universities Student ID card and campus security solutions Colleges and universities Student ID card and campus security solutions for colleges and universities College students today expect convenience. They want

More information

ACTPRO ACCESS CONTROL. Specification Guide

ACTPRO ACCESS CONTROL. Specification Guide ACTPRO ACCESS CONTROL Specification Guide Table of Contents Glossary of Terms... 2 General System Specification Overview... 3 Hardware Requirements... 4 Four Door IP Controller... 4 Two Door IP Controller...

More information

ACR880 GPRS Portable Smart Card Terminal

ACR880 GPRS Portable Smart Card Terminal ACR880 GPRS Portable Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1.

More information

multiclass Magnetic Stripe Reader APPLICATION NOTE Barranca Parkway Irvine, CA USA June 11, 2010 AN0134, Rev A.1

multiclass Magnetic Stripe Reader APPLICATION NOTE Barranca Parkway Irvine, CA USA June 11, 2010 AN0134, Rev A.1 15370 Barranca Parkway Irvine, CA 92618-2215 USA multiclass Magnetic Stripe Reader APPLICATION NOTE June 11, 2010 AN0134, Rev A.1 2010 HID Global Corporation. All rights reserved. HID GLOBAL, HID, the

More information

ELECTRONIC PADLOCK GxP2

ELECTRONIC PADLOCK GxP2 //DATASHEET SALTO GEO Cylinder The next generation of electronic cylinder lock: Fully integrated with the SALTO XS4 platform, SALTO GEO is a versatile, cost effective solution and its compact size and

More information

Readers and credentials

Readers and credentials Readers and Simplifying the security industry like never before. Allegion s aptiq and XceedID readers and not only feature cutting-edge security technology, but are transforming basic access control products

More information

GV-AS/EV Controller. User s Manual

GV-AS/EV Controller. User s Manual GV-AS/EV Controller User s Manual Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. ASEV-H 2016 GeoVision, Inc. All rights

More information

Product Brief: SDC-MSD30AG a/g Miniature SDIO Module with Antenna Connectors

Product Brief: SDC-MSD30AG a/g Miniature SDIO Module with Antenna Connectors Product Brief: SDC-MSD0AG 802.11a/g Miniature SDIO Module with Antenna Connectors The SDC-MSD0AG SDIO radio module from Summit Data Communications combines a high-performance 802.11a/g radio with the Summit

More information

Identiv FICAM Readers

Identiv FICAM Readers Identiv FICAM Readers Ordering Guide August 2017 Table of Contents Overview.....1 Basic FICAM Implementation.....3 Migration Strategies... 4 Perimeter Access... 4 Update Readers and Controllers... 4 Ad

More information

L-1 Fingerprint Reader Solutions. V-Station 4G

L-1 Fingerprint Reader Solutions. V-Station 4G L-1 Fingerprint Reader Solutions V-Station 4G Advanced Features Largest Template Capacity in the Industry (100,000 in 1:1; 10,000 in 1:N or up to 50,000 in 1:N with bins) Single-, Two- or Three-factor

More information

iclass Seos July 2014 Introducing the HID Global iclass Seos Card

iclass Seos July 2014 Introducing the HID Global iclass Seos Card July 2014 iclass Seos Introducing the HID Global iclass Seos Card This whitepaper introduces the HID Global iclass Seos Card. It positions the card as the flagship Genuine HID Credential and articulates

More information

MC75A HF PREMIUM HF RFID CONTACTLESS MOBILE COMPUTER

MC75A HF PREMIUM HF RFID CONTACTLESS MOBILE COMPUTER Page 1 of 6 PRODUCT SPEC SHEET MC75A HF MC75A HF PREMIUM HF RFID CONTACTLESS MOBILE COMPUTER THE RIGHT MOBILE SOLUTION FOR TICKETING, IDENTITY AND ACCESS MANAGEMENT Zebra's MC75A HF takes its place as

More information

g6 Authentication Platform

g6 Authentication Platform g6 Authentication Platform Seamlessly and cost-effectively modernize a legacy PACS to be HSPD-12 compliant l l l l Enrollment and Validation Application Authentication Modules Readers HSPD-12 Enrollment

More information

Mobile: Purely a Powerful Platform; Or Panacea?

Mobile: Purely a Powerful Platform; Or Panacea? EBT: The Next Generation 2017 Mobile: Purely a Powerful Platform; Or Panacea? Evan O Regan, Director of Product Management Authentication & Fraud Solutions Entrust Datacard POWERFUL PLATFORM OR PANACEA

More information

S700e Intelligent IP Reader S700 Exit Reader

S700e Intelligent IP Reader S700 Exit Reader New Product Announcement: S700e Intelligent IP Reader S700 Exit Reader CEM Systems is pleased to announce the release of the S700e and companion S700 Exit Reader for use with the AC2000 suite of access

More information

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL Still Going Strong SECURITY TOKENS FROM HID GLOBAL Contents Protecting Identities and sensitive data 03 Defining the Right Approach 05 HID Global Authentication Devices 06 HID Global Authentication Ecosystem

More information

CardaxFT Reader I/O Interface

CardaxFT Reader I/O Interface CardaxFT Reader I/O Interface CardaxFT Reader I/O Interface provides I/O functionality and an interface for connecting Cardax readers to the CardaxFT system. CardaxFT Reader I/O Interface provides an interface

More information

Architectural and Engineering Specification. Brivo ACS 5000 Control Panels and ACS Service

Architectural and Engineering Specification. Brivo ACS 5000 Control Panels and ACS Service Architectural and Engineering Specification Brivo ACS 5000 Control Panels and ACS Service Document Number: MKT-DOC-006 November 22, 2005 Architectural and Engineering Specification Page 1 Table of Contents

More information

2010 Product Line Catalog

2010 Product Line Catalog 2010 Product Line Catalog emerge Embedded Software Systems w Part of Access SySTEM From enterprise-wide security management to small and mid-size access control, Linear s IEI brand has a choice of, giving

More information

Securing V2X communications with Infineon HSM

Securing V2X communications with Infineon HSM Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security

More information

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart

More information

Mayhew Technology Solutions

Mayhew Technology Solutions Mayhew Technology Solutions Business Overview MTS offers design, engineering, and installation services for fiber optic, telecommunications, ISP, OSP, physical security, low voltage, and audio-visual systems.

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Worksheet 1 CIP-006-6 Cyber Security Physical Security of BES Cyber Systems This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity:

More information

STid presents the new upgradable range. identify. touch. control

STid presents the new upgradable range. identify. touch. control identify. touch. control 18 STid presents the new upgradable range of High Security card readers that use RFID, MIFARE and Bluetooth Smart (Low Energy) technologies. Architect Blue is a secure and user-friendly

More information

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK KEY BENEFITS AT A GLANCE Ensure your journey to the cloud is secure and convenient, without compromising either. Drive business agility

More information

Selection Guide Industry-standard Servers

Selection Guide Industry-standard Servers Selection Guide Industry-standard Servers The Fujitsu PRIMERGY Product Portfolio Fujitsu provides a comprehensive family of industry-standard servers to best meet your specific needs. 4-socket Rack-mount

More information

Web-based Access Control System. Employee access. EMBEDDED Web Browser

Web-based Access Control System. Employee access. EMBEDDED Web Browser Web-based Access Control System NetAXS-123 Hybrid Access Control Panel Honeywell s web-based NetAXS controller provides solutions for installations of any size. NetAXS-123 enables users to securely manage

More information

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0901 SEMESTER: COURSE TITLE: Operating System Security (Windows 2008 Server) COURSE NUMBER: CIST-0254 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE

More information

XS4 LOCKER LOCK Lx050

XS4 LOCKER LOCK Lx050 //DATASHEET SALTO XS4 Electronic locker locks: SALTO XS4 electronic locker locks are designed to provide a high level of security protection and control access to a wide range of lockers, cupboards, display

More information

XS4 LOCKER LOCK Lx050

XS4 LOCKER LOCK Lx050 //DATASHEET SALTO XS4 Electronic locker locks: SALTO XS4 electronic locker locks are designed to provide a high level of security protection and control access to a wide range of lockers, cupboards, display

More information

4 balanced inputs 1 relay output

4 balanced inputs 1 relay output Cardax FT Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. Cardax FT Controller 5000GL

More information

Indoor/Outdoor Proximity Reader and Keypad with 10cm (4in) Read Range

Indoor/Outdoor Proximity Reader and Keypad with 10cm (4in) Read Range Indoor/Outdoor Proximity Reader and Keypad with 10cm (4in) Read Range Stand alone CR-R885-SB Installation and Operating Instructions V1.1 TABLE OF CONTENTS Installation... 2 Mounting and Wiring... 2 Mounting

More information

BioStation. Firmware Revision Notes EN BST V1.93. Biometrics & Security. Version 1.93

BioStation. Firmware Revision Notes EN BST V1.93. Biometrics & Security. Version 1.93 BioStation Firmware Revision Notes Version 1.93 Biometrics & Security Firmware Version 1.93 (Build No.1.93_140228) Release: 2014-02-28 1. Save logs when card authentication fails 2. Relay Off log added

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

VS-AXESS-4ETL Installation Manual

VS-AXESS-4ETL Installation Manual Four Door Access Controller Panel Board TCP/IP Wiegand with Software and Power Supply Included 10,000 Users VS-AXESS-4ETL Installation Manual 1 User Manual COPYRIGHT Visionis Technology. ALL RIGHTS RESERVED.

More information

Product Brief: SDC-PE15N n PCIe Module with Antenna Connectors

Product Brief: SDC-PE15N n PCIe Module with Antenna Connectors Product Brief: SDC-PE15N 802.11n PCIe Module with Antenna Connectors The SDC-PE15N PCI Express Mini Card (PCIe) radio module from Summit Data Communications combines a high-performance, dual-band 802.11n

More information

ARC VIEW. Honeywell s New PLC Brings Digital Transformation to the ControlEdge. Keywords. Summary. The Edge and IIoT.

ARC VIEW. Honeywell s New PLC Brings Digital Transformation to the ControlEdge. Keywords. Summary. The Edge and IIoT. ARC VIEW AUGUST 3, 2017 Honeywell s New PLC Brings Digital Transformation to the ControlEdge By Craig Resnick Keywords IIoT, PLC, DCS, Digital Transformation, Mobility, OPC UA, Cybersecurity Summary IIoT

More information

ILS Lock Operation User Guide

ILS Lock Operation User Guide ILS Lock Operation User Guide PERPETUAL INNOVATION Lenel OnGuard 2012 ILS Lock Operation User Guide, product version 6.5. This guide is item number DOC-303E, revision 2.004, December 2011 Copyright 2011-2012

More information

HID Proximity Credentials

HID Proximity Credentials HID Proximity Credentials ProxCard II Value priced 125 khz proximity card Base Part Number 1326 Price competitive with all other card technologies Thin enough to carry in a wallet or purse ISOProx II 125

More information

VS-AXESS-2ETL Installation Manual

VS-AXESS-2ETL Installation Manual Two Door Access Controller Panel Board TCP/IP Wiegand with Software and Power Supply Included 10,000 Users VS-AXESS-2ETL Installation Manual 1 User Manual COPYRIGHT Visionis Technology. ALL RIGHTS RESERVED.

More information

Why is the Maxxess/Salto integration different from all other SALTO integrations?

Why is the Maxxess/Salto integration different from all other SALTO integrations? Why is the Maxxess/Salto integration different from all other SALTO integrations? SALTO, one of the fastest growing wireless access control companies, and Maxxess, the leader in open, integrated systems

More information

ELECTRONIC ACCESS CONTROL LOCKSETS FOR GALAXY CONTROL SYSTEMS

ELECTRONIC ACCESS CONTROL LOCKSETS FOR GALAXY CONTROL SYSTEMS ELECTRONIC ACCESS CONTROL LOCKSETS FOR GALAXY CONTROL SYSTEMS SCHLAGE AD-300 NOTES TO SPECIFIER: Items in BLUE font are edit prompts and notes that should be deleted from final section. 1. Specifications

More information

GV-AS Controller. Installation Guide

GV-AS Controller. Installation Guide GV-AS Controller Installation Guide Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. 2011 GeoVision, Inc. All rights reserved.

More information

HID Mobile Access. Simple. Secure. Smart.

HID Mobile Access. Simple. Secure. Smart. HID Mobile Access Simple. Secure. Smart. Physical Access for a Modern Mobile World Physical Access the Smart Way With Mobile Mobile connectivity has changed the way we live, work and play. From smartphones

More information

Single Secure Credential to Access Facilities and IT Resources

Single Secure Credential to Access Facilities and IT Resources Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access

More information

Bid Specifications and General Description

Bid Specifications and General Description BID-SPEC_PV100 Rev. 0 Bid Specifications and General Description OPW Petro Vend 100 Fuel Control System Part 1. General Overview 1.1 Summary This document describes the minimum required technical and compliance

More information

MGE Galaxy 5000 for emergency lighting and power equipment

MGE Galaxy 5000 for emergency lighting and power equipment MGE Galaxy 5000 for emergency lighting and power equipment UL 924 listed UPS and battery systems schneider-electric.com 2 schneider-electric.com State-of-the-art three-phase power protection designed to

More information

Multi Card Technology

Multi Card Technology PRX-TSEC tsec Card Reader Sleek and stylish, and with a range of optional features, the tsec series has a solution for everyone. Available in three sizes, multiple card capabilities, with an optional keypad,

More information

MasterCard NFC Mobile Device Approval Guide v July 2015

MasterCard NFC Mobile Device Approval Guide v July 2015 MasterCard NFC Mobile Device Approval Guide v2.0 30 July 2015 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional

More information

The Future of Smart Cards: Bigger, Faster and More Secure

The Future of Smart Cards: Bigger, Faster and More Secure The Future of Smart Cards: Bigger, Faster and More Secure Joerg Borchert, Vice President, Secure Mobile Solutions July 16, 2003 Page 1 N e v e r s t o p t h i n k i n g. Infineon Technologies: Overview

More information

Smart Data Center Solutions

Smart Data Center Solutions Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,

More information

Empower your phone to open new doors

Empower your phone to open new doors Empower your phone to open new doors Introducing BlueDiamond Mobile Unmatched experience in mobile applications BlueDiamond Mobile leverages United Technologies Corporation s 17 years of experience developing

More information

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Service Overview Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Cisco Service Provider (SP) Wi-Fi is a single, unified architecture for all types of Wi-Fi services and business

More information

TruVision IP Thermal Camera Installation Guide

TruVision IP Thermal Camera Installation Guide TruVision IP Thermal Camera Installation Guide P/N 1073335-EN REV B ISS 19OCT17 Copyright Trademarks and patents Manufacturer Certification 2017 United Technologies Corporation, Interlogix is part of UTC

More information

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION Establish Create Use Manage SIMPLE. SECURE. SMART. ALL FROM A SINGLE SOURCE. As the ways to access your organization and its sensitive data increase,

More information

Card Issuance/Encoding & PIN Pads

Card Issuance/Encoding & PIN Pads Card Issuance/Encoding & PIN Pads From Card Issuance to Card Security Card Issuance/Encoding & PIN Pads Card issuers know they can put their trust in Mag- Tek. Whether meeting the growing need for instant,

More information

Aperio Programming Application Manual

Aperio Programming Application Manual Aperio Programming Application Manual Document No: ST-001321-E, Issue date: 1 August 2014 1 The global leader in Aperio Online Programming Application Manual, Document No: ST-001321-E Date: 1 augusti 2014

More information

Z-Wave 4-in-1 Multi Sensor HZS-300E/HZS-300A

Z-Wave 4-in-1 Multi Sensor HZS-300E/HZS-300A Copyright Z-Wave 4-in-1 Multi Sensor Copyright 2015 by PLANET Technology Corp. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

IP-Based Educational Communications Solutions

IP-Based Educational Communications Solutions IP-Based Educational Communications Solutions IP-Based Educational Communications Solutions Effective Communications Facility-Wide and District-Wide Leverage your network and lower your system costs Scalable,

More information

Apex Information Security Policy

Apex Information Security Policy Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8

More information

IP-Based Mass Notification Solutions for Businesses

IP-Based Mass Notification Solutions for Businesses IP-Based Mass Notification Solutions for Businesses IP-Based Communications Solutions u Effective Communications Facility-Wide and Business-Wide u Leverage your network and lower your system costs u Scalable,

More information

Proximity Card and Pin Reader Installation Manual

Proximity Card and Pin Reader Installation Manual Multi Prox Proximity Card and Pin Reader Installation Manual PUBLICATION INFORMATION 60A9 - Draft Release Version 0.1.2 71D0 - Version 1.0.5 CONTENTS Introduction... 1 Legend... 2 Terminology... 2 Mounting...

More information

LACCD INFORMATION TECHNOLOGY STANDARD

LACCD INFORMATION TECHNOLOGY STANDARD Approval: Page 1 of 19 TABLE OF CONTENTS I. Purpose of Technology Standards... 3 II. Scope... 3 III. Standards... 4 1. Section 1: Fit the Specific Business Need... 4 1.1 Requirements... 4 1.2 Description

More information

Printing & Encoding Solutions

Printing & Encoding Solutions Printing & Encoding Solutions FARGO Direct-to-Card Printers The right choice for easy printing, encoding and/or laminating ID cards across your organization. Versatility meets simplicity The new advanced

More information

Every now and again, things come along that completely transform our

Every now and again, things come along that completely transform our Every now and again, things come along that completely transform our worldview, creating new benchmarks and challenging our well-worn concepts. With its new Architect concept, STid has created the perfect

More information