TABLE OF CONTENTS. I. Purpose and Scope... 2 II. Standards... 3
|
|
- Melvyn Gibbs
- 5 years ago
- Views:
Transcription
1 Technical Team: CFM Group Approval: Page 1 of 14 TABLE OF CONTENTS I. Purpose and Scope... 2 II. Standards Section 1: Mandatory Requirements Section 2: Access Card - General Features Section 3: Access Cards - Hardware and Software Section 4 : Access Card - Credential Options Section 5: Access Card - Format Options Section 6: Card Reader Features and Functionalities Section 7: Card Reader Hardware Configurations Options Section 8: Door Type and Operational Role (table) sample below Section 9: Industry Standards / Applicable Codes Section 10: Warranty III. Related Standards IV. Exceptions or Waiver Requirements V. Requests for Clarification VI. References VII. Key Terms & Glossary VIII. Document History... 14
2 Technical Team: CFM Group Approval: Page 2 of 14 I. PURPOSE AND SCOPE The purpose of the One Card System Standard is to enable the, Districtwide, (the District, nine colleges, and related satellite offices) to have one database allowing a single Card for all students, staff, and faculty to access services, parking and secure areas (such as doors, labs, etc.) bookstore and cafeteria transactions, and financial aid services. The goal is to standardize on a single card format that will deliver enhanced security, improved usability and performance, and reduce the system configuration complexity and effort in managing card holder administration. The card format must support a large number of users and automate provisioning of accounts to reduce college staff needed to support these systems. A. Standardize on a Single Card One card that will work districtwide, eliminate duplicate card numbers, one location to manage versus many. B. One Database One enterprise database reduces admin costs, support, training, back-ups, data base administration, and licensing. C. Factor existing equipment into plan Costs are kept down by utilizing the existing infrastructure such as wiring, electric locking hardware, power supplies and sensors. D. Trend ownership costs to zero Utilize latest card reader technology to move toward NFC (Near field communication); thus the need for physical cards may be phased out. This standard is intended for use in all construction or for renovation projects, which revamp existing classroom and facility space throughout the. This standard will ensure that the One Card System Standard throughout the will adhere to established performance criteria, design standards, and operation specifications. This standard will provide parameters but will require interpretation and adjustment to the specific situations presented by instructional and academic needs across the and its diverse programs, departments and facilities.
3 Technical Team: CFM Group Approval: Page 3 of 14 II. STANDARDS 1. Section 1: Mandatory Requirements The Physical Security One Card System must have the following mandatory requirements: 1.1 Scalable and integrates with existing physical security systems 1.2 Meets ISO 15693/14443B for contactless communications 1.3 Diversified read/write keys that allow complex applications and provide for future expansion 1.4 No-battery design MHz read/write contactless smart card technology for high-speed, reliable communications with high data integrity 1.6 Offers consistent read range not affected by body shielding or variable environmental conditions 1.7 Upgradable, extensible features 2. Section 2: Access Card - General Features The District has selected the HID iclass SE MHz contactless smartcard as the standard for all new construction. This card is highly secure, delivers trust based security, and provides new levels of use and performance. The iclass SE MHz smartcard platform will be used with the iclass SE card readers. The access card shall have the following general features: 2.1 Photo ID Compatible Print directly to the card with a direct image or thermal transfer printer. 2.2 Trusted Identity Platform (TIP) Enabled Provides trusted identity within a secure ecosystem of interoperable products. 2.3 Multi-Layered Security Ensures data authenticity and privacy through the multi-layered security of HID s SIO. 2.4 SIO Data Binding Inhibits data cloning by binding an object to specific credential. 2.5 Mutual authentication, encrypted data transfer, and 64-bit diversified keys for read/write capabilities.
4 Technical Team: CFM Group Approval: Page 4 of 14 Extends private security by protecting uniquely keyed credentials, SIOs and programming update keys. 3. Section 3: Access Cards - Hardware and Software 3.1 Hardware Sensors Locking hardware Lenel panels 3.2 Software Capable of using assigned passwords to define levels of system operation for each operator from basic monitoring to full control of the system databases User-friendly, menu-driven Windows environment; and unlimited capacity to accommodate doors, supervised alarm inputs, control relays, controllers, and users Capable of arming and disarming alarm points both manually and automatically by time of day and day of week Capability to display alarm information on a graphic floor plan.
5 Technical Team: CFM Group Approval: Page 5 of Near Field Communication (NFC) (Recommended) NFC is the latest technology in the credential field. The most recent mobile devices are NFC compatible and can be used as a credential. More and more students have personal mobile devices that they carry with them. By deploying NFC compatible card readers, is in a position to leverage the use of mobile devices as the holder of the end users credentials Utilizes ones personal mobile device as a credential Very secure Adds no operating costs 4. Section 4: Access Card - Credential Options 4.1 Form factors Most people are familiar with access cards; the expected shape for access cards is often referred to as CR80 and has a nominal size of x The shape is derived from the ISO 7810 specification which governs Banking and ID cards. 4.2 Mobile Device The future direction is to leverage the public s overwhelming adoption of the personal mobile device. Not only can these devices incorporate access control technology, but they can add additional layers of security with device authentication. 5. Section 5: Access Card - Format Options The District has selected the 46-bit format to be used with the iclass SE family of credentials, readers, and programming cards. This section defines the access card format Bit (Recommended) Upcoming custom format developed due to the managed 35-bit format being exhausted The reserved segments of this format have been consumed forcing the adoption of a new standard. Many end users are exceeding the 1 million unique card number limit Supports approximately 1 billion unique card numbers Compatible with Lenel OnGuard (OnGuard can be configured to support this format) Can be managed by manufacturer
6 Technical Team: CFM Group Approval: Page 6 of Section 6: Card Reader Features and Functionalities This section defines features and functionalities of the card reader. 6.1 Securely read, interpret, and authenticate access control data from MHz contactless smart card credentials by providing: Customized security protection through support of the device-independent Secure Identity Object (SIO) portable credential methodology to provide enhanced security and performance features Unique read selection that enables reading of the Secure Identity Object (SIO) Participates in an advanced, bounded and trust-based security system utilizing the Trusted Identity Platform TM (TIP) architecture Guaranteed compatibility to read all HID data formats and ensuring card-to-reader interoperability in multi-location installations and multi-card and reader populations when used with genuine HID products Backwards compatibility with legacy MHz contactless smart card access control formats (E.g. 26-bit, 32, 35-bit, 37-bit, 56-bit, and HID Corporate 1000 formats).
7 Technical Team: CFM Group Approval: Page 7 of 14 Compatibility across the product line shall be assured without the need of special programming 6.2 Security Technology and Features Secure Identity Object (SIO) enabled Support the standards-based, device-independent Security Identity Object (SIO) portable credential methodology to ensure data authenticity and privacy Reside on any number of identity devices, such as iclass SE, MIFARE Classic SE, and MIFARE DESFire EV1 SE credentials Certified end-point (TIP Node) within a Trusted Identity Platform (TIP) infrastructure TIP shall provide a scalable, on-demand, secure identity delivery system that validates, registers and provides lifecycle management support for certified trusted end-point contactless smart card readers Increase security by narrowing the possibility of unwanted configuration changes and denials of service. The contactless smart card reader shall utilize TIP-enabled secure configuration of contactless smart card readers with counters and uniquely diversified configuration cards Utilize Secure Element Technology to protect keys and cryptographic functions to the international standard Evaluation Assurance Level (EAL) Configurable to utilize Velocity Checking to provide breach resistance against electronic attacks that invoke multiple improper authentication attempts Configurable to provide multiple hierarchical degrees of key compatibility for accessing the smart card access control data. Compatibility shall be provided for the following key structure options: Compatibility with the standard SIO and iclass access control application data model to ensure convenient off the shelf compatibility with iclass SE and iclass credentials Compatibility with higher security SE Elite credential programmer that uniquely assigns a reader and credential keyset that provides site-specific security.
8 Technical Team: CFM Group Approval: Page 8 of Usability Features Simplify troubleshooting through Anti-passback Notification that the card has already been processed and it must be removed from reader field temporarily prior to processing again Provide enhanced user feedback options through the use of clear and bright tri-colored LEDs configurable to support any three color combinations (RGB - Red, Green, and Blue) Enable ease of installation through identical wiring methods as legacy and 125 khz proximity readers Enable backwards compatibility with legacy MHz access control formats (E.g. 26- bit, 32, 35-bit, 37-bit, 56-bit, and HID Corporate 1000 formats) Provide a full product line of compatible products including readers, readers with integral keypads and, credentials and cards without the need of special programming Universal compatibility with most access control systems by outputting card data in compliance with the SIA AC-01 Wiegand standard Configurable to provide Clock-and-Data output Allow reader firmware to be upgraded in the field without the need to remove the reader from the wall through the use of factory-provided Programming Cards Allow for secure installation practices through mounting methods utilizing tamper resistant screws Ability to transmit an alarm signal via and integrated optical tamper switch if an attempt is made to remove the reader from the wall. The tamper switch shall be programmable to provide a selectable action to provide a selectable action compatible with various tamper communication schemes provided by access control panel manufacturers. The selectable action shall include one of the following: The reader open collector line changes from a high state (5V) to a low state (Ground) During a tamper state, the I m Alive message is inverted..
9 Technical Team: CFM Group Approval: Page 9 of Ability of an on-line I m Alive message so the reader s functional health can be monitored at all times when paired with a compatible access control panel Customizable reader behavior options either from the factory, or defined in the field through the use of pre-configured command cards. Reader behavior programming options shall include: Audio/Visual Templates for card reads, and attack detection Velocity Check timing and thresholds Optical tamper actions RF scan delay Hold Mode Intelligent Power Management Key diversifiers Key rolling CSN output configuration Data Model prioritization Default LED color Hold mode Programmable audio/visual indication An audio beeper shall provide various tone sequences to signify: access granted, access denied, power up, and diagnostics A high-intensity red/green/blue (RGB) light bar shall provide clear visual status. The light bar shall provide uniform distribution of light eliminating individual bright spots Ability to upgrade its application code through the use of pre-configured firmware cards. This feature shall allow previously installed readers be reconfigured to modify their behavior and capabilities as the project environment evolves Ability for mounting to standard electrical boxes through the use of universal international mounting holes. 6.4 Performance Features Enable user prioritization of high-frequency/high-frequency credential reads. Technology prioritization shall synchronize a site s credential technology read priority to the access panel configuration while reducing unintended credential reads.
10 Technical Team: CFM Group Approval: Page 10 of Provide consistent optimal read range by implementing an auto-tune function that adjusts for manufacturing tolerances to enhance consistency of performance from reader to reader Field programmable to provide secure upgrades for migration and extended lifecycle Provide optimal read range and read speed for increased access control throughput. 6.5 Environmental and Sustainability Features Reduce power consumption by as much as 75% through the use of Intelligent Power Management (IPM) technology Manufactured with 10% recycled material to provide the potential of LEEDS building credits in new construction projects Compliant with Restriction of Hazardous Substances directive (RoHS) restricting the use of specific hazardous materials found in electrical and electronic products. The substances banned under RoHS are lead (Pb), mercury (Hg), cadmium (Cd), hexavalent chromium (CrVI), polybrominated biphenyls (PBB) and polybrominated diphenyl ethers (PBDE) Contactless smart card reader shall be manufacturers with 10.5% (Pigtail) and 11% (Terminal Strip). 6.6 Designed for low current operation to enable contactless smart card migration from most legacy proximity applications without the need to replace existing access control panels and/or power supplies. 6.7 Provisioned through secure connections utilizing Trusted Identity Platform s TM Secure Delivery Infrastructure (SDI) where all cryptographic keys governing system security are delivered with end-to-end privacy and integrity. 7. Section 7: Card Reader Hardware Configurations Options The District has selected the iclass SE card readers that support the secure MHz contactless reader technology. This section defines the card reader hardware configuration. 7.1 Single Technology Card/Reader and Lenel Panels (Recommended) Higher initial cost One card
11 Technical Team: CFM Group Approval: Page 11 of One database Lowest operational cost due to training, database administration, licensing and roadmap to use of NFC a card-less system. 8. Section 8: Door Type and Operational Role (table) sample below No. DOOR TYPE & OPERATIONAL ROLE 1. Doors Public to Secure Areas To electronically secure, monitor, record and grant access control of locked doors leading from public areas to secure areas including open/closed conditions and to prevent unauthorized attempts to access through them. 2. Doors from public to sterile areas To electronically secure, monitor, record and grant access control of locked doors leading from public areas to sterile areas including open/closed conditions and to prevent unauthorized attempts to access through them. 3. Elevator doors from public to sterile areas To electronically secure, monitor, record and grant access control of elevator doors per floor leading from public areas to sterile areas including open/closed conditions and to prevent unauthorized attempts to access through them. 4. Vehicle or pedestrian gates To electronically secure, monitor, record and grant access control of vehicle and pedestrian gates leading from public areas to secured areas including open/closed conditions and to prevent unauthorized attempts to access through them. 5. Monitored roof hatch/door alarm point. To electronically monitor, and record doors leading from any area to the roof including open/closed conditions and to detect unauthorized attempts to access through them. 6. Manually activated emergency alarm point. To electronically monitor, and record a manually activated emergency button type alarm resulting in the dispatch to specific location. 7. Doors from public to restricted areas To electronically secure, monitor, record and grant access control of locked doors leading from public areas to restricted areas including open/closed conditions and to prevent unauthorized attempts to access through them.
12 Technical Team: CFM Group Approval: Page 12 of 14 No. DOOR TYPE & OPERATIONAL ROLE 8. Doors from restricted to public areas To electronically secure, monitor, record and grant access control of locked doors leading from restricted areas to public areas including open/closed conditions and to prevent unauthorized attempts to access through them. 9. Section 9: Industry Standards / Applicable Codes 9.1 Meet worldwide radio and safety regulatory compliance including: UL294 (US) cul (Canada) FCC Certification (US) IC (Canada) CE (EU) C-tick (Australia, New Zealand) SRRC (China) MIC (Korea) NCC (Taiwan) ida (Singapore) 9.2 Comply with the following 13.56MHz-related standards to ensure product compatibility and predictability of performance: ISO ISO 14443A ISO 14443B 10. Section 10: Warranty 10.1 Lifetime warranty against defects in materials and workmanship.
13 Technical Team: CFM Group Approval: Page 13 of 14 III. RELATED STANDARDS *These standards will be made available at a date and time to be determined by the District. Instructions on how to access these standards will be supplied at that time. IV. EXCEPTIONS OR WAIVER REQUIREMENTS Compliance Failure to comply with the exception or waiver requirements and process will lead to [insert] V. REQUESTS FOR CLARIFICATION A request for clarification on any of the standards listed above may be ed to [insert address]. In order to be considered, the request must include the following information: The specific standard number and title What aspect of the standard needs clarification One or two solutions VI. REFERENCES Convergint Technologies Subject Matter Experts (SME s) VII. KEY TERMS & GLOSSARY Key Terms Must means that the item or course of action is absolutely required. Shall means that the District intends that the supplier or consultant adhere to the instruction or command. Will means that the existing District systems or conditions require the item or course of action. Optional means that the consultant may choose to include or omit a particular item according to its preference. However, the item chosen must still interoperate or function with the District s existing systems.
14 Technical Team: CFM Group Approval: Page 14 of 14 Minimum of means that the stated item or course of action meets the standard but may be superseded. Glossary The following terms are defined as follows: Need means that the item or course of action is essential and it will be absolutely required at the time indicated in the standard. (e.g., a high level risk assessment needs to be performed ) Call for means that the item or course of action is absolutely required. Are to be provided means that the item or course of action must be supplied in order to meet the standard. May be required if means that if the condition stated in the standard is met, the capability, performance expectation, or any other description in the standard is absolutely required. Recommended means that the course of action is in accordance with (Insert Applicable Area such as Security) Best Practices and should be adopted. Not Recommended means that a course of action is not consistent with (Insert Applicable Area) Best Practices and/or other laws, codes, or requirements and should not be adopted. May/Might/Can mean optional. The items specified using this language may be included or omitted depending upon the consultant/vendor s preferences. However, even if one particular item is optional, the item chosen must still interoperate or function with the District s existing systems. Preferred/encouraged mean that one item or course of action is favored over other optional courses of action because of proven favorable outcomes. Acceptable means that the item or course of action is only a minimum, and the consultant may supersede the quality or performance of that item or course of action. VIII. DOCUMENT HISTORY REV # DATE PAGE, PARA # CHANGE DESCRIPTION OF CHANGE APPROVAL SIGNATURE & DATE
iclass SE Platform Solutions The New Standard in Access Control
iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.
More informationOrig. Date: Control No.: ITSTD VoIP INFORMATION TECHNOLOGY STANDARD Title: VoIP to the Desktop Rev. Date: Rev. No.
Technical Team: CFM Group Approval: Page 1 of 11 TABLE OF CONTENTS I. Purpose... 2 II. Standards... 3 1. Section 1: Overview... 3 2. Section 2: Pre implementation Guidelines... 3 3. Section 3: Voice over
More informationIdentiv TS Readers. Ordering Guide. October 2016
Identiv TS Readers Ordering Guide October 2016 Table of Contents Introduction... 3 Identiv TS Readers Description... 3 TS Reader Ordering Processes... 5 Installation and User Manual... 9 Compliance and
More informationmulticlass MHz Contactless and 125 khz Proximity Cards and Readers
multiclass 13.56 MHz Contactless and 125 khz Proximity Cards and Readers With our unique card technology read selection feature, customers have endless card management flexibility, with security and simplicity.
More informationTECHNOLOGY SOLUTIONS BRIEF
TECHNOLOGY SOLUTIONS BRIEF Sponsored by How a Credential is Read In this Paper Knowing more about access technologies work can help you evaluate your choices in this area Learn to better understand how
More informationML V/24V Electro-Magnetic Internal Door Lock
www.turnstiles.us / www.entrapass.com / 8641 S. Warhawk Road, Conifer, CO 80433 / 303-670-1099 ML 600 12V/24V Electro-Magnetic Internal Door Lock Powerful electro-magnetic door locks are the most convenient
More informationFACIAL RECOGNITION TERMINAL SYSTEM
StoneLock is a global leader in designing and manufacturing secure access control solutions. We are proud to build and design the most secure, reliable and user-friendly access control products for both
More informationTABLE OF CONTENTS. I. Purpose and Scope... 2 II. Standards... 3
Rev. Date: Technical Team: CFM Group Approval: Page 1 of 18 Rev. No.: R0 TABLE OF CONTENTS I. Purpose and Scope... 2 II. Standards... 3 1. Section 1: Mandatory Requirements... 3 2. Section 2: Functional
More informationiclass SE How to Order Guide
iclass SE How to Order Guide D0055, Release D. December 0 The most current version of this document is available for download at: https://www.hidglobal.com/document-library To check order status go to:
More informationACR880 GPRS Portable Smart Card Terminal
ACR880 GPRS Portable Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1.
More informationeh880 Secure Smart Card Terminal
eh880 Secure Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1. MCU Cards...
More informationiclass SE How to Order Guide
iclass SE How to Order Guide D0055, Release E.0 November 05 The most current version of this document is available for download at: https://www.hidglobal.com/document-library To check order status go to:
More informationSecurity in NFC Readers
Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic
More informationL-1 Fingerprint Reader Solutions. V-Flex 4G
L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in
More informationSecurity Expert Smartcard Reader Mini
[ MINI ] Security Expert 1 Security Expert Smartcard Reader Mini The Security Expert Smartcard Reader provides a complete multi-technology smart card RFID solution. Compatible with all Wiegand data capable
More informationBluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24
Bluetooth mobile solutions APPLICATION NOTE / FAQ Page 1 on 24 Table of Contents I. Introduction... 5 II. Bluetooth Smart technology General principles... 5 III. Frequently Asked Questions... 5 A. STid
More informationACR120 Technical Specifications version 3.1 January 2007
Version 3.1 01-2007, Email: info@acs.com.hk Website: www.acs.com.hk ACR120 Contactless Reader/Writer 1.0 Introduction The ACR120 is a compact and cost-effective contactless reader and writer. It is developed
More informationGround Master Monitor Installation, Operation and Maintenance
USER GUIDE TB-9078 Ground Master Monitor Installation, Operation and Maintenance Made in the United States of America The Ground Master Monitor and its accessories are available as the following item numbers:
More informationSF Series User Manual
SF Series User Manual Version: 1.2 Date: July, 2011 About This Document: This document introduces the operations of SF series product. For the product installation, please refer to installation instruction.
More informationPowering the enterprise-grade mobile access experience.
Brochure Mobile Reader Pro The new standard for mobile access. Powering the enterprise-grade mobile access experience. Finally, a mobile access solution that integrates seamlessly with existing access
More informationCredential Programmer How to Order Guide
Credential Programmer How to Order Guide D0054, B.2 December 203 The most current version of this document is available for download at: http://www.hidglobal.com/documents/credential_programmer_htog_en.pdf
More informationThe Next Generation of Credential Technology
The Next Generation of Credential Technology Seos Credential Technology from HID Global The Next Generation of Credential Technology Seos provides the ideal mix of security and flexibility for any organization.
More informationImproving the Student Experience with a Unified Credential. Jeff Staples VP Market Development Blackboard Transact
Improving the Student Experience with a Unified Credential Jeff Staples VP Market Development Blackboard Transact 93% High school students who say campus technology is a key factor in their college selection
More informationCard Enrollment Station. User Manual UD05870B
Card Enrollment Station User Manual UD05870B User Manual 2017 Hangzhou Hikvision Digital Technology Co., Ltd. This manual is applied for D8E series card enrollment station. It includes instructions on
More informationVIS-3102 Installation Manual
Access Control Black with Clear Border Card Reader Only Compatible with Wiegand 26 and 34 Bit VIS-3102 Installation Manual User Manual COPYRIGHT 2015 Visionis Technology. ALL RIGHTS RESERVED. Any and all
More informationSpoofing iclass and iclass SE
Introduction The concept of emulating (spoofing) security access cards has become more and more difficult with the introduction of smart card technology. The older proximity based RFID access cards were
More informationController Cardax FT Controller The CardaxFT Controller 5000 is the intelligent field controller in the CardaxFT security system.
The features described in this data sheet are being progressively added to the CardaxFT Controller (5000 Series) during 2002/2003. Please contact Cardax for further information. Cardax FT Controller 5000
More informationproduct overview CRASH
product overview CRASH e back up everyone, everywhere PROe Software Continuous backup for business Use CrashPlan PROe for continuous, cross-platform backup that works everywhere, enabling users to easily
More informationReaders and Credentials. from Security Technologies
Readers and Credentials from Security Technologies Simplifying the security industry like never before. Ingersoll Rand s aptiq and XceedID readers and credentials not only feature cutting-edge security
More informationPW6000 Modular Access Control System PW6000 Intelligent Controllers and Modules
Modular Access Control System The next generation of the PW-Series family improves on the existing PW technology to offer superior features and benefits. The PW-Series Modular Control System is an advanced
More informationEmpower your phone to open new doors
Empower your phone to open new doors Introducing Lenel BlueDiamond Unmatched experience in mobile credentialing BlueDiamond leverages United Technologies Corporation s 17 years of experience developing
More informationGV-AS/EV Controller. User s Manual
GV-AS/EV Controller User s Manual Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. AS100.110.120.210.400.410.810-EV48-C
More informationDatenblatt / Specifications. ACR880 GPRS Portable Smart Card Terminal. idvation GmbH
Datenblatt / Specifications ACR880 GPRS Portable Smart Card Terminal Otto-Hesse-Straße 19 / T5 D-64293 Darmstadt Phone +49 6151 9926567 Fax +49 6151 3689296 Table of Contents 1.0. Introduction... 3 2.0
More informationDFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017
DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.
More informationaptiq Multi-technology readers Overview Features and benefits Accommodates interior, exterior, metal, and non-metal installation environments
aptiq Multi-technology readers Overview Features and benefits aptiq multi-technology readers by Allegion are designed to simplify your access control solutions. Transition your system from proximity to
More informationStudent ID card and campus security solutions. Colleges and universities
Student ID card and campus security solutions Colleges and universities Student ID card and campus security solutions for colleges and universities College students today expect convenience. They want
More informationACTPRO ACCESS CONTROL. Specification Guide
ACTPRO ACCESS CONTROL Specification Guide Table of Contents Glossary of Terms... 2 General System Specification Overview... 3 Hardware Requirements... 4 Four Door IP Controller... 4 Two Door IP Controller...
More informationACR880 GPRS Portable Smart Card Terminal
ACR880 GPRS Portable Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1.
More informationmulticlass Magnetic Stripe Reader APPLICATION NOTE Barranca Parkway Irvine, CA USA June 11, 2010 AN0134, Rev A.1
15370 Barranca Parkway Irvine, CA 92618-2215 USA multiclass Magnetic Stripe Reader APPLICATION NOTE June 11, 2010 AN0134, Rev A.1 2010 HID Global Corporation. All rights reserved. HID GLOBAL, HID, the
More informationELECTRONIC PADLOCK GxP2
//DATASHEET SALTO GEO Cylinder The next generation of electronic cylinder lock: Fully integrated with the SALTO XS4 platform, SALTO GEO is a versatile, cost effective solution and its compact size and
More informationReaders and credentials
Readers and Simplifying the security industry like never before. Allegion s aptiq and XceedID readers and not only feature cutting-edge security technology, but are transforming basic access control products
More informationGV-AS/EV Controller. User s Manual
GV-AS/EV Controller User s Manual Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. ASEV-H 2016 GeoVision, Inc. All rights
More informationProduct Brief: SDC-MSD30AG a/g Miniature SDIO Module with Antenna Connectors
Product Brief: SDC-MSD0AG 802.11a/g Miniature SDIO Module with Antenna Connectors The SDC-MSD0AG SDIO radio module from Summit Data Communications combines a high-performance 802.11a/g radio with the Summit
More informationIdentiv FICAM Readers
Identiv FICAM Readers Ordering Guide August 2017 Table of Contents Overview.....1 Basic FICAM Implementation.....3 Migration Strategies... 4 Perimeter Access... 4 Update Readers and Controllers... 4 Ad
More informationL-1 Fingerprint Reader Solutions. V-Station 4G
L-1 Fingerprint Reader Solutions V-Station 4G Advanced Features Largest Template Capacity in the Industry (100,000 in 1:1; 10,000 in 1:N or up to 50,000 in 1:N with bins) Single-, Two- or Three-factor
More informationiclass Seos July 2014 Introducing the HID Global iclass Seos Card
July 2014 iclass Seos Introducing the HID Global iclass Seos Card This whitepaper introduces the HID Global iclass Seos Card. It positions the card as the flagship Genuine HID Credential and articulates
More informationMC75A HF PREMIUM HF RFID CONTACTLESS MOBILE COMPUTER
Page 1 of 6 PRODUCT SPEC SHEET MC75A HF MC75A HF PREMIUM HF RFID CONTACTLESS MOBILE COMPUTER THE RIGHT MOBILE SOLUTION FOR TICKETING, IDENTITY AND ACCESS MANAGEMENT Zebra's MC75A HF takes its place as
More informationg6 Authentication Platform
g6 Authentication Platform Seamlessly and cost-effectively modernize a legacy PACS to be HSPD-12 compliant l l l l Enrollment and Validation Application Authentication Modules Readers HSPD-12 Enrollment
More informationMobile: Purely a Powerful Platform; Or Panacea?
EBT: The Next Generation 2017 Mobile: Purely a Powerful Platform; Or Panacea? Evan O Regan, Director of Product Management Authentication & Fraud Solutions Entrust Datacard POWERFUL PLATFORM OR PANACEA
More informationS700e Intelligent IP Reader S700 Exit Reader
New Product Announcement: S700e Intelligent IP Reader S700 Exit Reader CEM Systems is pleased to announce the release of the S700e and companion S700 Exit Reader for use with the AC2000 suite of access
More informationhidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL
Still Going Strong SECURITY TOKENS FROM HID GLOBAL Contents Protecting Identities and sensitive data 03 Defining the Right Approach 05 HID Global Authentication Devices 06 HID Global Authentication Ecosystem
More informationCardaxFT Reader I/O Interface
CardaxFT Reader I/O Interface CardaxFT Reader I/O Interface provides I/O functionality and an interface for connecting Cardax readers to the CardaxFT system. CardaxFT Reader I/O Interface provides an interface
More informationArchitectural and Engineering Specification. Brivo ACS 5000 Control Panels and ACS Service
Architectural and Engineering Specification Brivo ACS 5000 Control Panels and ACS Service Document Number: MKT-DOC-006 November 22, 2005 Architectural and Engineering Specification Page 1 Table of Contents
More information2010 Product Line Catalog
2010 Product Line Catalog emerge Embedded Software Systems w Part of Access SySTEM From enterprise-wide security management to small and mid-size access control, Linear s IEI brand has a choice of, giving
More informationSecuring V2X communications with Infineon HSM
Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security
More informationIDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller
IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart
More informationMayhew Technology Solutions
Mayhew Technology Solutions Business Overview MTS offers design, engineering, and installation services for fiber optic, telecommunications, ISP, OSP, physical security, low voltage, and audio-visual systems.
More informationReliability Standard Audit Worksheet 1
Reliability Standard Audit Worksheet 1 CIP-006-6 Cyber Security Physical Security of BES Cyber Systems This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity:
More informationSTid presents the new upgradable range. identify. touch. control
identify. touch. control 18 STid presents the new upgradable range of High Security card readers that use RFID, MIFARE and Bluetooth Smart (Low Energy) technologies. Architect Blue is a secure and user-friendly
More informationSOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK
RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK KEY BENEFITS AT A GLANCE Ensure your journey to the cloud is secure and convenient, without compromising either. Drive business agility
More informationSelection Guide Industry-standard Servers
Selection Guide Industry-standard Servers The Fujitsu PRIMERGY Product Portfolio Fujitsu provides a comprehensive family of industry-standard servers to best meet your specific needs. 4-socket Rack-mount
More informationWeb-based Access Control System. Employee access. EMBEDDED Web Browser
Web-based Access Control System NetAXS-123 Hybrid Access Control Panel Honeywell s web-based NetAXS controller provides solutions for installations of any size. NetAXS-123 enables users to securely manage
More informationSYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus
SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0901 SEMESTER: COURSE TITLE: Operating System Security (Windows 2008 Server) COURSE NUMBER: CIST-0254 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE
More informationXS4 LOCKER LOCK Lx050
//DATASHEET SALTO XS4 Electronic locker locks: SALTO XS4 electronic locker locks are designed to provide a high level of security protection and control access to a wide range of lockers, cupboards, display
More informationXS4 LOCKER LOCK Lx050
//DATASHEET SALTO XS4 Electronic locker locks: SALTO XS4 electronic locker locks are designed to provide a high level of security protection and control access to a wide range of lockers, cupboards, display
More information4 balanced inputs 1 relay output
Cardax FT Controller 5000GL provides flexible system architecture with options of GBUS and LOCAL BUS communications to field devices, to meet a wide range of site requirements. Cardax FT Controller 5000GL
More informationIndoor/Outdoor Proximity Reader and Keypad with 10cm (4in) Read Range
Indoor/Outdoor Proximity Reader and Keypad with 10cm (4in) Read Range Stand alone CR-R885-SB Installation and Operating Instructions V1.1 TABLE OF CONTENTS Installation... 2 Mounting and Wiring... 2 Mounting
More informationBioStation. Firmware Revision Notes EN BST V1.93. Biometrics & Security. Version 1.93
BioStation Firmware Revision Notes Version 1.93 Biometrics & Security Firmware Version 1.93 (Build No.1.93_140228) Release: 2014-02-28 1. Save logs when card authentication fails 2. Relay Off log added
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual
More informationVS-AXESS-4ETL Installation Manual
Four Door Access Controller Panel Board TCP/IP Wiegand with Software and Power Supply Included 10,000 Users VS-AXESS-4ETL Installation Manual 1 User Manual COPYRIGHT Visionis Technology. ALL RIGHTS RESERVED.
More informationProduct Brief: SDC-PE15N n PCIe Module with Antenna Connectors
Product Brief: SDC-PE15N 802.11n PCIe Module with Antenna Connectors The SDC-PE15N PCI Express Mini Card (PCIe) radio module from Summit Data Communications combines a high-performance, dual-band 802.11n
More informationARC VIEW. Honeywell s New PLC Brings Digital Transformation to the ControlEdge. Keywords. Summary. The Edge and IIoT.
ARC VIEW AUGUST 3, 2017 Honeywell s New PLC Brings Digital Transformation to the ControlEdge By Craig Resnick Keywords IIoT, PLC, DCS, Digital Transformation, Mobility, OPC UA, Cybersecurity Summary IIoT
More informationILS Lock Operation User Guide
ILS Lock Operation User Guide PERPETUAL INNOVATION Lenel OnGuard 2012 ILS Lock Operation User Guide, product version 6.5. This guide is item number DOC-303E, revision 2.004, December 2011 Copyright 2011-2012
More informationHID Proximity Credentials
HID Proximity Credentials ProxCard II Value priced 125 khz proximity card Base Part Number 1326 Price competitive with all other card technologies Thin enough to carry in a wallet or purse ISOProx II 125
More informationVS-AXESS-2ETL Installation Manual
Two Door Access Controller Panel Board TCP/IP Wiegand with Software and Power Supply Included 10,000 Users VS-AXESS-2ETL Installation Manual 1 User Manual COPYRIGHT Visionis Technology. ALL RIGHTS RESERVED.
More informationWhy is the Maxxess/Salto integration different from all other SALTO integrations?
Why is the Maxxess/Salto integration different from all other SALTO integrations? SALTO, one of the fastest growing wireless access control companies, and Maxxess, the leader in open, integrated systems
More informationELECTRONIC ACCESS CONTROL LOCKSETS FOR GALAXY CONTROL SYSTEMS
ELECTRONIC ACCESS CONTROL LOCKSETS FOR GALAXY CONTROL SYSTEMS SCHLAGE AD-300 NOTES TO SPECIFIER: Items in BLUE font are edit prompts and notes that should be deleted from final section. 1. Specifications
More informationGV-AS Controller. Installation Guide
GV-AS Controller Installation Guide Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. 2011 GeoVision, Inc. All rights reserved.
More informationHID Mobile Access. Simple. Secure. Smart.
HID Mobile Access Simple. Secure. Smart. Physical Access for a Modern Mobile World Physical Access the Smart Way With Mobile Mobile connectivity has changed the way we live, work and play. From smartphones
More informationSingle Secure Credential to Access Facilities and IT Resources
Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access
More informationBid Specifications and General Description
BID-SPEC_PV100 Rev. 0 Bid Specifications and General Description OPW Petro Vend 100 Fuel Control System Part 1. General Overview 1.1 Summary This document describes the minimum required technical and compliance
More informationMGE Galaxy 5000 for emergency lighting and power equipment
MGE Galaxy 5000 for emergency lighting and power equipment UL 924 listed UPS and battery systems schneider-electric.com 2 schneider-electric.com State-of-the-art three-phase power protection designed to
More informationMulti Card Technology
PRX-TSEC tsec Card Reader Sleek and stylish, and with a range of optional features, the tsec series has a solution for everyone. Available in three sizes, multiple card capabilities, with an optional keypad,
More informationMasterCard NFC Mobile Device Approval Guide v July 2015
MasterCard NFC Mobile Device Approval Guide v2.0 30 July 2015 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional
More informationThe Future of Smart Cards: Bigger, Faster and More Secure
The Future of Smart Cards: Bigger, Faster and More Secure Joerg Borchert, Vice President, Secure Mobile Solutions July 16, 2003 Page 1 N e v e r s t o p t h i n k i n g. Infineon Technologies: Overview
More informationSmart Data Center Solutions
Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,
More informationEmpower your phone to open new doors
Empower your phone to open new doors Introducing BlueDiamond Mobile Unmatched experience in mobile applications BlueDiamond Mobile leverages United Technologies Corporation s 17 years of experience developing
More informationCisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services
Service Overview Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Cisco Service Provider (SP) Wi-Fi is a single, unified architecture for all types of Wi-Fi services and business
More informationTruVision IP Thermal Camera Installation Guide
TruVision IP Thermal Camera Installation Guide P/N 1073335-EN REV B ISS 19OCT17 Copyright Trademarks and patents Manufacturer Certification 2017 United Technologies Corporation, Interlogix is part of UTC
More informationA HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage
A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION Establish Create Use Manage SIMPLE. SECURE. SMART. ALL FROM A SINGLE SOURCE. As the ways to access your organization and its sensitive data increase,
More informationCard Issuance/Encoding & PIN Pads
Card Issuance/Encoding & PIN Pads From Card Issuance to Card Security Card Issuance/Encoding & PIN Pads Card issuers know they can put their trust in Mag- Tek. Whether meeting the growing need for instant,
More informationAperio Programming Application Manual
Aperio Programming Application Manual Document No: ST-001321-E, Issue date: 1 August 2014 1 The global leader in Aperio Online Programming Application Manual, Document No: ST-001321-E Date: 1 augusti 2014
More informationZ-Wave 4-in-1 Multi Sensor HZS-300E/HZS-300A
Copyright Z-Wave 4-in-1 Multi Sensor Copyright 2015 by PLANET Technology Corp. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationIP-Based Educational Communications Solutions
IP-Based Educational Communications Solutions IP-Based Educational Communications Solutions Effective Communications Facility-Wide and District-Wide Leverage your network and lower your system costs Scalable,
More informationApex Information Security Policy
Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8
More informationIP-Based Mass Notification Solutions for Businesses
IP-Based Mass Notification Solutions for Businesses IP-Based Communications Solutions u Effective Communications Facility-Wide and Business-Wide u Leverage your network and lower your system costs u Scalable,
More informationProximity Card and Pin Reader Installation Manual
Multi Prox Proximity Card and Pin Reader Installation Manual PUBLICATION INFORMATION 60A9 - Draft Release Version 0.1.2 71D0 - Version 1.0.5 CONTENTS Introduction... 1 Legend... 2 Terminology... 2 Mounting...
More informationLACCD INFORMATION TECHNOLOGY STANDARD
Approval: Page 1 of 19 TABLE OF CONTENTS I. Purpose of Technology Standards... 3 II. Scope... 3 III. Standards... 4 1. Section 1: Fit the Specific Business Need... 4 1.1 Requirements... 4 1.2 Description
More informationPrinting & Encoding Solutions
Printing & Encoding Solutions FARGO Direct-to-Card Printers The right choice for easy printing, encoding and/or laminating ID cards across your organization. Versatility meets simplicity The new advanced
More informationEvery now and again, things come along that completely transform our
Every now and again, things come along that completely transform our worldview, creating new benchmarks and challenging our well-worn concepts. With its new Architect concept, STid has created the perfect
More information