Академический Документы
Профессиональный Документы
Культура Документы
b:secure
n Systemworld: Intrusion detection technology
01|2008
The intelligent combination of ergonomics and design The colour scheme of the TouchCenter display can be adjusted to ideally match its environment
n Systemworld: Access control
The new key role in access control Honeywell Security has completely revised its range of electronic locking systems
n General
Security is an ongoing trend This years Security poised to break 2006 exhibitors record
A clean solution
Intruder protection without optical impairment with the new radio system from Honeywell Security: fast and clean installation
Professional intrusion detection is now even more versatile and inconspicuous: the new bidirectional radio system from Honeywell Security masters the challenges of demanding architectural environments and combines the advantages of wireless components with the security of efficient intrusion detection central units. These features enable the system to offer all-round protection for business properties, private villas and public buildings of varying sizes. Considering cables do not need to be installed, it can also be fitted swiftly and without requiring any great effort. The system complies with optical demands not only by dispensing with bothersome cabling but also thanks to the discerning design of the components: the Viewguard range of motion detectors was presented with the international red dot design award and application for VdS class B is pending for the system.
Honeywell Security & Data Collection Novar GmbH Johannes-Mauthe-Strae 14 72458 Albstadt, Germany Phone: +49 (0) 74 31/8 01-0 Fax: +49 (0) 74 31/8 01-12 20 www.honeywell.com/security/de info.security.de@honeywell.com
2008 Honeywell International Inc. All rights reserved..
b:secure 01|2008
Contents
0
Contents
n Short and sweet
04 With commendation! 04 Dieter Haack celebrates 40th jubilee 04 At a glance: the most important trade fairs in 2008 11 Security at your fingertips
The new Accentic IK3 fingerkey reader now combines reliable biometric identification with secure IK3 alternating code transmission n Intrusion detection technology n Access control
n Editorial
n Systemworld
06 Hazard management 2.0: software upgrade for WINMAGplus
The latest version additionally broadens the performance range of the proven hazard management system from Honeywell Security
n General
22 Security is an ongoing trend
This years Security poised to break 2006 exhibitors record
14 Design wins!
The Viewguard has received the international red dot award
0
b:secure 01|2008
With commendation!
Positively received by the jury: the TouchCenter and Accentic mifare fingerkey reader Innovative power and a sure-fire instinct for new products and technologies at Honeywell Security have been rewarded twofold: both the graphic TouchCenter control panel for intrusion detection central units and the Accentic mifare fingerkey reader were awarded and/or nominated by independent expert juries. Both in terms of design and function, the TouchCenter for intrusion detection central units satisfies maximum demands. With its switchable display colour scheme, individual optical adaptation options and intuitive user guidance, the TouchCenter also managed to convince the jury comprising readers of WIK/ SicherheitsMarkt. In July/August 2008, the innovative control panel received the Product of the Month award. The new Accentic mifare fingerkey reader is also on course for success. As the first scanner in the area of biometric fingerprint ID, it has received VdS approval for access control and intrusion detection technology. The fact that Honeywell Security has displayed the right touch in terms of product design is now also confirmed by its nomination for the GIT SICHERHEIT AWARD 2009. We are really delighted at the positive response of the expert juries as it confirms our product strategy, is how Stephan Winkelmann, Head of Marketing Communication at Honeywell Security Deutschland, describes this success. We not only regard this as support in terms of marketing but also as motivation for retaining our lead in the competition for technologies and markets.
01
b:secure 01|2008
Editorial
0
Dear reader,
The demand for intelligent technology has reached all areas of our lives. Today, processors not only control computer systems, but also household appliances, vehicles and machines. Intelligent environments can be created by networking a diverse range of technical devices. These not only ensure more convenience but facilitate everyday processes. Increasingly, this trend is also catching on in the area of security technology. Reliable products and integrated solutions are in demand, as well as user-friendly software and operational concepts. Honeywell Security is accommodating this development with an expanded product line among other areas, we have completely realigned our portfolio within the electronic locking systems segment. One of the highlights here is the DLC electronic cylinder lock. As an extra small, flexible and cost-effective access control solution, it combines classic mechanical protection features with all the advantages of electronic access control systems. You can discover further innovations at our Security trade fair stand.
Andrea Bergerhoff EMEA Sales Director Managing Director
From 7 to 10 October, you will find us at stand 507 in hall 3.0, where you can experience the perfect interplay of new products and proven security solutions. We are looking forward to your visit. In the meantime, we hope you enjoy reading our latest customer magazine.
Best regards,
0
Systemworld
b:secure 01|2008
b:secure 01|2008
Systemworld
07
will reduce the workload in future. The copy function now greatly simplifies the management of data. Changed files are simultaneously transferred to all workstations connected within the multi-station system in order to avoid having to enter data twice. The distribution of tasks within a multi-station system is carried out via the alarm batch processing function in the new software version. Each separate computer can display the batch entries of other workstations and either carry them out from another station or relocate them. The night porter, for example, has the capability to transfer the servicing of a low-priority technical alarm directly to the technical department for the following day. From visualisation to process optimisation The desktop is the crucial interface between man and technology. It can now be divided over as many as four monitors to ensure a maximum of both ergonomics and clarity. This means that ground plans, CCTV pictures, text information and event reports can all be displayed simultaneously. It gives the user a comprehensive picture of any hazardous situation that may occur and makes it easier to keep an eye on everything at all times. Open for integration Due to the continuing trend towards increased system integration, interface problems still remain one of the greatest challenges to be mastered in the field of building management. The latest version of WINMAG includes a plug-in interface for integrating third-party systems. It enables data from a wide variety of applications to be transferred, whether contact information from the access control sys-
tem or pictures from CCTV cameras. Individual applications can also be programmed to suit requirements. It is, for example, possible to interlink goods storage data with a fire detection system: in case of fire, WINMAGplus V2 can inform the user as to whether inflammable or explosive goods are stored in the vicinity of the danger zone. Printing options perfected The printing options have also been optimised in the latest version of the hazard management system. Printing can now be carried out in the background without a simultaneous display on the desktop. All graphics of the current alarm point can be printed out either double-sided or as single pages using the standard view as the need arises. Even when printing from macros there are no more distortions with version 2 because the hard
copy also takes page margins into account. The printing alignment is performed automatically to suit the format of the graphic (portrait or landscape format). n
01
N EW
V2
Graphics
0
Systemworld
b:secure 01|2008
b:secure 01|2008
Systemworld
0
Additional functions
assignments or create, change and delete complete area/time zones that include deactivation. Using IQ SystemControl the installer can, however, simply adapt the rights of the operator to conform to the regulations of the VdS by mouse click via a VdS attribute. IQ SystemControl can also be used for comprehensive and structured personnel management, including organisation membership, photos and signatures. The additional capability to change similar data sets by group helps the user to save a great deal of time and expense. Doors can also be centrally, directly and quickly controlled: opening, blocking, permanent
release, normal, prevent access inwards or outwards. Even the reason for possible activation prevention can be requested with a simple click of the mouse. Easy booking analysis, clear protocols Straightforward booking analysis and a multitude of protocol options are further advantages of the software: previous bookings can be analysed by means of the search, multilevel sorting and columnsorting functions or according to user-defined filters and groupings. The results are then displayed in easy-to-read lists that include search, filter and browse functions. They can be selected either as a printout or as a file in various formats such
as .xls, .txt, .html or .xml. For dealing with problems, IQ SystemControl offers numerous protocol methods such as an activity protocol and system reports. Additional activities such as alarm signals, information reports or the playing of signals continue to be standard system options. Flexibly usable time orders are also available for implementing regular backups or reorganising protocol files. The IQ SystemControl is also reliably protected from unauthorised use with practical functions such as automatic logging out according to a preset time, the blocking of the program or by defining a maximum number of unsuccessful attempts to log in. n
10
Systemworld
b:secure 01|2008
The new smoke detection base for BUS-1 and BUS-2 is not only easy to install and practically designed, its two-in-one principle also optimises storage space for the installer. Commissioning can be carried out quickly and simply via the userfriendly WINFEM Advanced programming software. n
b:secure 01|2008
Systemworld
11
Double identification reliability Once the reader identifies a fingerprint currently being scanned, it sends the serial number of the corresponding data carrier to the controller. Confirmation is only granted if the data carrier (or the virtual serial number) is also authorised in the system. When a transponder is used, an alternating code is exchanged twice between the evaluation unit and the transponder following the authorisation check. In this process, an encrypted transmission in several data packets ensures reliable eavesdropping protection based on the latest VdS and BSI guidelines. By supporting IK3 alternating codes, both IK2/proX and IK3/proX2 data carriers can be used. The fingerprints are captured securely using a high-quality thermal line sensor that is able to account for various lighting conditions, humidity and soiling, and be used within electrical fields or with visible finger-
prints left behind by the previous user. In the case of an injured finger, the personal data carrier can be used as a substitute. The Accentic IK3 fingerkey reader complies with the highest safety regulations for the operation of intrusion detection systems. Moreover, it evaluates approximately 1/3 more attributes than for access control and control functions. This allows it to be used as a control unit up to and including class SG6. The new reader is suitable for both indoor and outdoor use at temperatures of 25 C to +55 C, and complies with protection class IP54 requirements. With just two or three screws it can quickly and easily be installed on the wall or also mounted directly on standard DIN flush-mounted sockets sockets. For the Accentic IK3 fingerkey reader, VdS approval class C for intrusion detection and access control systems is pending. n
12
b:secure 01|2008
01 01 The TouchCenter colour screen is switchable, enabling it to adapt perfectly to its respective environment
b:secure 01|2008
1
normal operation. The wireless sensors can be separately selected, which makes it possible to simultaneously monitor windows and doors or terrace doors for broken glass or opening. If an alarm is triggered, the cause is even defined and displayed via the evaluation unit. Depending on building requirements, new sensors can be mounted either straight on the wall or as a discreet slimline version (covered mounting).
1
b:secure 01|2008
Design wins!
The Viewguard has received the international red dot award
n Design is the process by which nearly all objects are given a certain form and functionfrom a car to a paper clip. These objects are often required to meet varying and sometimes even conflicting requirements to ensure that they work as they are intended to. Design can only be considered successful when aesthetics, ergonomics, durability, function and convenience complement and harmonise with each other. The intelligent combination of form and function meanwhile also plays an increasingly crucial role in the world of security technology. In the last few years product design has become a key competitive factor in the security industry. With the concept of new wrappings for new technology manufacturers are now fulfilling the long-cherished wish of architects and interior designers to integrate the required Honeywell Security has long considered well-thought-out building design as implicit. The company designs its products with a view to both form and functionality and this endeavour met with particular success with the Viewguard. This year it received the red dot award for product design. Worldwide coveted seal of quality In 1955 the Design Centre of North RhineWestphalia began tagging outstanding international product design with its famous red dot. Since then, companies from Asia, the Americas and Europe have been entering their industrial goods in the competition, which annually presents award-winning products in its special show Design Innovations. The red dot technical security installations without detracting from the aesthetics of the interior. design award is one of the largest design competitions worldwide and attracted 3,203 entrants from 51 different countries. It is divided into three independently organised sections: product design, communication design and design concept. A worldwide selection of design specialists judges which products are impressive due to their good design, then compare all entries directly with each other on site according to a wide range of evaluation criteria. Not only innovation, functionality and ergonomics, but also the symbolic
b:secure 01|2008
1
and emotional content of a product is assessed. The Viewguard was able to gain points in every respect and was awarded the coveted circular seal of quality from a field of 3,203 entries. This puts the motion detector in a class with products such as last years winners of the prestigious award: none other than the Porsche 911 Targa, the new Mini and the Apple iPod. Synthesis of form and function We are particularly proud of the red dot award for product design because it is an objective, international seal of quality for good design, said a happy Stephan Winkelmann, Head of Marketing Communication at Honeywell Security. Apart from its false-alarm-proof technology
and its high degree of user-friendliness, the visual integration of the Viewguard right from the product development stage was an important criterion for us, he explained. When designing the shape we paid particular attention to the use of a clearly recognisable geometric structure. When viewed from the front, the detector was consciously designed as a rectangle with circular elements and slightly convex curved edges. The angle of the front surface firstly has ergonomic benefits because it makes the keypad easier to operate and secondly it allows the device to be clearly visualised by the user, said Winkelmann in summing up the design concept. The official award presentation took place at the end of June. In the course of time it
has become a major annual industry meeting at which the winner of the red dot design award is celebrated deep into the night by guests of honour from the worlds of business, politics, media, design and advertising. Winners have the opportunity to make new contacts and strengthen existing ones. All of the prize-winning products are subsequently presented to the public at a special exhibition. n
The product range now includes both detectors with the proven passive-infrared technology and DUAL motion detectors for all types of connection (BUS-1, BUS-2 and conventional wiring). The Viewguard models are available in the VdS categories B and C (with sabotageproof front field and mirror cover monitoring). Improvements such as an additional detector group input or a temperature threshold alarm (available for BUS-2 connection) additionally broaden the performance range of the detector series and enable comprehensive security concepts to be implemented.
broad range of project requirements in the long term. Furthermore, the economical two-in-one principle greatly reduces storage costs. n
01
1
b:secure 01|2008
The base enables the wireless BUS-2 connection of TM, TD, O, O2T and OTG IQQuad detectors.
RF BUS-2 transponder
RF I/O module
Viewguard PIR RF
b:secure 01|2008
17
caused by the mislaying, forgetting or passing on of identification criteria. Due to the inseparability of identification criteria from the actual person, fingerprint identification can, in combination with other security criteria, make a significant contribution towards raising the level of security of an entire system.
security can also be warranted by means of a memory-aided identification characteristic in the form of a PIN code. All at your fingertips: this is how it works Fingerprint identification is one of the most common biometric systems currently being used in the field of access control and the new Accentic mifare fingerkey reader also makes the most of this proven biometric identification technology. With this technique, a sensor scans the finger placed on it, evaluates the contour of the finger pad and stores it as a reference template on a mifare data medium, which is then assigned to the corresponding person in the system. During each identification attempt the data are read from the data medium, the fingerprint is scanned and then compared with the stored data in learn mode. If required, a combination of PIN and data medium can also be created via the keypad. The person will only be allowed access if all of the data coincide. BioKey technology and the new thermal 2-line sensor In order to minimise the False Refusal Rate (FRR), and False Acceptance Rate (FAR) the new fingerkey reader works with the proven BioKey software and a new thermal 2-line sensor. The BioKey software module has already been successfully installed over 10,000 times. In a comparison test conducted at the FVC 2004 (Fingerprint Verification Competition 2004), BioKey was judged to be one of the ten best fingerprint identification systems worldwide and as the best in Western Europe. This technology enables simple identification even of socalled difficult fingers such as particularly dry, moist or dirty fingers or those with minor injuries. Even outdoor applications,
Security is now able to put a greater degree of security and convenience at the users fingertips. One of the greatest advantages of this new system is the fact that it can be flexibly used in conjunction with three different systems. As an additional safeguard against intrusion, for access control or time recordingwith its innovative evaluation technique the new mifare fingerkey reader guarantees extremely fast, stable identification. The biometric system combines two separate identification criteria: biological (personal fingerprint) and material (data medium with individual serial number or sector data). This dual method of identity control practically excludes the misuse of data media. Furthermore, additional
1
b:secure 01|2008
01
01 More security at your fingertips: biometric identification with dual identity control
particularly for door-opening systems, can be implemented with this robust identification module without problems. The use of a new thermal 2-line sensor makes the device even more convenient and secure to use. By measuring differences in the temperature of the finger contour the sensor is able to differentiate between a real finger and a simulation. In addition, the finger pad is no longer simply placed on the sensor but dragged across it. This means that no fingerprints remain (latent finger) that could be either copied or misused at a later date. In contrast to purely optical sensors, varying light conditions do not impair the ability of the thermal 2-line sensor to safely identify the
fingerprint. The thermal 2-line sensor works on thermal principles, unlike optical sensors. The thermal principle is recog-
moisture, soiled sensors nor electric fields (which can lead to irritation in the case of capacitive sensors) can cause identification problems.
The use of the BioKey software with the evaluation algorithm specially optimised to suit the new thermal 2-line sensor is a crucial contribution to the robustness and reliability of the mifare fingerkey reader. In addition, the new reader enables up to five fingers, or alternatively four fingers and an additional substitute code, to be stored on a 4k mifare card. This ensures both convenience and security when carrying out identification, even in adverse conditions such as an injured main finger.
nised as one of the safest biometric methods when it comes to identifying fingerprints, due to the fact that neither
b:secure 01|2008
1
Flexible in many areas of application The new Accentic mifare fingerkey reader with keypad features a broad range of applications with three RS-485 interfaces, clock/data and Wiegand. The new reader also shows how adaptable it is in the way it works: by activating a DIP switch it can be utilised either as a read-in station or as an access control reader. Thanks to its high degree of flexibility and compatibility, the mifare fingerkey reader can easily be integrated into previously implemented systems. The mifare fingerkey reader is suitable for use in intrusion detection technology, in access control and in conjunction with time recording systems. It can also be utilised as a switching element for activating or deactivating intruder alarm systems. In addition, it provides added safety and convenience when used as an operating element for access control and time recording systems. The Accentic mifare fingerkey reader also showed its high degree of fingertip sensitivity in questions of corporate data privacy protection, due to the fact that the
fingerprint converted into a template is not stored in the system itself but as a protected file on a personal mifare card. An unlimited number of fingerprints can be simultaneously examined in the system by means of this method. The Accentic mifare fingerkey reader is suitable for both indoor and outdoor use (IP54). Its night design with time-limited background display lighting makes it ready for use at any time of the day or night. Other user-friendly features are the LED display with internationalised markings, the tactile and acoustic feedback and the durable, convenient 10-digit keypad with six additional function keys. The mifare fingerkey reader is one of the first biometric systems for which VdS approval was applied. n New areas of application for fingerprint identification
Biometric techniques can be used in almost any situation in which personal identification is important. Biometric identification systems are already being used in numerous areas of our daily lives. For example: Buildings that require special protection or areas such as infant care wards, banks, laboratories and research institutes, airports and similar places. The combination of biometric and conventional identification methods provides access control systems with added security. Season tickets The use of biometric identification systems is a good method of assuring that non-transferable tickets are not passed on to unauthorised persons. For this reason, fingerprint and facial recognition technologies are becoming increasingly used in places such as health studios, solariums, thermal baths, zoos and stadiums. Payment systems Registered regular customers of several German supermarket chains are now able to pay by means of fingerprint identification whereby payment itself is carried out by bank transfer. The customer requires neither cash nor credit card. From a data protection point of view this method is comparable to discount systems.
02
02 All at your fingertips: the Accentic mifare fingerkey reader combines convenience and security when it comes to checking identity
20
b:secure 01|2008
b:secure 01|2008
21
enable DLC to be used in doors ranging in thickness from approx. 50 to 110 mm. The DLC fits all profiled cylinder locks capable of integrating a European standard lock cylinder adaptor, making it suitable for use in both new and old buildings. An additional advantage of the modular cylinder design is the low cost of fitting: a detailed plan showing which cylinder fits which door is not necessary. The suitable cylinder adaptor for each door can simply be selected on site. Installation requires nothing more than a screwdriver and only takes a few minutes. The digital locking cylinder is powered by two standard CR2 lithium 3-volt batteries designed for 30,000 actuations and up to ten years service life. Even if the battery is flat, a locked door can still be opened in an emergency using a special installation tool. Easy commissioning and programming Not only the commissioning, but also the assignment and management of access rights are especially user-friendly. All of these tasks can be simply performed by using the infrared interface of a PDA (PALM ) and the access manager instal
days, door program controls and the stipulating of various validities for access rights and office authorisations. Whenever access profiles need to be changed or entered, all doors which have been updated are displayed on the PALM PDA. This greatly simplifies the updating process and saves additional working time, particularly in large-scale security systems. The registration and recording of any sabotage attempts is another of the added security features the BSI-listed DLC offers. Any unauthorised attempts to manipulate the system can be read out via the PDA during the next system update. A proX/IK2 cylinder head is available to integrate individual doors into an access control system. Programming with MasterCards makes it possible to authorise up to 99 ID cards or transponder tags per cylinder. Online programming via the wireless network is also currently being planned for the future. Wide range of applications In principle, any mechanical cylinder can be replaced by this new, multitalented innovation. The system offers a direct benefit and raises the level of security, particularly in situations in which either an access control system is already installed or where the necessity for a system of this type has been recognised, for instance in administrative or business buildings, schools, institutions, universities, the offices of public authorities or hospitals. Depending on the necessity and place of usage, the mechanical button can even
be easily replaced with a second reader module to ensure access control in both directions that have varying access rights depending on the side. Thanks to the integration of the electronic cylinder functionality in the IQ MultiAccess user softwareeven in existing systems the user can not only retain the previous card organisation, but also the proven software platform and has access to both the existing access control reader and the electronic cylinder. A door mounting is also available with the same functionality. The DLF door mounting can also be installed quickly and without wires and can be used both in combination with DIN 18251 mortice locks and with self-locking panic locks. An authorised booking electromechanically unblocks the door handle and the door can then simply be opened by pushing down the handle. Commissioning, booking and management options as well as the display function showing previously updated doors when updating are identical with those of the DLC locking cylinder. n
led on it. The offline version enables authorisation profiles to be assigned for up to 2,000 cards or transponders per cylinder. Here again, the management and control can be carried out simply using a PDA equipped with IQ MultiAccess software. Additional options are also available for regulating access controls, for instance the creating of groups for certain doors or employees, access schedules, calendars specifying access on certain special
22
General
b:secure 01|2008
b:secure 02|2008
Allgemeines
2
The new TouchCenter graphic control panel with individualised selection of colours and graphics
The aesthetically appealing graphic control panel for burglary alarm units fuses ease of use with sophisticated design. The 14.5 cm display with colour touchscreen allows the direct input of all functions by simply touching the monitor. The self-explanatory interface with clear touchscreen buttons and symbols ensures intuitive, dialogue-based user prompting. Individualised design options enable perfect visual integration. The colour palette of the TouchCenter display can be altered to blue, green or light brownthe choice is yours. If desired, graphic elements such as a floor plan or company logo can be superimposed as the background image. The TouchCenter for BUS-2 can be used in connection with the burglar alarm units of the MB100, MB48 or MB24 series, as well as the MB256 plus.
Honeywell Security & Data Collection Novar GmbH Johannes-Mauthe-Strae 14 72458 Albstadt, Germany Phone: +49 (0) 74 31/8 01-0 Fax: +49 (0) 74 31/8 01-12 20 www.honeywell.com/security/de info.security.de@honeywell.com
2008 Honeywell International Inc. All rights reserved..
Honeywell Security & Data Collection Novar GmbH Johannes-Mauthe-Strae 14 72458 Albstadt, Germany Phone: + 49 (0) 74 31/8 01-0 Fax: + 49 (0) 74 31/8 01-12 20 Internet: www.honeywell.com/security/de E-mail: info.security.de@honeywell.com
NEWTON21