Sie sind auf Seite 1von 24

All about Honeywell Security

b:secure
n Systemworld: Intrusion detection technology

01|2008

The intelligent combination of ergonomics and design The colour scheme of the TouchCenter display can be adjusted to ideally match its environment
n Systemworld: Access control

The new key role in access control Honeywell Security has completely revised its range of electronic locking systems
n General

Security is an ongoing trend This years Security poised to break 2006 exhibitors record

A clean solution

Intruder protection without optical impairment with the new radio system from Honeywell Security: fast and clean installation
Professional intrusion detection is now even more versatile and inconspicuous: the new bidirectional radio system from Honeywell Security masters the challenges of demanding architectural environments and combines the advantages of wireless components with the security of efficient intrusion detection central units. These features enable the system to offer all-round protection for business properties, private villas and public buildings of varying sizes. Considering cables do not need to be installed, it can also be fitted swiftly and without requiring any great effort. The system complies with optical demands not only by dispensing with bothersome cabling but also thanks to the discerning design of the components: the Viewguard range of motion detectors was presented with the international red dot design award and application for VdS class B is pending for the system.

Honeywell Security & Data Collection Novar GmbH Johannes-Mauthe-Strae 14 72458 Albstadt, Germany Phone: +49 (0) 74 31/8 01-0 Fax: +49 (0) 74 31/8 01-12 20 www.honeywell.com/security/de info.security.de@honeywell.com
2008 Honeywell International Inc. All rights reserved..

b:secure 01|2008

Contents

0

Contents
n Short and sweet
04 With commendation! 04 Dieter Haack celebrates 40th jubilee 04 At a glance: the most important trade fairs in 2008 11 Security at your fingertips
The new Accentic IK3 fingerkey reader now combines reliable biometric identification with secure IK3 alternating code transmission n Intrusion detection technology n Access control

17 Biometric security systems on the rise


More security at your fingertips: the new Accentic mifare fingerkey reader utilises biometric recognition principles as an additional identification criterion for three systems

n Editorial

12 The intelligent combination of ergonomics and design


The colour scheme of the TouchCenter display can be adjusted to ideally match its environment

20 The new key role in access control


Honeywell Security has completely revised its range of electronic locking systems

n Systemworld
06 Hazard management 2.0: software upgrade for WINMAGplus
The latest version additionally broadens the performance range of the proven hazard management system from Honeywell Security

13 It is good to trust, but better to control


IDENTLOC now with additional connection options and new controller

n General
22 Security is an ongoing trend
This years Security poised to break 2006 exhibitors record

14 Design wins!
The Viewguard has received the international red dot award

08 Intelligently all under control


IQ SystemControl: the new user software for intrusion detection technology and access control

15 Intrinsic values doubled


The new Viewguard generation of detectors: now for BUS-1 and BUS-2

16 All on one wavelength


New wireless components broaden the radio systems scope of performance

10 The cornerstone of allembracing security concepts


New smoke detector base with additional connection facilities for BUS-1 and BUS-2

0

Short and sweet

b:secure 01|2008

With commendation!
Positively received by the jury: the TouchCenter and Accentic mifare fingerkey reader Innovative power and a sure-fire instinct for new products and technologies at Honeywell Security have been rewarded twofold: both the graphic TouchCenter control panel for intrusion detection central units and the Accentic mifare fingerkey reader were awarded and/or nominated by independent expert juries. Both in terms of design and function, the TouchCenter for intrusion detection central units satisfies maximum demands. With its switchable display colour scheme, individual optical adaptation options and intuitive user guidance, the TouchCenter also managed to convince the jury comprising readers of WIK/ SicherheitsMarkt. In July/August 2008, the innovative control panel received the Product of the Month award. The new Accentic mifare fingerkey reader is also on course for success. As the first scanner in the area of biometric fingerprint ID, it has received VdS approval for access control and intrusion detection technology. The fact that Honeywell Security has displayed the right touch in terms of product design is now also confirmed by its nomination for the GIT SICHERHEIT AWARD 2009. We are really delighted at the positive response of the expert juries as it confirms our product strategy, is how Stephan Winkelmann, Head of Marketing Communication at Honeywell Security Deutschland, describes this success. We not only regard this as support in terms of marketing but also as motivation for retaining our lead in the competition for technologies and markets.

01

Dieter Haack celebrates 40th jubilee


This nature-loving Swabian started his training as an electrical mechanic at effeff Alarm GmbH. For the past forty years, he has been supporting the company in the form of his expertise and great commitment. We would like to congratulate Dieter Haack on his jubilee and look forward to many more years of collaboration.
01 Dieter Haack (right) with Sales Director Hans-Jrgen Springmann (left)

At a glance: the most important trade fairs in 2008


n 07.10.10.08 n 08.10.10.08 n 15.18.10.08 n 16.18.10.08 n 29.30.10.08 n 04.07.11.08 n 10.11.11.08 n 18.20.11.08 n 25.28.11.08 SECURITY, Essen, Germany The international marketplace for security and fire protection Security & Safety Trade Expo, Tokyo, Japan SFITEX, St Petersburg, Russia International trade fair for the fire protection and security industry IFSEC India, Pragati Maidan, New Delhi, India International trade fair for building security ISC EAST, New York, USA International security conference and exhibition Expoprotection, Paris, France Trade fair for security technology, personal and fire protection 7th Congress on European Security & Defence, Berlin 11th European Banking and Insurance Fair E. B. I. F., Frankfurt/Main, Germany Technology fair for banks and insurance companies SUCUREZZA/SICURTECH Expo, Milan, Italy

b:secure 01|2008

Editorial

0

Dear reader,
The demand for intelligent technology has reached all areas of our lives. Today, processors not only control computer systems, but also household appliances, vehicles and machines. Intelligent environments can be created by networking a diverse range of technical devices. These not only ensure more convenience but facilitate everyday processes. Increasingly, this trend is also catching on in the area of security technology. Reliable products and integrated solutions are in demand, as well as user-friendly software and operational concepts. Honeywell Security is accommodating this development with an expanded product line among other areas, we have completely realigned our portfolio within the electronic locking systems segment. One of the highlights here is the DLC electronic cylinder lock. As an extra small, flexible and cost-effective access control solution, it combines classic mechanical protection features with all the advantages of electronic access control systems. You can discover further innovations at our Security trade fair stand.
Andrea Bergerhoff EMEA Sales Director Managing Director

From 7 to 10 October, you will find us at stand 507 in hall 3.0, where you can experience the perfect interplay of new products and proven security solutions. We are looking forward to your visit. In the meantime, we hope you enjoy reading our latest customer magazine.

Best regards,

0

Systemworld

b:secure 01|2008

Hazard management 2.0: software upgrade for WINMAGplus


The latest version additionally broadens the performance range of the proven hazard management system from Honeywell Security
n Security technology requirements are becoming increasingly complex and involve a great number of various single systems. A hazard management system integrates all these systems into one unified solution and enables the user to centrally monitor and control all of its relevant functions. The main aspect is that of user-friendliness. This includes the logical pre-processing and filtering of all system information, the automation of all required reactions and the preparation of complementary text, graphic or video information. In case of emergency, the user must be immediately able to recognise which type of event has taken place and where the alarm was triggered in order to quickly assess incoming alarm signals and take the necessary measures. For this reason, event display, the ability to integrate and the optimisation of processes were the main focus of the function upgrade of the WINMAGplus V2 hazard management system. The decision was already taken in 2007 to utilise .NET technology in the software extension, including new integrated drivers and an import filter for DWF data as well as improved display options. In the new version both the configuration options and the user-specific adaptation and graphical capabilities have been greatly enhanced. Improved overview with zoom and overlays Picture overlay functions and a 100x graphic zoom complement the graphic options in the latest software version. This enables overlay graphics to be superimposed over existing ground plans, thus making it possible to visualise several levels simultaneously. In case of alarm, The 100x magnification enables symbols and alarms to be placed with absolute precision. The detection point number is also retained when importing CAD graphics. The corresponding metadata contain essential information on each single alarm, such as its history or additional customer-specific information. This allows Task distribution made easy A wide range of multi-station expansion capabilities ensure that WINMAGplus V2 the various picture layers, escape plans for example, can be displayed to match the current situation. The multiplication of the internal zoom by a factor of 100 makes it possible to arrange and select the graphic sections more precisely. A text symbol assigned to each detection point is arranged together with the other symbols in order to simplify configuration. A new converter with Autodesk components now also enables AutoCAD graphics to be displayed in WINMAGplus V2. It is also possible to integrate hyperlinks and generate wgml files. all necessary symbols for the various technical security components to be easily adopted by WINMAGplus V2. The function helps the installer to save time otherwise spent entering data twice and also helps to avoid transmission errors, for example when preparing the mandatory fire brigade route cards.

b:secure 01|2008

Systemworld

07

will reduce the workload in future. The copy function now greatly simplifies the management of data. Changed files are simultaneously transferred to all workstations connected within the multi-station system in order to avoid having to enter data twice. The distribution of tasks within a multi-station system is carried out via the alarm batch processing function in the new software version. Each separate computer can display the batch entries of other workstations and either carry them out from another station or relocate them. The night porter, for example, has the capability to transfer the servicing of a low-priority technical alarm directly to the technical department for the following day. From visualisation to process optimisation The desktop is the crucial interface between man and technology. It can now be divided over as many as four monitors to ensure a maximum of both ergonomics and clarity. This means that ground plans, CCTV pictures, text information and event reports can all be displayed simultaneously. It gives the user a comprehensive picture of any hazardous situation that may occur and makes it easier to keep an eye on everything at all times. Open for integration Due to the continuing trend towards increased system integration, interface problems still remain one of the greatest challenges to be mastered in the field of building management. The latest version of WINMAG includes a plug-in interface for integrating third-party systems. It enables data from a wide variety of applications to be transferred, whether contact information from the access control sys-

tem or pictures from CCTV cameras. Individual applications can also be programmed to suit requirements. It is, for example, possible to interlink goods storage data with a fire detection system: in case of fire, WINMAGplus V2 can inform the user as to whether inflammable or explosive goods are stored in the vicinity of the danger zone. Printing options perfected The printing options have also been optimised in the latest version of the hazard management system. Printing can now be carried out in the background without a simultaneous display on the desktop. All graphics of the current alarm point can be printed out either double-sided or as single pages using the standard view as the need arises. Even when printing from macros there are no more distortions with version 2 because the hard

copy also takes page margins into account. The printing alignment is performed automatically to suit the format of the graphic (portrait or landscape format). n

01

N EW

lus AGp WINM

V2

Graphics

Event texts and measures Activity list (Batch)

01 A highly satisfactory function upgrade

0

Systemworld

b:secure 01|2008

Simple and intuitive user guidance

Convenient booking analysis

Intelligently all under control


IQ SystemControl: the new user software for intrusion detection technology and access control
n Security risks used to be dealt with selectively using individual protective measures, but the companies of today prefer to concentrate on a comprehensive system of security management. Integrated applications are increasingly superseding single solutions and offer a great number of synergy effects: they require less equipment, are quicker to install and easier than ever to use. User-friendliness is one of the systems outstanding features. This is particularly true when it comes to integrating intrusion detection technology and access control. The new IQ SystemControl software is now available for the practical handling and administration of both systems and enables the user to independently install and manage the personnel master data of an intrusion detection central unit including rights of access, activation, deactivation and control functions. User errors impossible: intuitive user guidance The intelligent application makes it possible to simultaneously integrate a number of MB-model intrusion detection central units (MB100/48/24) into one single intrusion detection management system. The standardised desktop with its easy-to-read 3-window technology enables the user to operate the system in a highly user-friendly and intuitive way. Even without prior knowledge, the user has fast, easy access to all information needed with a few clicks of the mouse. No database knowledge is required to install, manage and maintain the SQL database included in the package, which stores all of the data collected by the IQ SystemControl software. The clear separation of the system set-up (implemented via IQ NetEdit) and the everyday management of the system and its users makes it impossible to make Straightforward data transfer and management IQ SystemControl is capable of accepting, adapting and reprocessing existing master data from the intrusion detection central unit. In addition, a broad range of access control functions can also be utilised via the user-friendly system desktop. The user can, for example, define certain times and days as well as assign doors. The people involved receive the appropriate rights for one or more areas and time zones via data medium. These rights can be granted both singly and in any number of combinations as the need arises. In accordance with the VdS, operators are actually not allowed to grant rights to deactivate, change or delete data in the area/time zones or door and data medium far-reaching user errors like, for instance, the accidental changing of system data such as the IP addresses or codings.

b:secure 01|2008

Systemworld

0

Additional functions

Security systems require special protection

assignments or create, change and delete complete area/time zones that include deactivation. Using IQ SystemControl the installer can, however, simply adapt the rights of the operator to conform to the regulations of the VdS by mouse click via a VdS attribute. IQ SystemControl can also be used for comprehensive and structured personnel management, including organisation membership, photos and signatures. The additional capability to change similar data sets by group helps the user to save a great deal of time and expense. Doors can also be centrally, directly and quickly controlled: opening, blocking, permanent

release, normal, prevent access inwards or outwards. Even the reason for possible activation prevention can be requested with a simple click of the mouse. Easy booking analysis, clear protocols Straightforward booking analysis and a multitude of protocol options are further advantages of the software: previous bookings can be analysed by means of the search, multilevel sorting and columnsorting functions or according to user-defined filters and groupings. The results are then displayed in easy-to-read lists that include search, filter and browse functions. They can be selected either as a printout or as a file in various formats such

as .xls, .txt, .html or .xml. For dealing with problems, IQ SystemControl offers numerous protocol methods such as an activity protocol and system reports. Additional activities such as alarm signals, information reports or the playing of signals continue to be standard system options. Flexibly usable time orders are also available for implementing regular backups or reorganising protocol files. The IQ SystemControl is also reliably protected from unauthorised use with practical functions such as automatic logging out according to a preset time, the blocking of the program or by defining a maximum number of unsuccessful attempts to log in. n

10

Systemworld

b:secure 01|2008

The cornerstone of all-embracing security concepts


New smoke detector base with additional connection facilities for BUS-1 and BUS-2
n Around 600 people die in fires in Germany every year, the majority of them in private households. The fires are very often caused by technical defects, which lead to catastrophes without the help of preventive measures such as smoke detectors. 95% of the victims die as a result of inhaling poisonous carbon monoxide or carbon dioxide smoke. Even a few breaths of these odourless gases are deadly. Despite the fact that fire protection is meanwhile of a very high standard in public, industrial and special buildings, a great number of privately owned buildings are still not adequately equipped in this regard. For buildings in which a fire detection system is not legally required but fire detection makes sense in order to protect both human life and property, the combination of an intrusion detection central unit that includes fire protection components is the ideal solution. Combined protection from intrusion and fire The new smoke detector base from Honeywell Security makes it possible to flexibly connect fire detectors to an intrusion detection central unit. Thus the central unit also functions as an all-embracing security system and controls numerous alarm signalling methods that until now had only been possible by means of a fire alarm control panel. The latest product version even offers an additional number of connection options: the fire detectors can now be integrated into the system by means of both BUS-1 and BUS-2. The state-of-the-art MB-model central units reliably analyse the signals sent by the connected automatic fire detectors, thereby ensuring additional safety. Versatile, user-friendly and flexible The combination of base and detector makes it possible to individually select the most suitable fire detector according to the characteristics of the particular building and the possible causes of fire. The IQ Quad series from ESSER offers a versatile range of detectors: from optical detectors to safe early detection of fires by means of optical-thermal detectors for difficult environmental conditions to optical-thermal detectors with integrated gas sensors for detecting carbon monoxide. State-of-theart sensor electronics and microprocessors in each fire detector guarantee a high degree of safety from deceptive alarms. All IQ detectors are additionally fitted with automatic function- and status-monitoring systems. The detector base is also fitted with a monitoring function that triggers in case of sabotage alarm.
02 Smoke detector base for BUS-1 and BUS-2 02 01 The smoke detector base permits fire alarms to be linked to an intrusion detection central unitvia BUS-1 or BUS-2 Viewguard Smoke detector with base BUS-1/BUS-2 TouchCenter BUS-2 BUS-1 Smoke detector with base BUS-1/BUS-2 Viewguard 01

The new smoke detection base for BUS-1 and BUS-2 is not only easy to install and practically designed, its two-in-one principle also optimises storage space for the installer. Commissioning can be carried out quickly and simply via the userfriendly WINFEM Advanced programming software. n

b:secure 01|2008

Systemworld

11

Security at your fingertips


The new Accentic IK fingerkey reader now combines reliable biometric identification with secure IK alternating code transmission
n The importance of biometric systems in the area of security technology is growing continuously. This is not only because they can be used to close security holes, but also because they prevent users from misplacing, forgetting or transmitting identification criteria. One of the most frequently used biometric systems is fingerprint recognition. However, the use of this identification method in connection with access control or the activation/deactivation of intrusion detection systems requires security and convenience to be carefully balanced for the application at hand. The new Accentic IK3 fingerkey reader eliminates the need to choose between security and convenience. As a biometric IK3 reader with keyboard, it offers not only a reliable evaluation and identification procedure, but also secure data transmission using the IK3 alternating code system. Authorisation granted, access allowed The new reader can be used as an actuator for switching between activation/deactivation in intrusion detection systems. As a control element, it also ensures more security and convenience for access control systems. Up to 99 individuals can be recognised either by fingerprint, data carrier or PIN. Alternatively, combinations of fingerprint and PIN, as well as data carrier and PIN, are possible. In a special learning mode, three fingerprints per person are successively captured and linked with the individual serial number of the personal data carrier. The fingerprint data are stored in the reader as coded templates, and the authorisation of the corresponding data carrier occurs in the system. Instead of the serial number for an existing data carrier, a virtual serial number can also be stored as the means of personal identification.
01 Watch your fingers! The Accentic IK fingerkey reader combines convenience and security when checking identities 01

Double identification reliability Once the reader identifies a fingerprint currently being scanned, it sends the serial number of the corresponding data carrier to the controller. Confirmation is only granted if the data carrier (or the virtual serial number) is also authorised in the system. When a transponder is used, an alternating code is exchanged twice between the evaluation unit and the transponder following the authorisation check. In this process, an encrypted transmission in several data packets ensures reliable eavesdropping protection based on the latest VdS and BSI guidelines. By supporting IK3 alternating codes, both IK2/proX and IK3/proX2 data carriers can be used. The fingerprints are captured securely using a high-quality thermal line sensor that is able to account for various lighting conditions, humidity and soiling, and be used within electrical fields or with visible finger-

prints left behind by the previous user. In the case of an injured finger, the personal data carrier can be used as a substitute. The Accentic IK3 fingerkey reader complies with the highest safety regulations for the operation of intrusion detection systems. Moreover, it evaluates approximately 1/3 more attributes than for access control and control functions. This allows it to be used as a control unit up to and including class SG6. The new reader is suitable for both indoor and outdoor use at temperatures of 25 C to +55 C, and complies with protection class IP54 requirements. With just two or three screws it can quickly and easily be installed on the wall or also mounted directly on standard DIN flush-mounted sockets sockets. For the Accentic IK3 fingerkey reader, VdS approval class C for intrusion detection and access control systems is pending. n

12

Systemworld: Intrusion detection technology

b:secure 01|2008

01 01 The TouchCenter colour screen is switchable, enabling it to adapt perfectly to its respective environment

The intelligent combination of ergonomics and design


The colour scheme of the TouchCenter display can be adjusted to ideally match its environment
n The newly developed TouchCenter graphic operating unit for intrusion detection central units meets the highest standards with regard to both aesthetics and functionality. The key factors in the daily use of hazard detection systems are their reliability, the ability to quickly compile information and their degree of user-friendliness. The innovative TouchCenter optimally fulfils all these essential requirements. Its functions are simply activated by touching various points on the 14.5 cm colour touchscreen. The TouchCenter guarantees the highest possible degree of userfriendliness with its self-explanatory desktop featuring clearly defined buttons and symbols. The clear text display of all informationalso available in various languages if requiredis just as much a part of the dialogue-based, intuitive user guidance as the permanent LED status display. Its state-of-the-art processor technology also A further advantage of the innovative TouchCenter is its easy installation, programming and maintenance. Project planning is very straightforward and convenient, due to the systems comprehenThe TouchCenter is suitable for operation with the central units MB100/48/24 from version V 08.16 and the MB256 plus from version V 03.18. n The sophisticated design of the new TouchCenter enables it to be perfectly integrated into the surrounding design. The colour scheme of the screen can be switched to suit the situation and offers a choice of blue, green or light brown. This allows the TouchCenter display to be adjusted to ideally match its environment. Graphics such as the ground plan of the particular building or the company logo can be optionally installed as a background image. makes the user interface incredibly fast. The clearly arranged alarm status display always keeps the operator optimally informed and guarantees a high degree of convenience. sive range of software applications and its flexible installation. The power can, for example, be supplied directly via a BUS system without the need for additional cables. In addition, up to 16 operating units can be connected to one single central unit. A special assembly kit is available as an extra to retrofit the TouchCenter if VdS approval is required. The projectrelated programming of the intrusion detection central unit and the TouchCenter can be carried out simply and easily using the WINFEM Advanced software installed on a Windows PC or laptop. This also makes it possible to carry out remote diagnosis and programming of the intrusion detection central unit. Updates are easy to install using Flash technology.

b:secure 01|2008

Systemworld: Intrusion detection technology

1

It is good to trust, but better to control


IDENTLOC now with additional connection options and new controller
n For many years now, the tried-andtested IDENTLOC system for peripheral and building monitoring has proven how secure it is in terms of both safety from manipulation and flexibility. It consists of a transmission unit, sensors and an evaluation unit and reliably monitors all access possibilities such as windows, doors or skylights. Furthermore, the system also protects valuable objects such as vases, paintings and sculptures from unauthorised access. The transmission of power and data between the transmission unit and the moving sensor is done wirelessly (inductively). Each sensor contains an individual code medium. The evaluation unit stores these codes at the commissioning stage (learn mode) in a non-volatile memory and permanently tests them for presence and correctness. This method makes the system particularly safe from manipulation because the clear assignment means it is not possible to replace the sensor with a foreign sensor during Now even more secure and flexible In the course of expanding the functions of the new system version, the micro-controller of the evaluation unit was renewed. The hardware and firmware design, which is also completely new, guarantees an interruption-free transmission of alarm signals, thereby improving the security of the system. Furthermore, the evaluation unit will be fitted with BUS-1 and BUS-2 connections in future. Selection can be carried out via a DIP switch depending on local requirements. The universal capabilities of the sensor system make it possible to realise a great number of individual security requirements in VdS category
01 All components of the IDENTLOC system are small and can be unobtrusively integrated

normal operation. The wireless sensors can be separately selected, which makes it possible to simultaneously monitor windows and doors or terrace doors for broken glass or opening. If an alarm is triggered, the cause is even defined and displayed via the evaluation unit. Depending on building requirements, new sensors can be mounted either straight on the wall or as a discreet slimline version (covered mounting).

Bthe VdS C-certification has also already been applied for. n

1

Systemworld: Intrusion detection technology

b:secure 01|2008

Design wins!
The Viewguard has received the international red dot award
n Design is the process by which nearly all objects are given a certain form and functionfrom a car to a paper clip. These objects are often required to meet varying and sometimes even conflicting requirements to ensure that they work as they are intended to. Design can only be considered successful when aesthetics, ergonomics, durability, function and convenience complement and harmonise with each other. The intelligent combination of form and function meanwhile also plays an increasingly crucial role in the world of security technology. In the last few years product design has become a key competitive factor in the security industry. With the concept of new wrappings for new technology manufacturers are now fulfilling the long-cherished wish of architects and interior designers to integrate the required Honeywell Security has long considered well-thought-out building design as implicit. The company designs its products with a view to both form and functionality and this endeavour met with particular success with the Viewguard. This year it received the red dot award for product design. Worldwide coveted seal of quality In 1955 the Design Centre of North RhineWestphalia began tagging outstanding international product design with its famous red dot. Since then, companies from Asia, the Americas and Europe have been entering their industrial goods in the competition, which annually presents award-winning products in its special show Design Innovations. The red dot technical security installations without detracting from the aesthetics of the interior. design award is one of the largest design competitions worldwide and attracted 3,203 entrants from 51 different countries. It is divided into three independently organised sections: product design, communication design and design concept. A worldwide selection of design specialists judges which products are impressive due to their good design, then compare all entries directly with each other on site according to a wide range of evaluation criteria. Not only innovation, functionality and ergonomics, but also the symbolic

b:secure 01|2008

Systemworld: Intrusion detection technology

1

and emotional content of a product is assessed. The Viewguard was able to gain points in every respect and was awarded the coveted circular seal of quality from a field of 3,203 entries. This puts the motion detector in a class with products such as last years winners of the prestigious award: none other than the Porsche 911 Targa, the new Mini and the Apple iPod. Synthesis of form and function We are particularly proud of the red dot award for product design because it is an objective, international seal of quality for good design, said a happy Stephan Winkelmann, Head of Marketing Communication at Honeywell Security. Apart from its false-alarm-proof technology

and its high degree of user-friendliness, the visual integration of the Viewguard right from the product development stage was an important criterion for us, he explained. When designing the shape we paid particular attention to the use of a clearly recognisable geometric structure. When viewed from the front, the detector was consciously designed as a rectangle with circular elements and slightly convex curved edges. The angle of the front surface firstly has ergonomic benefits because it makes the keypad easier to operate and secondly it allows the device to be clearly visualised by the user, said Winkelmann in summing up the design concept. The official award presentation took place at the end of June. In the course of time it

has become a major annual industry meeting at which the winner of the red dot design award is celebrated deep into the night by guests of honour from the worlds of business, politics, media, design and advertising. Winners have the opportunity to make new contacts and strengthen existing ones. All of the prize-winning products are subsequently presented to the public at a special exhibition. n

Intrinsic values doubled


The new Viewguard generation of detectors: now for BUS-1 and BUS-2
n Not only the need for security, but also requirements regarding the functionality of intrusion detection alarms are continually growing. Current trends tend both towards technologies that significantly reduce the false alarm ratio and those that increase flexibility and user-friendliness. Honeywell Security made these its guiding principles when designing the new generation of Viewguard motion detectors. Following the two-in-one principle, BUS-2 models were additionally equipped to connect with BUS-1, thereby considerably improving the detectors flexibility. This makes Honeywell Security the only manufacturer to offer a complete range of motion detectors for all VdS categories in a standard design. The versatility of the expanded detector series helps installers to be prepared for a
01 Small and large versions of the Viewguard with standard design

The product range now includes both detectors with the proven passive-infrared technology and DUAL motion detectors for all types of connection (BUS-1, BUS-2 and conventional wiring). The Viewguard models are available in the VdS categories B and C (with sabotageproof front field and mirror cover monitoring). Improvements such as an additional detector group input or a temperature threshold alarm (available for BUS-2 connection) additionally broaden the performance range of the detector series and enable comprehensive security concepts to be implemented.

broad range of project requirements in the long term. Furthermore, the economical two-in-one principle greatly reduces storage costs. n
01

1

Systemworld: Intrusion detection technology

b:secure 01|2008

All on one wavelength


New wireless components broaden the radio systems scope of performance
n The intelligent combination of form and function is playing an increasingly essential role in the integration of intrusion detection technology. Conventional wiring is being increasingly replaced by radio technology, particularly when the use of components that work without cable connections are recommended for constructional reasons or due to aesthetic considerations. It is a great advantage to be able to place alarms, contacts and sensors in buildings flexibly without having to lay cables and thereby still conform to the current standards and guidelines. Radio solutions protect buildings that have high aesthetic requirements, for instance due to sophisticated wall panelling, plaster ceilings or in the case of historical buildings under monumental protection, without adverse visual effects. Convenience without cables The new bidirectional radio system (UL class B applied for) from Honeywell Security combines the advantages of wireless components with the security of efficient intrusion detection central units. These features enable the system to offer all-round protection for business property, private villas and public buildings of varying sizes. The technology makes it possible to connect both wireless components (passiveinfrared alarms, alarm contacts and signalling devices) and standard bus participants to a high-performance hybrid Fire protection included A new radio frequency smoke detector base now also makes it possible to integrate fire detectors into the wireless intrusion detection system. The radio-controlled base is connected to the intrusion detection central unit like an RF 4I/O module and enables the wireless connection of IQQuad-series ESSER fire detectors. The types of detectors that can be connected range from optical single-criterion detectors to intelligent multi-sensor detectors. No additional wiring work is required if one type of detector is replaced with another. The detector most suitable for that particular area is simply connected to the radio-controlled base. Push-button security A new RF hold-up alarm transmitter serves both to trigger an immediate alarm and to conveniently operate the system. It is equipped with three keys for external activation, internal activation and deactivation. A fourth function key can also be optionally programmed to control lighting, a garage door or other functions as required. The hold-up alarm function can be activated by simultaneously pressing any two of the function keys. intrusion detection central unit. Honeywell Security has now extended the radio systems scope of performance with two new components: Systematic intrusion protection: The components
MB100 intrusion detection central unit With the new V0 software version it is now possible to use the proven central units as hybrid central systems. RF BUS-2 transponder The RF BUS-2 transponder enables the user to connect up to 1 radio participants per transceiver as required to the intrusion detection central unit. Up to 2 participants can be connected to one single central unit. RF 4I/O module (up to four relay pcbs) Via the four inputs of the RF I/O module various features such as panic buttons or magnetic contacts can be connected. Signalling devices, for example, can be connected to any one of four available outputs (relay pcbs optional). Viewguard PIR RF radio frequency motion detector The Viewguard PIR RF is a wireless motion detector that works on the passive-infrared principle. It was awarded the international red dot award for its sophisticated design. RF hold-up alarm transmitter The radio frequency hold-up alarm transmitter is equipped with four keys, three LEDs and two opening contacts and serves to trigger an emergency call and to activate or deactivate the system. RF smoke detector base The radio frequency base enables the user to wirelessly activate fire detectors connected to MB-model intrusion detection central units.

The base enables the wireless BUS-2 connection of TM, TD, O, O2T and OTG IQQuad detectors.

MB2//100-intrusion detection central unit

RF BUS-2 transponder

RF I/O module

Viewguard PIR RF

RF hold-up alarm transmitter

RF smoke detection base

b:secure 01|2008

Systemworld: Access control

17

Biometric security systems on the rise


More security at your fingertips: the new Accentic mifare fingerkey reader utilises biometric recognition principles as an additional identification criterion for three systems
n Each person is a unique individual. Identification systems based on biometrics take advantage of this biological fact. Already today the power of technical innovation is increasingly enabling us to compile biological characteristics and evaluate them with devices that are becoming easier and simpler to operate with a growing amount of recognition security. These types of systems are having a growing impact on the field of security technology because they are helping to bridge the last security gaps left by conventional identification systems. The iris, the shape of the face and the hands and above all the fingerprints are unique biological features that are practically unchangeable and enable modern systems to match identities and their corresponding rights with the correct persons. It is precisely these combined techniques for verifying and identifying individuals that the VdS in its examination report on biometric systems dated 8 December 2006 finds useful because they eliminate problems High degree of identification security With its new Accentic mifare fingerkey reader including keypad, Honeywell How it all began: biometrics in retrospect 1
Biometrics was already used at an early stage in the field of personal identification: In 11 Christoph Bernoulli, the Swiss naturalist and economist of the Bernoulli family of academics, was one of the first scientists to use the expression biometrics (Bio = life; Metron = measure). In 1 Sir William James Herschel, British colonial civil servant and officer in Bengal, first had the idea to identify individuals by means of their fingerprints. In 17 Alphonse Bertillon developed a system of establishing the identity of individuals based on the anthropometric observation of eleven body length measurements. In 12 Francis Galton first supplied scientific reasons for the dactyloscopic procedure of using fingerprints in the identification of individuals.

caused by the mislaying, forgetting or passing on of identification criteria. Due to the inseparability of identification criteria from the actual person, fingerprint identification can, in combination with other security criteria, make a significant contribution towards raising the level of security of an entire system.

security can also be warranted by means of a memory-aided identification characteristic in the form of a PIN code. All at your fingertips: this is how it works Fingerprint identification is one of the most common biometric systems currently being used in the field of access control and the new Accentic mifare fingerkey reader also makes the most of this proven biometric identification technology. With this technique, a sensor scans the finger placed on it, evaluates the contour of the finger pad and stores it as a reference template on a mifare data medium, which is then assigned to the corresponding person in the system. During each identification attempt the data are read from the data medium, the fingerprint is scanned and then compared with the stored data in learn mode. If required, a combination of PIN and data medium can also be created via the keypad. The person will only be allowed access if all of the data coincide. BioKey technology and the new thermal 2-line sensor In order to minimise the False Refusal Rate (FRR), and False Acceptance Rate (FAR) the new fingerkey reader works with the proven BioKey software and a new thermal 2-line sensor. The BioKey software module has already been successfully installed over 10,000 times. In a comparison test conducted at the FVC 2004 (Fingerprint Verification Competition 2004), BioKey was judged to be one of the ten best fingerprint identification systems worldwide and as the best in Western Europe. This technology enables simple identification even of socalled difficult fingers such as particularly dry, moist or dirty fingers or those with minor injuries. Even outdoor applications,

Security is now able to put a greater degree of security and convenience at the users fingertips. One of the greatest advantages of this new system is the fact that it can be flexibly used in conjunction with three different systems. As an additional safeguard against intrusion, for access control or time recordingwith its innovative evaluation technique the new mifare fingerkey reader guarantees extremely fast, stable identification. The biometric system combines two separate identification criteria: biological (personal fingerprint) and material (data medium with individual serial number or sector data). This dual method of identity control practically excludes the misuse of data media. Furthermore, additional

Source of information: www.wikipedia.de

1

Systemworld: Access control

b:secure 01|2008

01

01 More security at your fingertips: biometric identification with dual identity control

particularly for door-opening systems, can be implemented with this robust identification module without problems. The use of a new thermal 2-line sensor makes the device even more convenient and secure to use. By measuring differences in the temperature of the finger contour the sensor is able to differentiate between a real finger and a simulation. In addition, the finger pad is no longer simply placed on the sensor but dragged across it. This means that no fingerprints remain (latent finger) that could be either copied or misused at a later date. In contrast to purely optical sensors, varying light conditions do not impair the ability of the thermal 2-line sensor to safely identify the

fingerprint. The thermal 2-line sensor works on thermal principles, unlike optical sensors. The thermal principle is recog-

moisture, soiled sensors nor electric fields (which can lead to irritation in the case of capacitive sensors) can cause identification problems.

Accentic mifare fingerkey reader: Benefits and performance


High identification security Fast evaluation Very broad range of applications, due to three interfaces Accentic design including keypad with time-limited background display lighting Easy fitting, commissioning, integration and operation

The use of the BioKey software with the evaluation algorithm specially optimised to suit the new thermal 2-line sensor is a crucial contribution to the robustness and reliability of the mifare fingerkey reader. In addition, the new reader enables up to five fingers, or alternatively four fingers and an additional substitute code, to be stored on a 4k mifare card. This ensures both convenience and security when carrying out identification, even in adverse conditions such as an injured main finger.

nised as one of the safest biometric methods when it comes to identifying fingerprints, due to the fact that neither

b:secure 01|2008

Systemworld: Access control

1

Flexible in many areas of application The new Accentic mifare fingerkey reader with keypad features a broad range of applications with three RS-485 interfaces, clock/data and Wiegand. The new reader also shows how adaptable it is in the way it works: by activating a DIP switch it can be utilised either as a read-in station or as an access control reader. Thanks to its high degree of flexibility and compatibility, the mifare fingerkey reader can easily be integrated into previously implemented systems. The mifare fingerkey reader is suitable for use in intrusion detection technology, in access control and in conjunction with time recording systems. It can also be utilised as a switching element for activating or deactivating intruder alarm systems. In addition, it provides added safety and convenience when used as an operating element for access control and time recording systems. The Accentic mifare fingerkey reader also showed its high degree of fingertip sensitivity in questions of corporate data privacy protection, due to the fact that the

fingerprint converted into a template is not stored in the system itself but as a protected file on a personal mifare card. An unlimited number of fingerprints can be simultaneously examined in the system by means of this method. The Accentic mifare fingerkey reader is suitable for both indoor and outdoor use (IP54). Its night design with time-limited background display lighting makes it ready for use at any time of the day or night. Other user-friendly features are the LED display with internationalised markings, the tactile and acoustic feedback and the durable, convenient 10-digit keypad with six additional function keys. The mifare fingerkey reader is one of the first biometric systems for which VdS approval was applied. n New areas of application for fingerprint identification
Biometric techniques can be used in almost any situation in which personal identification is important. Biometric identification systems are already being used in numerous areas of our daily lives. For example: Buildings that require special protection or areas such as infant care wards, banks, laboratories and research institutes, airports and similar places. The combination of biometric and conventional identification methods provides access control systems with added security. Season tickets The use of biometric identification systems is a good method of assuring that non-transferable tickets are not passed on to unauthorised persons. For this reason, fingerprint and facial recognition technologies are becoming increasingly used in places such as health studios, solariums, thermal baths, zoos and stadiums. Payment systems Registered regular customers of several German supermarket chains are now able to pay by means of fingerprint identification whereby payment itself is carried out by bank transfer. The customer requires neither cash nor credit card. From a data protection point of view this method is comparable to discount systems.

02

02 All at your fingertips: the Accentic mifare fingerkey reader combines convenience and security when it comes to checking identity

20

Systemworld: Access control

b:secure 01|2008

The new key role in access control


Honeywell Security has completely revised its range of electronic locking systems
n The use of electronic locking systems is becoming increasingly relevant for both public buildings and companies. Protection by means of personalised access control is important, particularly in frequently accessed areas with high security requirements. In this regard, a number of requirements have to be fulfilled: easy access for employees, no access for unauthorised personsand this often has to be accomplished while taking escape route requirements into account. Apart from the growing need for higher building security, the rooms within the buildings are also being used in an increasingly flexible way. Companies and authorities are often restructured, buildings are only temporarily rented and office space can be subject to changes of use at frequent intervals. Flexibility as key qualification With the new DLC electronic locking cylinder, Honeywell Security is now additionally offering a small, flexible and economical access control solution that combines the classic protection characteristics of mechanical devices with the benefits of electronic access control systems. The difference to mechanical key systems is that the assigning of identification to authorised persons by means of electronic codes is faster and more flexible to handle. In terms of functionality, DLC is equal to a high-grade access control system: in combination with the proven IQ MultiAccess control software, DLC makes it possible to cover all aspects of system management such as the shortterm blocking of lost ID cards, registration The new, universally applicable, batterydriven locking unit consists of a reader module, a profiled cylinder adaptor and a mechanical inner doorknob. The modular construction of the cylinder body guarantees a high degree of flexibility: over 30 standard cylinder length combinations of access, allocation of time zones or changing of locking rights according to necessity. DLC bridges the gap between mechanical security and electronic intelligence, thereby opening up entirely new options in the field of access control. It is capable of reading proX/IK2, mifare or LEGIC transponders and ID cards contactlessly, does not require additional wiring and can be easily integrated into electronic access control systems.

b:secure 01|2008

Systemworld: Access control

21

enable DLC to be used in doors ranging in thickness from approx. 50 to 110 mm. The DLC fits all profiled cylinder locks capable of integrating a European standard lock cylinder adaptor, making it suitable for use in both new and old buildings. An additional advantage of the modular cylinder design is the low cost of fitting: a detailed plan showing which cylinder fits which door is not necessary. The suitable cylinder adaptor for each door can simply be selected on site. Installation requires nothing more than a screwdriver and only takes a few minutes. The digital locking cylinder is powered by two standard CR2 lithium 3-volt batteries designed for 30,000 actuations and up to ten years service life. Even if the battery is flat, a locked door can still be opened in an emergency using a special installation tool. Easy commissioning and programming Not only the commissioning, but also the assignment and management of access rights are especially user-friendly. All of these tasks can be simply performed by using the infrared interface of a PDA (PALM ) and the access manager instal

days, door program controls and the stipulating of various validities for access rights and office authorisations. Whenever access profiles need to be changed or entered, all doors which have been updated are displayed on the PALM PDA. This greatly simplifies the updating process and saves additional working time, particularly in large-scale security systems. The registration and recording of any sabotage attempts is another of the added security features the BSI-listed DLC offers. Any unauthorised attempts to manipulate the system can be read out via the PDA during the next system update. A proX/IK2 cylinder head is available to integrate individual doors into an access control system. Programming with MasterCards makes it possible to authorise up to 99 ID cards or transponder tags per cylinder. Online programming via the wireless network is also currently being planned for the future. Wide range of applications In principle, any mechanical cylinder can be replaced by this new, multitalented innovation. The system offers a direct benefit and raises the level of security, particularly in situations in which either an access control system is already installed or where the necessity for a system of this type has been recognised, for instance in administrative or business buildings, schools, institutions, universities, the offices of public authorities or hospitals. Depending on the necessity and place of usage, the mechanical button can even

be easily replaced with a second reader module to ensure access control in both directions that have varying access rights depending on the side. Thanks to the integration of the electronic cylinder functionality in the IQ MultiAccess user softwareeven in existing systems the user can not only retain the previous card organisation, but also the proven software platform and has access to both the existing access control reader and the electronic cylinder. A door mounting is also available with the same functionality. The DLF door mounting can also be installed quickly and without wires and can be used both in combination with DIN 18251 mortice locks and with self-locking panic locks. An authorised booking electromechanically unblocks the door handle and the door can then simply be opened by pushing down the handle. Commissioning, booking and management options as well as the display function showing previously updated doors when updating are identical with those of the DLC locking cylinder. n

led on it. The offline version enables authorisation profiles to be assigned for up to 2,000 cards or transponders per cylinder. Here again, the management and control can be carried out simply using a PDA equipped with IQ MultiAccess software. Additional options are also available for regulating access controls, for instance the creating of groups for certain doors or employees, access schedules, calendars specifying access on certain special

22

General

b:secure 01|2008

Security is an ongoing trend


This years Security poised to break 200 exhibitors record
n The first Security trade fair took place in Essen back in 1974 with a total of 105 exhibitors. Since then, the fair has continually strengthened its position as the number one exhibition of its kind worldwide. With a new figure of 40,600 trade visitors and a total of 1,036 exhibitors, the 17th world trade fair for security and fire protection 2006 recorded the best result in its successful history. This year the previous record is even going to be surpassed: over 1,000 exhibitors from 50 countries will be showcasing their innovations at the industrys leading trade fair. It was not the quantity of the products on show, but their quality that gained the Security its reputation as a driving force and hub of the security and fire protection industry. The fair stands for a high degree of expertise and is known as a meeting point for decision-makers. The increased internationality of the Security is yet another of its positive sides. A further beneficial feature of the exhibition is its organisational structure: the forming of Approximately 40,000 security experts from around 80 countries are expected to be at the Security 2008 in Essen this year. The exhibitors will be presenting a broad range of products in the fields of security and fire protection technology, including burglar alarm systems, access control and monitoring systems, CCTV technology, fire detection technology, criminal technology, various fire protection solutions for equipment and buildings and also working and protective clothing. Apart from enhanced developments in security concepts, the Security will also be featuring important topics concerning the use of security technology in the worlds of industry and business. These include the fields of Security over IP, the integration of classic security technology into corporate computer networks and the numerous applications of RFID technology ranging from product to personal identification. For Honeywell Security, this key exhibition for security solutions once again provides the ideal backdrop for showing its new products to a knowledgeable international trade audience. The company will be using the theme Jazz as its keynote. Under the motto The Sound of Security, Honeywells trade fair appearance will set out to prove that security is a theme with a great many variations: the companys new range of products covering a broad range of security technology topics comprises a mixture of successful soloists and multi-system security compositions. Jazz is a symbol for our integrative security solutions, explained Stephan Winkelmann, Head of Marketing Communication, when describing Honeywells trade fair concept. Above all, the crucial factor is the successful interplay between the various products. n thematic focal points will enable visitors to find what they are looking for more quickly, make orientation easier and thus leave them more time to gather precise information and compare various options. Another key subject at the Security will be the use of biometric methods. A wide range of technically mature products concerning hazard detection technology and mechatronic security, particularly locking technology, will also be showcased at the fair.

b:secure 02|2008

Aesthetics & Function

Allgemeines

2

The new TouchCenter graphic control panel with individualised selection of colours and graphics
The aesthetically appealing graphic control panel for burglary alarm units fuses ease of use with sophisticated design. The 14.5 cm display with colour touchscreen allows the direct input of all functions by simply touching the monitor. The self-explanatory interface with clear touchscreen buttons and symbols ensures intuitive, dialogue-based user prompting. Individualised design options enable perfect visual integration. The colour palette of the TouchCenter display can be altered to blue, green or light brownthe choice is yours. If desired, graphic elements such as a floor plan or company logo can be superimposed as the background image. The TouchCenter for BUS-2 can be used in connection with the burglar alarm units of the MB100, MB48 or MB24 series, as well as the MB256 plus.

Honeywell Security & Data Collection Novar GmbH Johannes-Mauthe-Strae 14 72458 Albstadt, Germany Phone: +49 (0) 74 31/8 01-0 Fax: +49 (0) 74 31/8 01-12 20 www.honeywell.com/security/de info.security.de@honeywell.com
2008 Honeywell International Inc. All rights reserved..

Honeywell Security & Data Collection Novar GmbH Johannes-Mauthe-Strae 14 72458 Albstadt, Germany Phone: + 49 (0) 74 31/8 01-0 Fax: + 49 (0) 74 31/8 01-12 20 Internet: www.honeywell.com/security/de E-mail: info.security.de@honeywell.com

Art. No. 097073.GB September 2008 2008 Honeywell International Inc.

NEWTON21