The SlimLane 950

With many municipalities pushing through ongoing restrictions and ordinances governing social distancing and COVID related guidelines, many companies are facing a difficult reality; comply or fail. Serious fines and health department shutdowns have been seen for those who fail to accommodate restrictions on people spacing and masking, and so, companies are left with little choice. For some, this may mean cameras with the ability to detect crowding and masks, but for those with a high volume through a secured area, the solution is a contactless turnstile. These turnstiles read credentials without contact and ensure compliance with remaining socially distant and out of contact with others.

The SlimLane 950 double swing door security entrance lane offers a high bidirectional throughput and uncompro-mising security. With its transparent, elegant design and minimal footprint, the SlimLane 950 is designed to integrate perfectly into any architectural style. Its wide lane ensures easy access for people with reduced mobility, wheelchairs, large carts or wide objects. Equipped with high processing capacity and an exclusive detection system, the SlimLane 950 guarantees accurate user tracking and prevents any unauthorised use.The SlimLane 950 is a modular product that can be installed as a single or a multi-lane array and can also be combined with the SlimLane 940 standard lane model.

 

Its features are designed with our new world in mind and include:

  • A handrail frame: steel beam with RoHS anti-corrosion zinc plating treatment and stainless steel posts, to include photoelectric cells for user detection and the logic control board.

  • Self-supporting kinematic steel frame with RoHS anti-corrosion zinc plating treatment. The frame contains the electromechanical drive assembly for the swinging obstacle and the electronic control boards.

  • Clear, 10 mm thick tempered monolithic glass obstacles, swinging in the direction of user passage.

  • AS1167 logic control board, equipped with ARM technology and the Linux operating system, ensuring advanced traffic management. An embedded Web server, accessible by a simple web browser, offering an interface for the configuration of functional gate parameters as well as a complete diagnostic and maintenance tool.

  • Transfer of information from XML-RPC protocol through an Ethernet or USB interface, and dry contacts: passage authorisation, passage information, reader locking, fraud, equipment failure.

  • Orientation and function pictograms indicating gate and passage status to the user.

  • Proprietary DIRAS detection system, consisting of a high-density matrix of infrared transmitter/receiver photocells beams. It follows users progression through the gate as well as ensuring their safety during opening/closing of the obstacles.

  • Finishing plate for post.

 

 

Brushed #4 AISI 304L stainless steel housing is used for the panels, housing, and frame that accesses the internal components. It uses electromechanical drive units with a controller providing progressive accelerations and decelerations of the obstacle, for smooth movement and enhanced user safety. To prevent forced entry, the geared electromagnetic brake will lock down the obstacles in place.

This turnstile is rich in features and is not like what you might see in a subway or theme park. Thick but aesthetically pleasing glass panels combine with the stainless steel for a sleek and modern look without sacrificing security. Critically, such a system should comply with COVID restrictions for years to come as it requires no person to person handing of credentials, or even person to contact point.

Security Technology of South Texas is one of the area’s most experienced and professional teams in physical security, access control, and surveillance. If you would like an assessment made for your business, please contact us at

 

admin@gostst.com

Visit at gostst.com 

Or call at 210-446-4863

The Chip: Moving from Sensors to Perceivers

Conventionally, the sensor devices at the edge of our cloud infrastructure have been pretty dumb. With limited computational resources and greater focus being on moving data to the cloud to be processed, these devices are limited in their provision of privacy as well. Moving into this next decade, the company “Perceive” aims  to become a major player in providing data-center level computation at the network edge.

    The teams working on these devices employ machine learning and neural networks to build and deploy software and tools for a chip they call “ergo”.  The “objective of [their] effort…is trying to upgrade the whole idea of the sensor into something [they] call a ‘perceiver’”. Rather than a dumb device that streams up pixels or audio, these devices will be able to perform data-center class operations on that data and show the user the results of those analytics.

    Doing this reduces the amount of power required to stream to the cloud, but critically preserves the privacy of the user through never allowing any raw data to leave the device where is is most susceptible to attack and compromise.There are a great number of articles out there detailing hacks into people’s smart home devices such as Amazon Echo and Google Home via their smartphones. In one instance, Amazon employees were sending each other videos of people inside their residences. And certainly governments domestic and foreign alike love to see lax or non-existent security as they expand the ever-growing surveillance states.

    Only recently has it become technically possible to perform these high level computations on edge devices, and the strategy for privacy used to be an afterthought. The combination of mil-spec privacy and encryption, machine learning and hardware and software are setting these devices to give the notoriously open and unprotected cloud-based systems a run for their money. The major advantage of performing computations for analytics locally is that it isolates that data and makes situations like spying or hacks much more difficult to pull off.

    The device itself is a diminutive 7X7 millimeters or about the size of a shirt button. Due to not needing external memory, the device is ideal for very small, battery operated gadgets and larger devices as well. The goal is for this technology to become so ubiquitous that anything and everything than can have a perceiver will. While this sounds a lot like the dream sold to us about 5G, the difference here is the security focus and not being web-connected. By effectively being “air-gapped”, the items containing perceivers would be un-hackable barring physical theft of the item.

    The first items the company wants to focus on are, logically, security cameras and IoT home devices. Eventually they see expansion into appliances, drones, and even clothing and food items. At this moment, there are 25 billion sensors on Earth, and it is estimated that by 2025 there will be 1 trillion. This number is over 100 times as many people as are on Earth, and it makes sense to want to protect certain things from attack by not connecting them to the cloud. However, without internet connection, services like monitoring by humans would have to be performed in-house or by machine learning algorithms. It is still to be seen what the impact of these types of security focused “perceivers” will be.

 

Please contact us through email at admin@gostst.com

Through our website form

Or via phone at  210-446-4863   24/7

Putting Access Control Myths to Rest

 

Making the switch to EAC (electronic access control) from conventional solutions involving
physical keys and security guards can be a daunting process. With technology that is constantly
changing, making the move to embrace modern security solutions is a challenge for those who
have spent years with conventional products. While most decision makers may think that they
have a grasp on the pros and cons of going with one solution over another, it is important to
have an understanding of some of the misconceptions and myths that surround the field of EAC.
Here we will take a look at what some of these access control myths are and what the reality is in today’s security landscape.

 

#1. EAC Solutions are only for doors:

While it is true that these solutions were in their earliest iterations developed for door control
through hard-wired systems, the current technology extends across a wide array of standalone
products used in a variety of applications. Electronic padlocks and lockboxes are often
connected with EAC software and used to securer fences, sheds, garages and other outdoor
equipment, as well as indoor items such as cabinets, lockers and other interior storage.
Windows are commonly protected by EAC, and these solutions may also be used to tailor
access from person to person within an organization, splitting groups of people by access level.

 

#2: EAC Solutions are too expensive:

Although out-of-pocket costs are a given when replacing or implementing electronic security, the
benefits over the short to medium term are often enough to deliver a significant return on
investment, depending upon what issues the system was put in place to address. In some
cases, a strong EAC system can actually put money back into the businesses that use them by
eliminating labour and other overhead costs associated with the upkeep of antiquated systems.

 

#3: EAC Solutions are complicated:

Rather than create additional hurdles to jump for the enterprise security staff, modern-day EAC
technology is designed to address the pain points of traditional systems specifically to make
their use easier than the alternative. An organization making use of mechanical solutions would
have to deal with delays and downtime while trying to gain authorized access to restricted areas
or materials. But using EAC, employees can self-serve access to critical materials and sites
using mobile phones or access cards with complete assurance that only the right personnel are
gaining access to sensitive locations. Security managers will benefit from both flexible access
control and the enhanced monitoring made capable by a system that keeps constant and
accurate logs of all access and access attempts.

 

#4: EAC Solutions lack durability

While some may assume EAC products to be made from vacuum-formed plastics, the truth is
that they are generally made with the same quality or better of materials as their mechanical
counterparts are. The misconception that EAC products lack durability due to them containing
more technology is mostly baseless. Bluetooth enabled locks, for example, come to market
featuring wide metal bodies and boron alloys to resist cutting and sawing attacks just like
industry standard heavy duty mechanical locks. Many EAC solutions are weatherproofed to
prevent rusting and deterioration caused by harsh outdoor conditions. Also, the lack of a
keyhole helps prevent the effects of weathering by preventing moisture and particulates from
entering into the functional mechanism.

 

#5: EAC Systems are less secure

Bluetooth is one of the most popular short-range radio communications standards in use today.
When used in EAC applications, the user’s credentials remain protected behind the security
measures of their smartphone such as a PIN or biometrics. Within the last several years, 2FA or
two-factor authorization has been used to protect further from unauthorized access. With a
conventional keyed system of access control, the theft or loss of the keys would be a major
emergency and possibly require rekeying of multiple locks. Using EAC solutions, access is
controlled centrally and does not require any physical manipulation of a locking mechanism, so
a lost key card can simply have its access privileges removed. This is a major cost and time
saving measure over time and a big reason why huge segments of multiple industries are
switching to EAC.

 

The security of data in these solutions can be protected with 256-bit AES, end-to-end mil-spec
encryption to proof against hacking or tampering efforts. This is a standard that the NSA
maintains internally to be resistant to brute force attacks and is significantly more secure than
using just the standard security on a smartphone.

As you may be able to tell, EAC is becoming the de-facto standard for security. This market is
projected to continue to expand along the increased need for both physical and data security in
residential, commercial, industrial, and government facilities. Those who have not made this
transition away from lock and key security measures risk being vulnerable to increased
long-term costs as well as security breaches, particularly those occurring internally.
With reliability, scalability, and seamless integration into legacy security, EAC has shown over
the years to be worth the investment and even more than pay for itself in a wide array of
industries. Make today the day you make the move into the future of access control for your project.

 

Contact us today:

Call us 24/7 at 210-446-4863

The Future of Thermographic Cameras

As government and business leaders start to talk about “returning to normal,” and looking to thermal cameras to help, questions remain about how and whether the latest technology can help prevent the spread of COVID-19.

Across industries, everyone is looking for the right tools to help detect, slow and eventually stop SARS-CoV-2, the virus that causes COVID-19. By now we’ve all come to recognize that resuming operations in any way will require demonstrating measures to protect the health and wellbeing of people in a variety of situations, including travel and work.

One proposed solution is thermal scanners. Unlike most medical imaging approaches, infrared (IR) thermography doesn’t require irradiation or expensive equipment, and presents no health hazard. Infrared radiation emitted from our skin can be detected and used along with information about the ambient environment to estimate core body temperature — which may indicate someone is running a fever, a common early symptom of COVID-19.  While thermal cameras can’t detect a virus or a specific infection, they can help by quickly narrowing down a large pool of possibly infected individuals. And today, this represents the only viable non-contact mass screening approach for fever. The accuracy of the infrared system can, however, be affected by human, environmental and equipment variables. Understanding this multitude of variables — including the ways in which the science, technology and applications themselves interact — will help both users and system makers deliver the best results.

 

Consideration #1: Think about the method

Teledyne Thermometer-1

Thermal detection has been used for fever detection for 20 years now. While older thermometers and thermal cameras, including the type used to detect a different coronavirus, severe acute respiratory syndrome (SARS), had their weaknesses,  newer generations deliver significant performance improvements. More intelligent systems now offer features such as real-time calibration to ambient temperature with sub-degree °C accuracy, providing more accurate readings far more quickly than older generations.

Newer camera systems are also more user-friendly and more reliable, featuring automated target recognition, improved resolution, pairing with a visible-light camera, automated alarms for febrile cases, and clearer outlining of hot spots. This higher degree of granularity improves insight, allowing for a more efficient and faster screening process, and provides on-site health professionals with necessary information to take additional steps when required.

 Teledyne Calibir-GXM-Feature-Set-1024x432

Advanced image processing features in new radiometric thermal cameras.

 

Consideration #2: Know your baselines

Because the environment can influence temperature measurements, some system makers have devised different ways to establish functional baselines. An early approach, recording a population baseline at each site on each day, proved too time- and resource-intensive. A newer approach, using a reference temperature source, or black body, offers evolutionary improvement. Designed to maintain itself at a specific temperature, the black body device allows the thermal camera system to automatically calibrate. Even better is a radiometric camera, which can interpret the intensity of an infrared signal reaching the camera. This requires more rigorous design and testing by the manufacturer, but it delivers much more precise measurements.

Teledyne Fever-Detection-System-Diagram

Diagram of a fever detection system with black body emitter

 

Consideration #3: Looking in the right place

While thermal cameras can only detect surface temperatures, different parts of the human body more closely correlate with body temperature. Based on recent scientific research, the most reliable spot in the human face is the canthus, the small corners over the tear duct of your eye where the upper and lower eyelids meet. This kind of precise targeting requires accurate pixel calibration capabilities.

 

Teledyne-Dalsa-Thermal-Imaging-1024x461

The best surface target for estimating core body temperature: the canthus at the inner eye

 

Consideration #4: Checking your performance         

Operating an IR fever screening system in the lab is one thing, but out in the field, the situation becomes more complex. Users need a camera system that is reliable and stable when it comes to critical performance factors like resolution, sensitivity and frame rate. Understanding the performance considerations when imaging a subject at a distance, for example, and realizing the minimum number of pixels required to get an accurate measurement are both essential in staging a fully optimal fever-detection platform.

 

Consideration #5: Finding your way in the “wild west” of thermal imaging in early 2020

People from the many industries that have been devastated by this pandemic – including travel, sports, manufacturing, food and hospitality, and entertainment — are looking for ways to reopen businesses safely while reducing the probability of a second wave of COVID-19. Deploying technology such as IR fever screening systems as part of a range of preventative measures will hopefully support that effort.

As is the case with any promising emergent technology, there is a fair degree of chaos around the nuanced considerations of system design and performance. What standards apply to IR fever-screening devices? Which are being enforced? Who makes them? Will they work? These questions will only be answered with time, and in the meanwhile your best bet is to go with a company that has the experience and expertise to properly implement these solutions for you.

Security Technology of South Texas has been a leading Systems Integrator in the greater South Texas area for over 7 years. To get your location assessed and a custom solution designed for thermographic cameras contact us 24/7.

 

Call us 24/7 at 210-446-4863