https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2022 Winter Showcase
    • IWCE 2023 Pre-event Guide
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2023 Pre-event Guide
    • IWCE 2022 Winter Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Enterprise


News

FST21 helps enterprises secure facilities

FST21 helps enterprises secure facilities

FST21 America offers a platform that combines facial and voice recognition with behavior monitoring to determine who is authorized to enter a facility.
  • Written by Donny Jackson
  • 10th December 2013

The world has become a scary place, and it’s getting scarier by the day. For that reason, enterprises of all types are trying to improve their ability to secure their facilities, and—by extension—make their employees and customers safer. This is particularly true of entities such as government agencies and school districts.

There are numerous ways that enterprises can try to improve security. Perhaps the most common is to issue pass cards to employees or customers that can be scanned at the front desk of the facility. But such cards can be lost or stolen, and security personnel don’t always check to ensure that the image on the card matches that of the possessor—assuming, of course, that the card has an image in the first place.

Fingerprint- and retinal-scanning technologies, while reliable, have their own limitations. First, these technologies can be expensive. Also, some people don’t like to touch a keypad that a large number of other humans also have touched, due to health concerns, while many more are reticent to provide their fingerprints to employers and landlords, according to Shahar Belkin, chief technical officer for Israel-based security solutions vendor FST21.

“Those fingerprints go into a database that someone else might be able to get their hands on,” he said.

Figure 1: FST21’s SafeVisit V-Key QR code.

There are other issues associated with fingerprint scanning, Belkin said.

“At least three percent of the population doesn’t have a readable fingerprint,” Belkin said. “Fingerprint scanning also can be a problem for people who work with their hands or with water. Even washing the dishes or swimming in a pool can make your fingerprints unreadable for a half hour to an hour.”

Regarding retinal scanning, the big issue—other than cost—is that “people generally are wary of having a laser beam stuck in their eye,” he said.

FST21—founded six years ago by CEO Aharon Zeevi Farkash, a former Israeli intelligence officer—believes it has found a better way. Its SafeRise platform combines facial and voice recognition with behavior monitoring to determine who is authorized to enter a facility. Regarding the behavior monitoring, it takes into account such factors as a person’s physical attributes, such as height, as well as how they typically behave when they’re entering the facility, according to Belkin.

“Let’s say that every day you walk calmly into that office space, but today you’re running—[the system] would know that something is wrong,” he said. For instance, the worker might be running to escape an assailant who the enterprise certainly wouldn’t want entering the facility.

Belkin offered a scenario concerning a stadium or arena, which are at the top of the list of potential terrorist targets. He said that domes containing a video camera could be installed above every turnstile.  As attendees enter the facility, their images are captured and then cross-referenced against databases consisting of known criminals or terrorist suspects. Though the transaction takes only a second or two to execute, Belkin conceded that it’s still not fast enough to prevent the bad guys from fading into the crowd. But the system will automatically send an SMS message containing their images to security personnel, who can then fan out to search for them.

A more positive scenario involves using the platform to recognize when VIP customers—such as season-ticket holders—have entered the facility. Their images could be cross-referenced to data that includes their seat location and status, so that they can be given VIP treatment, Belkin said. He added that retail establishments also would be able to leverage this capability, by placing domes at store entrances.

Another use case involves multi-occupant dwellings, as the system can be used as a virtual doorman to prevent non-residents from entering. If someone manages to slip inside the lobby—perhaps a resident didn’t securely shut the security door upon entering—the system can be configured to prevent the elevator doors from opening. And, if a glitch occurs, a central monitoring station would be able to override the system.

Belkin predicted that urban high-rise apartment building owners will see the benefit.

“In big cities like New York and Chicago, when you rent an apartment in a building with a [doorman], you’re willing to pay 25% more,” he said. “And that’s not just because the [doorman] gives great service—it’s also because you feel more secure in your home.”

While the platform largely is designed to keep unauthorized people out of various facilities, FST21 recently unveiled a new wrinkle, dubbed SafeVisit, a visitor-management system that allows organizations and individuals to pre-authorize guests. They do so by sending a V-Key to the guest’s smartphone. The process is simple and straightforward: a meeting invite is created, and a security-access level is selected from a pre-set list; then, a special quick-response (QR) code is sent to the visitor. When the guest arrives, the system detects the V-Key, notifies the host of the guest’s arrival and logs the visit.

Tags: Biometrics Campus Personnel Monitoring Personnel Tracking Retail/Warehouse Video Surveillance Enterprise Incident Command/Situational Awareness News Tracking, Monitoring & Control News

Most Recent


  • Ransomware, data breaches inundate OT & industrial sector
    Three-quarters of industrial firms suffered a ransomware attack in the past year, with far more compromises affecting operational technology (OT) than ever before — representing a surge in attacks driven by both the industrial sector’s vulnerability and propensity to pay ransoms in order to remain operational. In the past 12 months, more than half of […]
  • How and why AT&T selected Fujitsu radios for 5G
    Lost in AT&T’s big $14 billion announcement with Ericsson for open RAN was the fact that it also plans to purchase 5G radios from Fujitsu. The move represents a major win for the Japanese wireless network equipment vendor, which is relatively unknown outside its home market. “In order to support the acceleration of open RAN in AT&T’s […]
  • PSSA asks FCC for FirstNet Authority license at 4.9 GHz, opposes CERCI proposal
    A Public Safety Spectrum Alliance (PSSA) filing this week reiterates its call for the FCC to award a nationwide license of 4.9 GHz  spectrum to the FirstNet Authority, ignoring a recent coalition filing that asks the commission to approve rules that would let local jurisdictions largely determine how the airwaves are used. Jeff Johnson, executive […]
  • Critical Bluetooth flaw exposes Android, Apple & Linux devices to takeover
    Attackers can exploit a critical Bluetooth security vulnerability that’s been lurking largely unnoticed for years on macOS, iOS, Android, and Linux device platforms. The keystroke injection vulnerability allows an attacker to control the targeted device as if they were attached by a Bluetooth keyboard, performing various functions remotely depending on the endpoint. Tracked as CVE-2023-45866, the flaw exists […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

Commentary


Things to know about IWCE 2024: The basics 

5th December 2023

Land mobile radio (LMR) systems are just as vulnerable to cyberattacks as any other networks used in the public-safety sector. Here’s what to do about it.

  • 2
7th November 2023

September 3GPP Plenary meetings feature Release 18 progress, Release 19 beginnings

13th October 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.