A Judicious Integration Project: Integrating Security Systems Requires Careful Planning and Testing.

WHO'S IN CHARGE. A system integration project is a complex

undertaking that requires considerable coordination in both the planning

and execution stages. To ensure that all the parties work together, the

organization should form a committee comprising representatives from all

aspects of the project, including the architect, contractors, the

security consultant, integrators, facility managers, and those

ultimately responsible for security in the completed facility. This

committee should be led by the security director.

SYSTEM INTEGRATION holds the promise of offering companies a way to

get the most from their security equipment, but planning and installing

an effective integrated system is not a simple process. Having consulted

with clients on numerous integration projects, we have learned a number

of dos and don'ts. To illustrate these lessons, we'll use the

example of a newly built facility that we'll call Southwest

Courthouse, an eight-story, 24-courtroom, 272,000-square-foot facility

that opened in late 2001. The building's security measures include

64 CCTV cameras, no card readers, and dozens of glass-break sensors, all

of which had to be made to work together. The lessons learned can be

divided into six key categories: who's in charge, sequence of

operation, wiring and fiber connections, documentation, commissioning,

and operator training.

To determine what the organization wants its integrated security

system to do, the security director can have the committee go through a

brainstorming session to create a matrix of likely threat scenarios.

Committee members can then agree on how the system should respond in

each case. The matrix can serve as a template for the installation and

configuration of the system, including the sequence of operations (more

on this in the following section).

Similarly, the organization must decide who, among the contractors,

will take the lead during installation. The integrated building

environment management control systems contractor is often a logical

choice. That person can work closely with an "owner's engineer

appointed by the owner to keep the technical aspects of the installation

on track and to specify rigorous testing requirements.

At the courthouse, no lead contractor was designated. The same

electrical contractor installed the wiring for both the IT and security

system networks. This contractor worked alongside the integrated

building environment management control systems contractor. However, the

electrical contractor worked directly for the owner (in this case, the

public authority), while the other contractors were subcontractors hired

by the general contractor.

As a result of that arrangement, some ditches occurred. While they

were discovered and fixed during the testing process, the project would

have taken less time and been completed more efficiently if there had

been one contractor designated as the project leader or configuration

manager and given ultimate responsibility for ensuring that wiring

connected the right components, that connections fit system requirements and functioned properly, and that the documentation matched the work

done (more on wiring and documentation later.)

Sequence of operation. One of the biggest roadblocks to creating an

effective integrated security system at the courthouse arose because

there was no agreement before the devices were installed on how the

different components of the security system should interact during

different alarm scenarios.

This is the type of issue that should have been addressed by the

coordinating committee.

For example, the courthouse has a fire alarm system, a card access

control system, and cameras monitoring the doors, all of which must work

together in a specific sequence when an alarm activates. Ideally, when

an alarm is triggered, the cameras should begin recording and the fire

system should deactivate the access control system so that people can

get out of the building. Similarly, in a theft scenario, if someone on

the second floor of the courthouse grabs a laptop computer, runs down a

stairwell, and pushes the panic bar to open the door at the foot of the

stairs, the camera monitoring that door should record the theft.

However, that initially didn't happen in the courthouse because

that particular scenario had not been considered and the appropriate

sequence of operation had not been programmed into the system. The

cameras were not set up to activate. Had this scenario been considered

in advance, alternative sequences of operations could have been in

place; ultimately, the problem was solved by having th e cameras trained

on the doors record whenever the doors opened.

Another example at the courthouse involved the turnstiles that

control access to certain parts of the building. In the event of a bomb

scare, which is announced through the alarm system, the alarm system

must "talk" to the turnstile access control system and

deactivate it to release the turnstiles so that occupants can exit

quickly. However, this option was not programmed into the system when

the courthouse first opened, and the oversight was discovered and

repaired only when on-site testing began. Going back to fix such

problems is more difficult and time consuming once the building is open.

Wiring and fiber. While some security system manufacturers tout the

idea of being fully IT compatible, the use of an existing IT network for

security system data communications has some pitfalls. There are some

data security and system performance ramifications implicit in this

approach that must be considered. For example, typical IT networks are

normally not designed to accommodate the large amount of data inherent

in a video system, particularly if high-frame-rate data is required. In

addition, security systems typically cannot tolerate planned network

maintenance outages, and allowing alarm signals to travel across a

network run by another department creates greater exposure for the

security system.

Another concern is that network staff charged with overseeing the

transmission of security data may be focused primarily on IT concerns,

not physical security issues. Giving these additional personnel access

to alarm data and the ability to alter card access rights may also

compromise security.

The integrators at Southwest Courthouse avoided this issue by

creating a separate data network that links the card-key access system

and CCTV cameras across an Ethernet network using Cat-5 wiring, a type

of highspeed network cabling. This network is monitored and administered

by a dedicated staff in the security command center.

Documentation. Ideally, the same person will serve as the project

manager throughout the project, from planning and design through

construction. But since that period can last as long as four years for a

large facility such as the courthouse, turnover may be unavoidable.

Adequate documentation is vital to ensure a smooth transition and proper

completion of the project under a new manager.

Unfortunately, because there was no one contractor with overall

responsibility for the installation and testing of the courthouse

systems, some of the documentation-particularly the documentation about

the cabling-was incomplete. This led to problems after the project was

completed. For example, a contractor was called in to do some

troubleshooting. When he adjusted one part of the cabling to fix a

problem with a panic button, he inadvertently damaged another part of

the cable affecting a card reader connection, because there was no clear

record of where cables ran.

Keep it clear. A different problem can arise when documentation is

not thorough enough. Those creating the documentation must realize that

it will be used by service technicians and others who may not be

specialists. The cabling at the courthouse all leads into a network

communication room, where thousands of cables terminate in a punch-down

block. If the terminations aren't documented adequately, as was

initially the case at the courthouse, it becomes impossible for service

personnel to know which wire is connected to which glass break, for


Keep it current. It is not unusual for a system to be fine-tuned as

it is installed and commissioned. The documentation should reflect these

changes and accurately reflect the final as-built conditions.

This was one area in which the courthouse project worked

particularly well. One example of how updating documentation is valuable

comes from one of the specialized components of the courthouse's

security system.

To meet special security needs for detention areas at the

courthouse, an independent Detention Control System (DCS) was installed

to integrate a range of security functions, including video cameras and

monitors, parking gates, and metal detection/x-ray stations. Initially,

the sheriff's office had requested installation of cameras in the

corridors outside the courtrooms, in the holding-cell area, and in the

parking garage. Later, when the initial plans went through a

value-engineering process to reconcile the plans with the approved

budget, some of those cameras were eliminated. Fortunately that change

was documented, because after the courthouse was occupied, certain

officials questioned why those cameras hadn't been installed, and

integrators were able to use the existing documentation to answer these


Commissioning. All systems need to be tested to ensure that the

various systems function properly both individually and together. This

process is called commissioning.

If possible, even before installation begins, integrators and

others involved in a construction project should assemble the system

components and software, either in a factory-floor acceptance test (for

smaller installations) or in a mock-up at the job site (when many

manufacturers' products are involved). The setup should be as

complete as possible, and it should then he tested against the threat

scenarios that the project committee designated as likely. This process

ensures that the system works as intended and uncovers glitches before

they can adversely affect the installation process, thus making for a

smoother installation.

Naturally, the system will need to be tested again once it's

installed-ideally before it is expected to be operational- but the

duration and complexity of installed-system tests are reduced if the

system has already been exercised in all possible modes on the factory


At the outset, the project team should document how the system

should work and the procedures that must be followed in testing to

determine whether performance objectives are being met. In the case of

the courthouse, those involved in this process included the people who

would be operating the building, the security staff, the sheriff's

staff, and the judges. The courthouse's owner, the municipality,

had to sign off on the process.

An added benefit of involving staff who will later use the system

in the planning for the tests is that they become more familiar with the

specific system configuration, giving them a head start in training to

become proficient at using the system once it is operational.

Additionally, they gain the advantage of insider knowledge.

Project planners should allow for a commissioning period before the

system goes live; they should build this time-consuming step into the

overall construction schedule, Realistically, however, as schedules get

squeezed, it isn't always possible to complete the tests before the

system goes online.

In the case of Southwest Courthouse, some testing was completed

before the building opened. Those tests revealed an incorrect line of

code that prevented the fire alarm and access control systems from

communicating, as well as a signal from the panic button on the

judge's bench that did not reach the sheriff's station. Once

these were discovered, they were quickly repaired.

But integrators were not completely satisfied with the results of

these initial tests. Therefore, commissioning continued during evening

hours after the building was occupied. Every aspect of the system was

checked three times, which took four months.

Operator training. The final--and crucial--element of a successful

integrated security system installation is adequate operator training. A

system with all the connections checked and double-checked and with all

the bugs worked out is still not going to perform the way it should if

the people operating it don't know how to get the most out of it.

The situation at Southwest Courthouse illustrates why it doesn't

always happen the way it should.

Many facilities have several different parties responsible for

security over the course of a 24-hour period--typically an in-house staff handles security during the day, and contracted security personnel

take charge overnight. This was the situation at the courthouse: The

sheriff's department had ultimate responsibility and handled

security operations during the day, while at night responsibility was

transferred to a private security force. Additionally, there were

facility operations personnel who needed to know the system well.

Task-based training. The round-the-clock operation of the

courthouse meant that there was a large pool of people involved in

security operations, working different shifts on different days. So the

first requirement for adequate operator training was to offer an

extensive schedule of training sessions, rather than a few short


The training format is another issue. At the courthouse, the

integrators provided 40 hours of training to the various people involved

when the building opened and another 40 hours after it had been

operating for six months. However, that amount of training proved to be

insufficient, and the integrator was asked to come back for several more

training sessions.

Security managers can better ensure proper education of all staff

members by making training task based, not time based. This means that

contractors should be asked to train operators until they know what the

system is supposed to do and how to use it properly This arrangement

makes it more difficult for the contractors providing the training to

estimate how much training would be required. Therefore, a detailed

agreement is necessary to ensure that everyone involved understands the

contractor's training responsibilities.

Another consideration is where the training will take place.

Training is effective only if it takes place on the equipment that the

operators will be using, so installation of the integrated system should

be complete before training sessions start. The authors' company

trained three different staffs (the sheriff's department staff,

which operated the DCS equipment; the facilities operations staff; and

staff members of the company that provided security at night) at the

courthouse, using the same equipment they used in their jobs.

After more than a year in operation, all systems are now working

together smoothly at the courthouse, but as these examples show, a few

objections were raised before this judicious ending was reached, For

others about to embark on similar proceedings, the lessons learned here

may help their case go more smoothly.

Tom Allen is vice president of Johnson Controls Security Systems.

Derek Trimble is vice president of marketing and new product

development, security solutions, Johnson Controls, Inc.'s Controls


A Judicious Integration Project: Integrating Security Systems Requires Careful Planning and Testing. 1

recommended articles
When Security Means Business.
When Security Means Business.
Good protection proved critical to profits at Communication Concepts, Inc. (CCI), a twenty-five-year old direct mail and marketing firm whose clients made better security at the facility a condition of doing business. Communication Concepts, Inc., (CCI) had always relied on mechanical locks to secure its facility. There were no security officers or electronic security systems the company never saw a need for them. But when two of its clients insisted that CCI increase its security measures as a condition of doing business, the company saw an opportunity not only to keep its customers happy but also to better protect its personnel and other assets. Three months and $250,000 later, the company had an electronic access control system and CCTV surveillance capability that has dramatically improved security and boosted business. CCI was founded twenty-five years ago in Ivyland, Pennsylvania, about thirty miles north of Philadelphia. The company has slowly grown over the years and now occupies seven buildings on about ten acres in an industrial park. The company's main business is to handle direct mail promotional campaigns for a variety of clients, including banks, retailers, and credit card companies. From its 80,000-square-foot lettershop, employees collate promotional materials, insert them in envelopes, and deliver them to the on-site U.S. Post Office for mailing. In all, CCI mails about 400 million packages of all sizes each year for corporate clients. In 1997, two of these clients asked CCI to improve its security. Although CCI had never had a breach of security, the clients felt that mechanical keys were no longer safe enough to protect the many sensitive documents that clients give to CCI as a routine part of business (for example, banks often hire CCI to mail out financial statements to account holders). The company responded immediately, appointing the facility and operations manager to a project team to develop a plan for access control and surveillance. SYSTEM REQUIREMENTS. CCI had a large, permanent staff of 650 employees, plus it frequently used temporary employees from employment agencies. It also had high turnover. These factors combined to make key control difficult. The project team, therefore, agreed that, though the old mechanical locks had worked well over the years, the company now required an electronic access control system. An electronic system would allow the company to remove unauthorized cardholders from the database without having to rekey an entire facility. The company also wanted an electronic access control system that could be integrated with its time and attendance system, which was scheduled to be upgraded. Having a dual system would make it easier for the company to manage both functions, while allowing employees to carry only one card. CCI also wanted a system that could be controlled from a single location. With seven buildings, the company did not want individual control stations in each building requiring someone to make multiple computer entries when changes were required, such as deleting an employee from the card database. In addition, CCI wanted a security system that could communicate over the telephone lines already in place. All of the system components also had to be Year 2000-compliant. Another initial requirement for the system was that it use proximity technology for the access card and that it be integrated with a photo ID badging station. Proximity cards tend to last longer than badges that are continually swiped through a reader. In addition, the company had already selected proximity technology for the upgrade of its time and attendance system. By using the same technology, the two systems could share one database. FEATURES. CCI met with four vendors, examined their access control products, and eventually took bids from each. The access control and video badging system offered by Hirsch Electronics was selected. The system, which was installed by Access Security Corporation of Warminster, Pennsylvania, is run from a password-protected central computer located at the company's human resource (HR) department. Authorized personnel in HR and the facility manager are responsible for administering it. They make employee ID badges, program the system for access privileges, and maintain the database. Card readers have been installed on about forty doors in the seven buildings, including both exterior and interior doors. Another forty-one doors were not equipped with card readers, although they are monitored through the access control system. These doors are locked at all times with mechanical locks, but have been equipped with magnetic contacts that will sound an alarm both at the door and the central station whenever one of these doors is opened. Card readers are wired to a control panel in the individual buildings, with each control panel connected to the central computer via the company's existing fiber optic and copper wire telephone lines. The control panels are located in secure utility closets. Each panel can handle up to eight doors, with multiple panels used in buildings with more than eight doors. The panels keep an independent audit trail of each transaction and are capable of running the access control system for their building if the main computer goes down. This setup allowed the company to centralize access control. Any changes that must be made - such as voiding someone from the system - an only be done from the central PC. Employees need a card to access all buildings as well as interior doors to most departments. Human resources and maintenance, which are both located in the same building (along with several other departments), are the exceptions. Although all employees need an access card to enter the building, the doors to human resources and maintenance are unlocked during regular business hours. This approach was taken because of the high traffic to both departments. The company felt it was important to maintain an open atmosphere. In addition, management thought it would be more convenient to keep the maintenance department open because the crew is always coming and going. Equipment theft is not a problem in maintenance since at least one employee is in the office throughout the day. The access control software was originally programmed to automatically unlock the front doors to these departments in the morning and lock them again in the early evening. However, the company realized that this system could present a serious security risk on days when the facility was not open for business, such as during a holiday. To safeguard against having unlocked doors in the human resources and maintenance departments when the facility was unoccupied, the computer has been programmed with what has been called the "first-man-in" rule. Under this system, the doors to these departments remain locked until a valid badge is presented to the door at the start of a business day (Monday through Friday). The computer then automatically locks the doors at the end of the business day. In addition, because these departments sometimes close early or are shut down temporarily (such as for a large staff meeting in another building), the company has created a "disable" and "enable" badge. In cases in which all HR personnel must leave their department during regular office hours, the office can be locked with the disable badge. The doors remain locked until an employee uses the enable badge to unlock them. HR employees can enter the department during these times, but they will need their access cards to do so. Other employees cannot access the department at these times. (The first-man-in rule does not apply when the disable card has been used.) The disable and enable cards are kept in a secure location and can only be used by the supervisor on duty. The system keeps an audit trail that records the time and day they were used. The sales department, which is in a separate building from HR and maintenance, has special access control arrangements as well. To enter the building, employees and customers must walk through two glass doors. The front door is programmed to unlock automatically during regular business hours, but the second (interior) door remains locked. A receptionist is stationed in the lobby with a clear view of the doors. Visitors can enter through the first set of doors to get out of inclement weather. The receptionist can then press a button and release the inside door to grant them entry. Only those who are recognized by the receptionist or who have an appointment are granted entry. Employees use their ID cards to gain entry. The reader is outside both sets of doors. Since the outside door is already open during normal business hours, only the inside door is unlocked by the system. During nonbusiness hours, an employee presents his or her card to the reader and the outside door unlocks for five seconds. The inside door also unlocks, allowing fifteen seconds. Card technology. Cards are issued by the human resource department. However, instead of placing employee photographs and information directly onto a proximity card, the company makes a digital photograph of an employee and, along with the employee's name and other corporate information, prints the photo onto a thin PVC badge with an adhesive back. The PVC card, which has no technology on it, is then attached to the front of a proximity card. This method turned out to be less expensive than printing photographs directly onto a proximity card. To print employee data directly onto a proximity card, CCI would have had to purchase a particular badge, costing $6.95 per card. The proximity cards chosen instead cost only $3.50 per card, plus $1.10 for each self-stick PVC badge. The company can reuse the proximity card after an employee leaves. HR simply removes the PVC photo ID badge from the proximity card. The card is voided from the system, reconfigured with a new code, and issued to another employee with a new PVC photo badge attached to it. This approach also saves money when cards are misprinted. If an ID badge has a mistake, the company need only throw away the PVC ID card - not the entire proximity card. To further cut down on cost, the company has established a fee for replacement cards. Before receiving their ID badges, employees sign an agreement that requires them to pay $10 to replace a lost card. The policy has resulted in fewer lost badges. Loading dock doors. CCI has fifty-six loading docks throughout its seven buildings, each secured with a locked overhead door and an alarm. The company wanted to use electronic access control on the loading dock doors but felt that it would be too expensive to install a card reader on each one. Instead, the company purchased Hirsch's Scramble Pad. With this system (which was integrated with the card access system), one digital keypad is used to control access to a group of several doors. For example, one building has fourteen garage doors in a row, all controlled by one keypad. Each door is secured and monitored with a magnetic contact that is wired to an access control panel. To open a specific door for deliveries, an employee enters a personal five-digit passcode into the keypad (also wired to the panel) along with the number of the door to be opened. The appropriate contact is shunted and the alarm is disarmed for thirty minutes, enough time to unload a truck. The main PC maintains a record of who opened a loading dock door and when. The keypad offers an additional security feature. Instead of having numbered push buttons in numerical order on the face of the keypad, the numbers appear on an LED touchscreen on the front of the keypad. Before an employee can enter a passcode, he or she must activate the keypad by pushing a "start" button. The start button scrambles the numbers on the screen so that they are in a different order each time, preventing an unauthorized person from guessing an employee's passcode by watching the pattern of how the number was entered. The keypad system also allows the human resource department or facility manager to disarm the alarms and locks at certain loading docks during designated hours of the day. These docks have a high volume of deliveries but do not require high security. The company decided, therefore, that it was better to have them open at all times during regular business hours. Reports. From the main computer, the facility manager and authorized personnel from the human resource department can run reports detailing the activity within the system.This feature has been especially important in helping the company keep track of false alarms. Each month, the facility manager runs a report on all alarms for each building. The reports are given to building managers, who are responsible for eliminating or decreasing the number of false alarms. Other reports are run to determine when certain events took place. These include reports on how many people accessed a particular door on a given month and how many people were denied access to certain doors. By analyzing this data, management can assess how the system is working, which may lead in the future to additional security measures or programming refinements. Maintenance. Although CCI entered into a service agreement with the installer, Access Security, for general maintenance of the access control system, the company wanted to be able to replace and fix some of the components - specially the electronic locks - if they broke down. To that end, the maintenance department was given two spare electric strikes and trained on how to replace electronic locks. Also, to make it easier to replace strikes, all of the wire connections were installed with quick-disconnect terminals, which allows any qualified maintenance person to reconnect the wires without having to strip and crimp them. DOOR ALARMS. As mentioned earlier, forty-one doors were not equipped with card readers. These doors were to be alarmed at all times, and exit from them was prohibited. Limiting the number of readers to the minimum needed saved significantly on costs. (Alarms cost about $200 per door, while a card reader and electronic lock run about $3,000.) While some of these doors had been used in the past, most were not main throughways. For example, several simply led out to a grassy field. Under the new configuration, when anyone exited through an unauthorized door, multiple alarms throughout the building would sound, requiring management to respond. During the first two months of this system, there were many false alarms, as staff were accustomed to leaving through any door. The facility manager solved the problem by putting yellow caution tape across the doors that had the most false alarms. This made everyone aware that the doors were off-limits. After several months, the tape was removed - and the false alarms stopped. CCTV. With the access control system in place, CCI has begun installing a black-and-white CCTV surveillance system. There are currently twenty-two cameras monitoring two buildings, with plans to expand the system to cover all of the buildings over the next few years. The cameras monitor the building perimeters and have a view of most of the loading dock doors and the regular doors that have access card readers. The company is considering the use of cameras inside the buildings as well. Each camera is wired to the central station over fiber optic connections. Images are recorded continuously onto T160 tapes; only three videocassettes are needed to record an entire week. By securing its facilities, CCI has also secured two important clients and given itself a competitive edge in the marketplace. CCI's business is not security. But as its management has now learned, security can be a critical component of any business - whatever a company's core mission might be. Daniel Cogan is vice president of Access Security Corporation, Warminster, Pennsylvania, where he is responsible for system design and integration. He has worked in public law enforcement or private security for more than twenty years. He is a member of ASIS.
Biometric Access Control System and Cctv  Reliable Security Solution
Biometric Access Control System and Cctv Reliable Security Solution
Biometric Access Control System and Security GuardingSecurity guarding is becoming more important with every passing day because the security concerns are increasing. Vandalism, robbery, theft and other petty antisocial activities are increasing at a rapid speed. Recession has made the situation worse because many people who were laid off often got involved in such anti social activities. This is the reason why our house, office or commercial space is not completely safe and secured anymore. Access control system (like CCTV, biometric access control system, etc.) is becoming more and more important for security guarding. One of the best known access control system is Biometric Access Control System. When biological data are measured through scientific way and then analysed in a strategic manner, the process is known as Biometrics. Every human body part has some characteristic feature and these are aspects that are considered as 'biological data'. Fingerprints, facial pattern, iris and retina of eyes, hand measurement, DNA and others are some of the features that are unique for every person. This feature is used in the Biometric Access Control System. When such a system is installed at a particular place (say, a office, house or other commercial spaces), then the main motto is to give access to specified number of people only to the premises. Thus, characteristic features (fingerprints, facial pattern, iris and retina of eyes, hand measurement, DNA) of certain people are collected and then fed into the Biometric Access Control System. Once a visitor to the concerned place tries to go inside the premise then he or she is required to pass through that system, where he or she is required to match the biometrics with the input already given in the system. If all the metrics match, then the person is allowed in the concerned premise. Biometric Access Control System - The Process in BriefIf any of the characteristic features doesn't match with the already given features in the Biometric Access Control System, the system will not allow access to that particular person. The process followed in this particular access control system is given below:1.Identification2.Verification3.Authentication4.Access given or rejectedThis secured process has made Biometric Access Control System as the most secured access control system.More Information on Biometric Access Control SystemsTwo types of Biometric Access Control systems are most popular:a)Face Recognitionb)Fingerprint recognitionIt has been considered by many that this system is used in the high security zones such as defence or nuclear power plant area. However, it is now used in the commercial complexes and also in some houses. Some of the most popular ones in the schools and offices are fingerprint and face recognition Biometric Access Control systems. This biometric system is widely used in United Kingdom and is very popular in the business community. In fact, this system is so popular that it is now being used in the personal spaces too. Biometric Access Control system has become more popular among the English people after the 9/11 terrorist attack in United States of America. In fact, it has become so popular that UK has recorded the highest number of such system. Install Biometric Access Control systems and CCTV for security guarding and make your place secure and safe.
How to Get the Most Out of Your Access Control Systems
How to Get the Most Out of Your Access Control Systems
Security of your property is never an issue you can overlook. To know how to enhance the security of your home or business, you must become familiar with the basics of different security technologies. Besides providing a fool proof security to your property, access control systems also help integrate a few components to optimize their functionality. Here are the ways to maximize the benefits of your Access Control Austin systems. Place the cameras strategically When an incident of security breach happens in your building, you must resolve the issue with top priority as well as have a proper evidence to do so. This is necessary to see that the incident does not repeat itself and the persons responsible for the incident are made accountable for the same. To achieve this end, integrate your surveillance cameras with the access control system of the facility. Integrated security cameras are a sure way to streamline the process of access control. Integrate the alarms The main purpose of electronic doors is to replace the conventional keys or to achieve further automation features in order to enhance the property security. For quite some time, these types of locks are found installed in the cars. These days, some advanced technologies enable keeping the doors in locked condition until the user enters the right credentials that can signal the door to be unlocked once. This system ensures that those persons who do not have access permission to the campus are not let in. Different access levels A keypad reader can be integrated with the access control system to input the information required from a person to provide access. Proximity card reader is the most popular system used in commercial buildings. The system functions if the card is brought within a few inches distance from the reader. The reader is configured to gather the identification information contain dint he access card for checking in. the identification information is forwarded to the controller for the sake of processing. After processing the information, the system will permit or deny the access based on the genuineness of the credentials. Due to the unique technology employed, each of the cards can only talk to the reader with which it is configured. These card readers can be used to achieve varied access levels. Different personnel of the company can be given select entry to the different segments of the campus. Depute a security officer Once the cameras and alarms are integrated with the access control system, you also need someone to monitor the system. To entrust this task, you must find a knowledgeable professional who can take the necessary action during an emergency situation. Rightly trained security officers also help in taking measures to see that the concerning situations do not repeat. If an individual acts suspiciously in the cameras, the security officer will know how to react to the situation. Therefore, to get the most out of your access control system , you will certainly need a system that also has people familiar with the technology and processes.
New Telescope Will Let You View Earth From the Moon by 2015
New Telescope Will Let You View Earth From the Moon by 2015
With our hundreds of telescopes and observatories, both here on Earth and floating in space, we have an amazing view of the universe around us, but starting in 2015, we're going to be able to look where no telescope has showed us before - our own planet.The International Lunar Observatory precursor (ILO-X) will be the first private telescope launched to the Moon, featuring an internet-access control system that will let anyone on Earth use it via their web browser, and, as suggested by the name, this telescope is just the precursor to a permanent telescope to be set at the Moon's south pole sometime after.[ Related: Moon's craters may harbour alien minerals from meteorites ]The telescope was commissioned by the International Lunar Observatory Association (ILOA), and was designed and built by the private corporation Moon Express Inc. Representatives of both were on hand during the announcement of the project at the ILOA Galaxy Forum Canada 2013, in Vancouver on Saturday."The primary goal of the International Lunar Observatory is to expand human understanding of the Galaxy and Cosmos through observation from our Moon," said Steve Durst, the founder and director of the ILOA, in a press release. "We are extremely excited about sending the ILO-X to the Moon as soon as possible, and continuing our progress toward a permanent human presence on the Moon."Moon Express is the company behind the Google Lunar X Prize Competition, which is pitting privately-funded teams against each other in a race to see who can be the first to land a robot rover on the surface of the Moon. The prizes for the winning team will total $30 million, but Moon Express hopes that the payoff for humanity will be much larger. It's their goal to develop new, privately-funded missions to the Moon, not only to develop the Moon for our benefit here on Earth, but also to establish a permanent presence on our natural satellite.[ More Geekquinox: Precognitive robot learns to predict our future needs ]The way the IOLA and Moon Express are going about this is perfect, too. Private industry will be able to drive space exploration far faster than public organizations, especially when it's done by companies that are dedicated to the goal, rather than governments whose resource are usually pulled in numerous different and competing directions. It's the involvement of the public that will get them even further, though.We all saw Chris Hadfield's adventures on the International Space Station, as we checked out his Twitter feed for new photographs, and the Canadian Space Agency's YouTube channel for his latest videos. Having those views from orbit, and details about living in space, really got people's attention and caused renewed interest in the space program. By putting a telescope on the Moon, the public will be able to get a sneak-peak at the spectacular view they'd be afforded if they lived there or at least visited, generating a wave of interest for future lunar missions. Also, as an added bonus, having that awe-inspiring view may actually help us to save planet too.(Photos courtesy: NASA, The Canadian Press/HO-Moon Express)Geek out with the latest in science and weather.
Biometric Access Control System Cctv Makes Commercial  Residential Space Secure
Biometric Access Control System Cctv Makes Commercial Residential Space Secure
What is Biometric Access Control System?Biometrics is the scientific measurement and strategic analysis of biological data. When we say 'biological data', we refer to the unique characteristic features of certain body parts of human body. Some of these features include facial patterns, measurement of hand, retinas and irises of eyes, fingerprints, DNA and many more. This feature is utilized by Biometric access control system to control access of different people to particular areas. The reason behind the same is the uniqueness of the characteristic features of some of the human body parts, mentioned above. It is being found that no two individual posses the same DNA structure, fingerprint, retina and iris of eyes, etc. This characteristic feature helps people get distinguished from one another. In the Biometric Access Control System, some of these characteristics of certain person are fed in the access control system so that it can help the system to identify, verify, authenticate and ultimately access control.There is a general notion that Biometric Access Control System is used by intelligence agencies only. However, nowadays, these systems are used by residences and commercial buildings too. The rise of vandalism, terrorism and theft has pushed the businesses as well as the residences to use Biometric system to control access of people to their premises. In order to safeguard valuables and also to control access to specific regions, Biometric Access Control System is used and the success rate is 100% guaranteed. This is the reason why the commercial buildings as well as the residences are using this access control system. Biometric Access Control System - How does it Work?From the above we have come to know about the concept of Biometric Access Control System. Now, let elucidate about its working. This system works on verification of certain body parts of human like finger prints, DNA, etc. In fact, a single Biometric Access Control System is capable of considering more than one characteristic feature of our body. In fact, such an access control system verifies different criteria. It then scans all the characteristic features of the body parts of that person who is seeking permission to access the secured resource. Once the scanning process is done, the scanned features of that person are matched with the data fed in its database. If the data matches with that of the person then he or she is allowed to access the secured resource or area. In case the feature is unmatched, the person is not allowed. What is CCTV and How Useful is It as Access Control?The full form of CCTV is Closed Circuit television. It consists of a series of closed circuit cameras that are fitted with specific monitors to which the signals are transmitted. This should also be remembered that the range of transmission of signal to the specific monitors is limited. Note that the transmission of signal in case of CCTV system is not done in an open manner like that of the broadcast televisions. With the help of these cameras, commercial buildings, airports, ATMs and even residences can be guarded. This is a unique security guarding system that helps in monitoring the different nooks and corners of a place, even the ones where manual guarding is not possible. Nowadays, shops, commercial buildings, casinos and military bases are using CCTV access control systems for properly guarding their premises.To make the premises of residential areas and commercial spaces completely secure, one can install Biometric Access Control System and CCTV system.
How a Biometric Access Control System Works
How a Biometric Access Control System Works
In earlier days, password system invented first for security. As time progress, hackers found the ways to break the password security systems. After that identity cards invented. Still, in some companies this system is working. It is good and fast and has some other advantages as well. However, the issue arrives at more confidential places or resources still have some doubt in mind. Is it enough for security? I think, no not at all. We need a more secure system which concerns some other factors. Biometric access control systems are the answer.As I have stated earlier, it is based on several physical and behavioral aspects.Physical TraitsThese are related to shape of our body. Let's take some example. Fingerprint, it must be unique for all people. Palm print is another trait. Face recognition is another one. In face recognition, the factors include distance between two eyes, distance between nose and ear, size of the nose, any blot, blemish etc. Latest technology contains eye retina scan. Over all, all the factors which uniquely identify a person.Behavioral TraitsThese are related to behavior of the person. For example, typing rhythm. System requires typing some words and identifying the person based on the rhythm. Other trait is gait; a slight difference must be there in the gait of every people. Another factor is voice. There are so many systems already in the market which works on voice recognition. So many other aspects are in this category.How biometric access control system works? It works on verification. A single system can consider more than one trait, which is discussed earlier. Means system verify all criteria. System scans the person who wants to access secure resource. Then match that data with the captured biometric data stored in database. On that basis, system verifies the person who he claims to be. If system founds that person as an authorized person then allows him/her to access the secure premises or resources. Another use of biometric system is to identify a particular person from the bulk of people. System works same way as in the previous case. It scans the people one by one and matches the criteria. When match happens system alerts the administrator.At the end, little bit discussion on performance against the investment. It is one time cost system. It takes almost nil maintenance. It requires update of the database. You need to enter the data of authorized persons first, against which the system does verification. Security level of biometric access control systems is very high then the older systems based on password or identity cards. These systems require creating duplicate biometric traits to hack, which is very hard, in-fact nearly impossible. Therefore, no doubt in mind about the security that biometric access control system provides.Today, biometric access control systems are worldwide popular systems. Even biometric passports are in the trend. Most of the countries have adopted biometric passports. Looking at the threat of terror attack and other threats biometric passport is the best option. Biometric access control systems are very fast. The premises, where thousands of people pass every day, these systems are very useful. At last, "prevention is always better then cures". So takes some security steps to prevent the attacks and make your life secure.
Artificial Intelligence Entrepreneur Torben Friehe on Why He Is Eyeing Africa
Artificial Intelligence Entrepreneur Torben Friehe on Why He Is Eyeing Africa
German-born tech entrepreneur Torben Friehe is the CEO of 1aim, a full-stack AI building platform that is helping businesses use and manage their commercial spaces more efficiently. Among other things, 1aim develops and produces access control systems which enable users to open doors with mobile phones. According to Friehe, 1aim is now in talks with commercial real estate developers across the region, with a particular eye on South Africa, Nigeria and Angola, to implement his platform.I had the opportunity to speak with him in London this week to learn about 1aim and his regional ambitions.There's much talk about 1aim in the start-up community. Can you tell us more about the company? Sure. We are creating an AI platform that changes how buildings are used, managed and secured. I realize that sounds a bit ambiguous, so let me give you some more details.If you look at corporate expenses, the two most significant are salaries and real estate. On one side, you spend tons to make your employees effective. You give them software tools like Slack and Dropbox. You make a real effort. On the other side, even though real estate is your second largest expense, you have no idea how well you utilize your space. Research shows that 40 percent can go underutilized. It's an insane figure. This means inefficient office space management costs U.S. businesses $113 billion annually. It's a massive pain point, but one that has flown under the radar because the technology to assess it has been so poor.Until now, companies didn't have the technology to solve this problem. That's what we offer them today - a full-stack AI building platform. Think of us as a central nervous system for office buildings. Our platform collects all the building data, interprets it intelligently and performs a series of actions as a result. It tracks, monitors and analyzes how a business uses real estate, and also creates operational recommendations.Our platform consists of hardware, software and server infrastructure and has four main components - secure access and identity management, data collection and analytics, tools allowing you to plan and allocate space efficiently, and an improved smart-workplace user experience that creates a WeWork-like climate.We have already rolled out phase one, our LightAccess Pro access and identity management system, which allows businesses to manage employee access rights and identify space usage patterns.In phase two, they will be able to analyze space usage in real time and perform tasks to improve efficiency. For instance, our AI will secure areas as employees leave, manage utilities, intuitively merge building and inventory management systems, and create a real-time workplace model that reveals inefficiencies and pilot-tests strategies.We've heard of products like Nest for residential users, but they have limited functionality. That's a bone of contention with the Internet of things (IoT) industry. Too many companies offer the "same old product with a chip inside," like a blender you control with an app. The smart element doesn't add value. Where are you with the first phase of your platform, LightAccess Pro? Give us an example of what it can do.Sure. Picture this:You're the president of a big public company. You have a 30-acre campus in France, and international offices covering 600,000 square meters. A core part of your team is young engineers who do complex technical work.You understand how hard it is to find the right engineering talent. So it is a priority to keep them happy. Instead of hiring a group of engineers in each country of operation, you offered your French team to work on global shifts for extra pay, spending a few months per year abroad at your offices. Since they are young and motivated, they agreed. But after the first few trips, things took a bad turn.Retention rates fell. When you raised the issue, you learned that the traveling had been a nightmare. It was a headache for the engineers to get their identification authorized, find where to work, and receive access rights when they arrived to a new location. They didn't even have Wi-Fi, and couldn't print or buy food in the canteen.With our platform, you overcome these problems. You can provide access rights over vast commercial space and monitor, control and analyze the movements happening inside.After you implemented our platform, your tens of thousands of global employees were able to instantaneously enter any building required for their job. All the sudden, your hovering French engineering team was able to move between your offices without needing to exert additional effort to get things up and running.Our platform also allowed you to see who was entering and exiting every door across your global commercial space, and to learn that 30 entire floors were sitting empty.After talking it over with your management, you decided to use the space productively. You assigned space using our data insights and not only saved an annual cost of tens of millions of euro, but also earned extra revenue from leasing space to other businesses.Can you tell us how you started the company?My co-founder, Yann Leretaille, and I have been friends since high school. We loved science and technology.We collaborated on a number of projects at the time. The most interesting was an international student competition, in which students build CO2-powered dragsters. The project grew out of my love of racing.We won several prizes for our designs and were later appointed competition ambassadors.After graduating, we enrolled at university. But studying was never our thing. Instead, we continued working on different projects together.Yann loved cryptography, and somehow came up with an idea for a technology allowing online IDs to be created while authenticating them with offline devices. We combined his concept with a technology letting you use any phone to transmit data. We saw how many problems were caused by our university's access control system. So we thought, "Hey, let's build an access control system." And that's what we did.It started as a simple idea - to open any door with any phone.But during our initial pilot tests, we saw that access is the centerpiece of so many other systems in a building. Deutsche Telekom, with whom we held our first pilot test, asked us if we could also record who went into which meeting room when. We said, yes. Then they asked if we could track how people moved in their space. They said they wanted to record that data for years, but couldn't find a solution. We realized the technology in buildings today is mostly 20th-century leftovers, and that wouldn't cut it in this day and age. Companies want to record their data - especially building-related data that is valuable and can't be otherwise recorded.Access is the ideal way to record this information. Collecting data with an access management system gives you quality data connected to your ID that you can't get anywhere else.This is when we came up with the idea for our platform.So, long story short, Yann and I dropped out of university in 2012 to work on the project full-time.We opened 1aim in 2013. We lived and worked in a friend's office furniture warehouse for two years, sleeping under our desks and basically living hand to mouth.But we grew, and in 2015 started securing major investments.The first was from venture capitalist Lars Hinrichs, founder of XING, a social network for professionals that is often called Europe's LinkedIn. This allowed us to wrap up our development of LightAccess Pro. British tech entrepreneur Brent Hoberman also chipped in, as did Matthias Ummenhofer, the former head of venture capital at the European Investment Fund. Another big investor was Florian Moerth, who is involved in EU tech start-ups.In 2016, we attracted investment from the Hormann Group, the world's fourth-largest door manufacturer. It has several billion in revenue and 1,600 employees globally, offering on-site door installation and support in Europe. The partnership is nonexclusive and puts us in the enviable position of having a leading player selling and installing our products through its distribution channels.I want to ask about security, because this is a critical issue for the IoT industry, as we have seen recently with the Bluetooth vulnerabilities known as "BlueBorne." I know LightAccess Pro uses Bluetooth. What are you doing to ensure you have airtight security?First, we do not see ourselves as an IoT company. As you noted, the IoT industry is flawed. Trendy, but flawed. It was a powerful concept, but in the past several years we have witnessed its heart-wrenching commercialization. Now, any product with a chip is "IoT" - from blenders to wooden toy robots whose eyes flash when parents press a button on an app. Development cycles are short, companies hire external engineering on a project basis, and security is an afterthought.For us, security is the priority. It has to be because we service businesses. They answer to their clients, personnel and board, and entrust us with their safekeeping.This is why all our hardware and software is designed and manufactured in-house, so we can leverage 360-degree control over the technological process. We employ 25 top-notch mechanical, electrical, software and product engineers. Some worked in the defense sector - in the military and at Boeing. Others have been coding since they were kids and exemplify everything great about those "good hackers" you see on TV.LightAccess Pro offers Bluetooth and three other technologies, including our proprietary protocol. Our users mostly turn off Bluetooth. We think businesses should prioritize the other technologies, because Bluetooth has inherent flaws. We rarely encounter businesses who want to use it, but some still do. We have minimized the associated risk.What "BlueBorne" shows us is that there is an issue with insecure low-level stack implementation. I can't offer an easy solution. But I will say responsible companies shouldn't just throw up their hands and say, "These things happen." As an industry, we must rethink how we implement stacks and introduce new best practices.So you're looking to make an entry into Africa; what's so compelling about the African market?Urbanization and mobile penetration.Regional hubs are experiencing an unprecedented demand for quality commercial space due to economic growth and urbanization. Lagos is an example. Modern commercial real estate is being built and the price is high at up to $100 per square meter. This means tenants will want to use space efficiently.Our LightAccess Pro hardware and software also interfaces with your phone, so mobile penetration rates are key. And they are skyrocketing in the region, with 1 billion devices on the continent.Young urban Africans are also leapfrogging wealthier peers in Europe as far as certain mobile technologies are concerned, like mobile payments. Many are offered by local players that learned to deal with the lack of expensive data-consuming smartphones.So our building solution fits in perfectly. It works with any phone, even feature phones. It also helps companies deal with issues of scale by maximizing space efficiency. Data usage is minimal and there's no need for a constant Internet connection.AI is seeing a lot of press. How will AI and algorithms impact the world economy?Their impact will be decisive. But there is an ethical dimension that is all too often overlooked. It's important for the industry to start considering the ethical implications of technologies during the actual development process. Yann and I found that these issues worry many young people today. But industry stakeholders are behind the curve. This is why we teamed up with colleagues to open a nonprofit called the Good Technology Collective, which addresses issues at the crossroads of technology and society. We've attracted high-profile experts to our council, including Annie Machon, the activist, Ida Tin, co-founder of the popular app Clue, and LucianoFloridi, the Oxford Internet Institute's professor of ethics of information. We have greatly been aided in this process by our founding member, Cy Leclercq, and our economist and researcher Nicholas Borsotto. E-mail: mfon.nsehe@gmail. com
Access Control System for Better Security
Access Control System for Better Security
When it comes to overall security, access control system plays a pivotal role. From managing your office secured area to highly confidential stuff, the right method of security makes all the difference. The access control device we use for everyday basis shows the secureness of our office, in addition to other threats. In addition to the biometric access, card access control systems are essential for a simple security purpose. We all hear all the time about the security maintenance in our office, but in reality, we don't care to get the perfect security from the intruders. Some access control systems play an essential part and are used in a highly secured place like government premises. Access Control is a system used to strengthen the organization, institutes, firms and industries with complete security. We're within the scenario to guard our place against the intruders due to security purpose. These days' access control system with the most-recent technology is preferred for high security. Managing the access to a particular area is simple as never before, we are able to swipe the card at the entrance or use our physical identities to access the protected area. Important data corresponding to the database and network could be protected with the help of an access control system. Card Access Wherever you need to be manage access without relying on the doorkeepers, you might use swipe card readers and magnetic locks to your workplace entrances. Magnetic stripe reader is named one of the best readers due to the excellent features. Swipe card system and software are most popular all around the world due to tremendously rising security threats. Access control system makes use of ID cards, which recognize the intruders by matching the legitimate portrait cards. Here on this system, we want clear printing and portrait id cards. The best access control system for an office and industries includes RFID card, Fingerprint and Face Recognition that has various features. The best-known RFID card access control systems are manufactured by ZKtech. Proximity in addition to the smart card reader is an excellent source of perfect security that helps in the complex situation and is the basic security of the office. Biometric Access Biometrics include all the device, which identifies the human physical characters like the fingerprint, retina and face recognition. Fingerprint access control system is especially good for the high-level security and helps in building the office security against all intruders. Retina access is considered as one of the reliable access control systems, which help in overall security. Face recognition, which is clarified access control system, are literally the ultimate device to secure the banks and government premises. All the innovative access control system play an essential part in your office security. All the biometric access control systems like Series iFace, WI-200, Hand Punch are security packed. Moreover, card access machines are most popular such as the RFID, Proximity , and Smart Card Reader along with Keypad reader like keypad reader 5399. Installation and support are extremely important to help the access control system to work perfectly. From device integration to security check we need a highly trained technician.
What Is Facial Recognition Software?
What Is Facial Recognition Software?
Facial recognition software used to be fodder for sci-fi and futuristic type movies. No one thought that while watching these shows that the technology demonstrated within would be a reality in the not too distant future. However, its time has come with more mainstream businesses implementing this technology with its heightened security. Face recognition access control systems are the next step up in higher security.What is face recognition? Face recognition software works by creating a digital representation of a person's facial image. It does this by closely analyzing the structure of the face using features such as nose, cheekbones, lips, and eyes. Essentially it builds a detailed map of the angles, lines and features of the face and then converts it to a file containing all of the information that was gathered during the verification process where the face was associated with the person being added for access. The face is mapped out in detail during this process so that an incorrect match or false denial is minimized.Facial identification uses one of two methods to establish identity. The first is geometric where distinguishable characters are compared. The second, which is photometric, uses an analytical way of converting the features of the face to a numeric value. This value is then compared to the templates stored within a database. The identity of a person is first established when they are entered into the system. Pictures are taken from several different angles to establish a clear map of the features of the face. This is then entered into the system. When the person then requests access, the system will compare the value it sees with the values that it knows are allowed to have access.A large advantage to face recognition software is that it eliminates human error to a large degree. Someone can try and talk a security guard into allowing access, or reproduce an access card. However, for obvious reasons, it would be difficult to duplicate someone else's facial features. Even identical twins have subtle differences that are picked up by the software. These subtle differences are what make the software hard to trick or fool. When you consider the many nuances of someone's face, including their expressions, it becomes obvious why this would be so difficult to get past a facial recognition access control system.Facial recognition software is a bit more expensive up front but can offer savings over the long term. There's no need to maintain and replace access cards. Access cards can be lost or stolen which requires more administrative maintenance as well as the additional cost of replacing the cards. Without having to have someone to maintain the cards, or pay for new ones, it soon becomes evident that excess cost is being eliminated. Additionally, access will never fall into the wrong hands by theft or loss. When an employee leaves their employment, keys and access badges are not always turned in. Using a person's face to gain access means that business owners will never worry about where their access badge or keys ended up. This provides a much easier way for a business to maintain security.Identity theft has become a major concern in the modern age. By simply gaining access to someone's pertinent information such as date of birth and social security number, thieves are then free to open lines of credit at will using this person's information. This can devastate an individual both professionally and financially and often takes quite a bit of time to resolve. With the use of face recognition software, would be thieves are going to find it increasingly difficult to assume someone's identity and credit rating. Many people are unaware that identity theft has occurred until they either begin to get the bills, or they apply for credit themselves and are declined for excessive or bad credit. With facial identification, it would be difficult for someone other than the actual person to be able to use social security numbers or information that isn't legitimately theirs. Face recognition software has many promising uses for the future. Major credit card companies are experimenting with ways to use it to establish a card holder's identity before being allowed to purchase. This minimizes the substantial losses to both credit card companies and consumers that occur each year.Biometric security is becoming more widely available to the general public. Limited to government agencies in recent years, it was simply to cost prohibitive for most businesses to implement. Much like DVD players, microwaves and other electronics that were very expensive in the beginning, the price of facial recognition software has begun to drop, allowing more people to implement this efficient security strategy.A facial recognition access control system can provide any business with enhanced security and minimal operating costs. This new age technology has now taken its place as standard among preferred access security systems and is sure to continue to be well into the future.
Planning Commission Renovates 2 Toilets at Rs 35 Lakh
Planning Commission Renovates 2 Toilets at Rs 35 Lakh
NEW DELHI: Planning commission, which is mired in a controversy over what constitutes the poverty line, has spent a whopping Rs 35 lakh for renovation of two toilets here, an RTI reply has revealed. The commission, which came up with a controversial poverty line figure of Rs 28 per day for an individual, has spent Rs 30 lakh for the renovation of the toilets on the lines of Indira Gandhi International Airport. An additional Rs 5.19 lakh was spent on installing door access control system for the toilets at Yojana Bhawan. The access control system will mean only those people who have been provided smart cards can use these swanky toilets. "Cost of installation of door access control system is Rs 5,19,426 for two toilets. Cost of renovation of two toilets where door access control system is installed is Rs 30,00,305," the reply to activist Subhash Agrawal said. According to the RTI reply, 60 smart cards have been issued to the officials of the planning commission which have to be used to get access to the toilets. The commission had also decided to install CCTV cameras in the corridors leading to these toilets as the officials said there were instances of pilferage in the toilets. Estimates have been sought from the CPWD. Apart from the poverty line estimates issue, planning commission deputy chairman Montek Singh Ahluwalia had come under criticism after a newspaper, based on RTI reply, reported that foreign travel expense incurred by him between May and October, 2011 was a staggering Rs 2.02 lakh per day. Another report said that he undertook 42 official trips (between June 2004-January 2011) of 274 days at a cost of Rs 2.34 crore. Refuting the inferences drawn in the later editorials, Ahluwalia had said that foreign travels are necessary for discharge of official duties.
Shenzhen TGW Technology Co.,Ltd is the leading access control solution provider for vehicle intelligent parking system, license plate recognition recognition system and pedestrian access control turnstile and face recognition terminals.

Shenzhen TigerWong Technology Co.,Ltd

Tel: +86 0755-23773884 

E-Mail: info@sztigerwong.com

Add: Room 601-605, Building 6, 1980 Science and Technology Industrial Park,  Longhua Street, Longhua District, Shenzhen


Copyright © 2021 Shenzhen TigerWong Technology Co.,Ltd  | Sitemap