Sensor Detection as a part of IoT and IIoT

Sensors are everywhere. They’re in our homes and workplaces, our shopping centres and hospitals. They’re embedded in smart telephones and a vital part of the Internet of Things (IoT). Sensors have been around for a long time. The first thermostat was introduced in the late Eighties, and infrared sensors have been around since the late 1940s. However, the IoT and its counterpart, the Industrial Internet of Things (IIoT), bring sensor utilisation to a brand new level.
Broadly speaking, sensors are devices that detect and respond to changes in an environment. Inputs can come from numerous assets, which include light, temperature, movement and pressure. Sensor outputs provide valuable statistics, and if sensors are linked to a network, they are able to share information with other devices and control systems.
Sensors are critical to the operation of many of today’s organisations. They can alert potential troubles before they grow to be massive problems, for instance, allowing organisations to carry out predictive maintenance and avoid expensive downtime. The information from sensors can also be analysed for trends, allowing business proprietors to gain insight into critical trends and make informed evidence-based decisions.
Sensors come in many shapes and sizes. Some are purpose-built containing many integrated individual sensors, permitting monitoring and measurement of many assets.
There are many varieties of IoT sensors and an even greater range of packages and use cases.

SPG Sensor Remote Device

The SPG Sensor Remote Device (SD1-2ADI-PCB) provides an easy expansion for an S1000 Smart Controller to provide analogue sensing information. It may be linked through the S1000 rules engine and then used to enable automated local decisions and provide an audit trail that can also be passed to ARCO Platform for logging.
The Sensor device runs on an OSDP communication, and up to 16 devices can be connected to an S1000. In addition, each sensor device supports onboard temperature and humidity, light detection and an accelerometer for movement detection.
There are also 2 additional digital/analogue inputs, with the analogue inputs supporting both voltage and current monitoring of third-party sensor devices. In addition, there is also 1 analogue/digital output.

Light Sensor

The Sensor Device enables you to measure the intensity of visible light. The sensor’s spectral response tightly matches the human eye’s photopic response and includes significant infrared rejection.

Features

  • Precision Optical Filtering to Match Human Eye
  • Rejects > 99% (typ) of IR
  • 23-bit effective dynamic range with automatic gain ranging
  • Binary-Weighted Full-Scale Range Settings
  •  0.2% (typ) Matching Between Ranges
  • Flexible Interrupt System

Temperature and Humidity Sensor

The Sensor Device enables the measurement of the surrounding air’s absolute temperature and relative humidity.

Features

  • Fully calibrated, linearised, and temperature compensated data output
  • Parallel measurement of temperature and humidity on separate pins
  • Typical accuracy of 1.5 %RH and 0.2 °C

 

Motion Sensor

The Sensor Device enables inertial measurement using a 6-axis MotionTracking that combines a 3-axis gyroscope and a 3-axis accelerometer.

Features

  • Digital-output X-, Y-, and Z-axis angular rate sensors (gyroscopes) with a full-scale range of ±250, ±500, ±1000, and ±2000°/sec and integrated 16-bit ADCs
  • Digital-output X-, Y-, and Z-axis accelerometer with a full-scale range of ±2g, ±4g, ±8g and ±16g and integrated 16-bit ADCs
  • Factory calibrated sensitivity scale factor
  • Wake-on-motion interrupt for low power operation of applications processor
  • Minimal cross-axis sensitivity between the accelerometer and gyroscope axes

Hazardous Gas Detection

The Sensor Device enables measurement of gas leakage by detecting LPG, isobutane, propane, methane, alcohol, Hydrogen or smoke gasses.

Features

  • Wide detecting scope
  • Fast response and High sensitivity
  • Stable and long life
  • Simple drive circuit

Pressure Sensor

The Sensor Device enables measurement of barometric pressure based on piezo-resistive technology featuring high accuracy and linearity as well as long-term stability and high EMC robustness.

Features

  • Detects pressure from 300 to 1100 hPa
  • Relative Accuracy at ±0.12 hPa, equiv. to ±1 m (950 to 1050hPa @25°C)
  • Absolute Accuracy at typ. ±1 hPa (950 to 1050 hPa, 0 to +40°C)

Indoor Air Quality Sensor

The Sensor Device enables measurement of contaminating gases present in real-world applications enabling a unique long-term stability and low drift.

Features

  • Multi-pixel gas sensor for indoor air quality applications
  • Outstanding long-term stability
  • Two pre-processed indoor air quality signals

 

 

 

 

 

 

New SPG Product in Focus – OSDP Mini Camera

Not all work environments are the same; some require additional surveillance to maintain and complete the security work needed to protect and safeguard valuable assets. Additionally, remote sites may be subject to significant variations in temperature, humidity, power availability, and other services and variables. SPG’s latest hardware is ideally suited to these types of challenging requirements.
Ideal for mounting inside enclosures, racks, ATM’s, vaults, Telco cabinets, Utility facilities or any location where non-continuous monitoring is more economical.

Connected via the encrypted OSDP bus of the S1000 Smart Controller, the Mini Camera captures images at high speed and then stores them locally on the S1000 SD card.

Images can be uploaded to the ARCO Platform using Ethernet or via a 4G expansion card in the S1000 Smart Controller or directly connecting to a WIFI router.
Up to eight (8) Mini Cameras are supported on an S1000 Smart Controller. Minimal battery backup to an S1000 would ensure continuous availability of images from remote sites for alarm management or activity verification. All communications are encrypted end to end.

Some typical use cases are listed below:

Vehicle Fleet and Driver Security & Tracking Management

SPG’s fleet and driver monitoring solutions puts management within the passenger seat of each vehicle in the fleet with GPS, truck, trailer and driver monitoring
Add video, two-way audio and environmental monitoring and controls to your fleet and secure your driver’s and cargo’s safety end to end.

Cabinet Monitoring and Management

Providing early warning of failures, video and two-way audio and ensuring only authorized employees or contractors are permitted access are key attributes of our remote cabinet solutions. In addition, sophisticated monitoring provides the real-time condition of the cabinet and its key components.
This also helps control preventative maintenance, make informed decisions, and cut personnel and operational expenses costs. SPG’s sensor logs also provide for root cause evaluation to help mitigate future problems.

ATM Monitoring and Management

Persistent physical attacks continue on ATM’s resulting in theft, disruption, damage and poor customer service. Increasingly, explosive gases are used to destroy the integrity of ATM vaults, and the use of mechanical excavators and machinery still results in ATM’s being pulled from their building surrounds or free-standing locations.

SPG Controls offers a smart security system, which has been designed to protect ATM’s from theft or unauthorized access. Providing early warning of failures, video and two-way audio and ensuring only authorized employees or contractors are permitted access are key attributes of our ATM monitoring solutions. Standard battery backup and 4G connectivity provide ongoing operation in the event of a power or communications loss.

 

Remote Vault Monitoring & Management

Where physical security vaults protect cash, documents and assets, SPG Controls offers a smart security system designed to protect the vault and the personnel opening and closing vault and bookroom doors from theft, unauthorized access or duress. Providing early warning of failures, video and two-way audio and ensuring only authorized employees or contractors are permitted access are key attributes of our vault monitoring solutions. SPG enables both efficiency and security, our sophisticated monitoring devices providing the real-time condition of the vault and key components. This additionally helps to manage preventative maintenance, make informed decisions, and cut operational expenses. SPG’s sensor logs also provide for root cause evaluation to help mitigate future problems.

Data Centres – Monitoring & Management

Data Centers are among the most important components in modern IT infrastructures, hosting websites, web services, and web applications that we use on a daily basis. Social networking, media streaming, software as a service (SaaS), and other activities wouldn’t be possible without the use of these web servers. With cloud computing growing fast and moving more services online, web server monitoring is only becoming more important.

SPG Controls offers the perfect management system for Data Center temperature monitoring. Our ARCO Solution can easily be configured to send you and your team alerts when Data Center temperature and humidity values rise or fall with video verification using our OSDP Mini Camera.

What is GDPR and how does it affect you?

The General Data Protection Regulation (GDPR) is often considered the strictest regulation in the world for securing users’ private data. It applies to all organizations that process the personal data of European Union citizens and residents, and the fines for non-compliance can reach up to €20 million.

This article explores the nature of this regulation, lists its fundamental principles, and offers a checklist for meeting GDPR compliance requirements. This article will be helpful for companies that already follow the GDPR and for those who are going to enter the European Union market.

What is the GDPR?

The GDPR is a data privacy and security regulation adopted by the European Union (EU). It imposes obligations on all organizations that collect and process the personal data of EU residents, even if these organizations operate outside the EU.

The GDPR provides EU residents with control over their personal data and obliges organizations to:

  • Gather, collect, and manage personal data legally and according to strict rules
  • Protect data from misuse and exploitation
  • Respect the rights of data owners

What is personal data?
Under GDPR, this means any information relating to an identified or identifiable natural person (Data Subject), an identifiable natural person can be identified, directly or indirectly, in particular by reference to an identifier such as:

It’s also important to be familiar with specific terms the GDPR introduces to define roles associated with data handling: data controllers, data subjects, and data processors.

Who must comply with the GDPR?

Any organization that stores or processes personal information about EU residents is obliged to comply with the GDPR, even if the organization is located outside the EU.

Yet, there are some nuances. For instance, organizations that have fewer than 250 employees are free from the majority of record-keeping obligations (see Article 30.5), though they still have to meet other GDPR requirements.

However, even if your organization employs fewer than 250 people, you might be obliged to keep records according to strict GDPR rules in case of your processing of personal data:

  • is likely to result in a risk to the rights and freedoms of data subjects
  • is not occasional
  • includes special categories of data as referred to in Article 9
  • includes personal data relating to criminal convictions and offences described in Article 10

Why should you comply with the GDPR?

Meeting GDPR compliance regulations isn’t only about complying with mandatory requirements. It can also help your organization do the following:

Protect personal data

GDPR articles implement high standards for personal data security, obliging data controllers and processors to secure “any information relating to an identified or identifiable natural person.”

Maintain your reputation

Neglecting data privacy regulations may affect your reputation. It could be that a data breach will lead to investigations, fines, and potential lawsuits. Staying compliant with GDPR requirements helps you maintain a reputation as a trustworthy and professional organization. And ensuring secure data processing is a reliable way to minimize the risk of security incidents.

Increase customer loyalty

People want to know that their data is safe and control it, mainly since the GDPR has ensured their rights. Therefore, customers and businesses are more likely to choose a trustworthy and GDPR compliant service provider or subcontractor than a non-compliant one.

Avoid fines and penalties

Article 83 of the GDPR states that the maximum fine for non-compliance is up to 4% of annual global turnover or €20 million (whichever is greater). Fines for GDPR non-compliance depend on multiple factors, including:

  • the duration and severity of the violation
  • the degree of cooperation with the supervisory authority
  • the categories of personal data affected

Ensuring GDPR compliance requires a deep understanding of the regulation. So before proceeding to the checklist on GDPR compliance, let’s take a quick look at the key principles behind the GDPR.

Key principles of the GDPR

GDPR requirements are based on the seven principles laid out in Chapter 2. They embody the main ideas of the regulation and explain the key reasons for implementing all requirements.
Compliance with these principles is essential for good data protection in general and compliance with the detailed provisions of the GDPR in particular.

Contact us to learn more about how SPG Controls can help your business in GDPR compliance.

Facing Up to Contactless Biometric Access Control

Thermal imaging and contact tracing technologies have garnered increased attention in recent days with the gradual reopening of some countries’ economy. These solutions are but one part of what portends to be a fundamental shift in how companies consider and use security systems. Access control, which has always been the first and foremost consideration in any security environment, will also be significantly impacted by the lasting effects of the pandemic. The adoption of biometric entry devices could be simultaneously improved and impeded over coronavirus concerns.

SPG Controls is pleased to announce the completion of its latest integration to biometric facial recognition technology. Growing customer demands to help verify the safe return to work for employees, contractors and visitors have accelerated SPG’s plans to include facial recognition, mask-wearing and thermal detection. The keys to the new integrations are high-speed performance, a flexible rules engine and an entirely contactless user experience.

For instance, an employee approaching their building’s main entrance access control doors will present themselves to the camera, the recognition algorithms verify the person, thermal sensors check the temperature, and AI verifies mask-wearing.

Any exceptional readings outside of the parameters implemented are notified to the user, and access may be denied depending on rules agreed by the employer. Recognition may take place either with or without a mask, but building entry may only be possible wearing a mask. In the case of an individual having a high temperature, physical access may be denied, and the employee will be directed to contact their manager or Human Resources department or follow other agreed protocols.

The underlying principle of no physical contact ensures a safe return to the workplace. Access may also be linked to digital health applications or “passports,” used to manage the status of vaccinations, COVID test results, whether through the uploading of results via an API or by uploading copies of documents for third party verification. Employees retain their health credential on their own device and log in on building entry using a dynamic QR code. An audit trail is held in all cases should track and trace for any incident be required.

SPG Thermal Biometric Reader uses next-generation AI facial recognition and body temperature detection technology. This ensures absolutely no surface contact access using high-precision temperature detection on mask-wearing users.

It integrates high-speed image acquisition, face detection, face tracking and face contrast, and human body temperature detection.

Contact us to learn more about how SPG Controls applies the science of biometric access control to help your business.

Sound Intelligence from SPG Controls resonates with our European partners

Digital Audio Verification to manage Alarm Events

Another addition to SPG Control’s product line provides encrypted two-way VOIP data for alarm verification, intercom and public address. Our latest Audio Listen-In Module provides connectivity to our S1000 Smart Controller through an encrypted OSDP bus. Digital audio is then delivered from the S1000 over wifi, ethernet or 4G to our central ARCO software platform or via Industry standard protocols to commercial security monitoring stations.

Two leading French monitoring companies have just successfully completed testing of our digital audio products in anticipation of several new projects. ESI and Azuresoft have been working alongside our European distributor, JMP Controls, based in Paris. Pascal Creff, CEO, said, “I’m delighted with the new capability and industry-leading audio quality available from SPG Controls Audio Listen-In Module. I expect to be able to offer improved alarm management and risk reduction to my growing portfolio of customers.”

 

 

 

 

Up to 8 microphones and 8 speakers can be attached to an S1000. Audio playback is possible using SIP (IP telephony), RTP streams or can be sent direct-to-browser. Our technology remains compatible with any central station monitoring provider, with audio control possible via DTMF commands or through Industry-standard contact ID reverse commands. Audio feeds may be triggered by alarm events governed by our “rules engine,” pre-alarm audio is also available. Pre-recorded messages may be stored within the S1000 Smart Controller and can be enunciated when triggered by specific circumstances.

Contact us to learn more about how SPG Controls applies the science of sound to help your business.

How to Improve Mobile App Security

Mobile Application Security Improvement

Mobile App security issue

With the increasing popularity of Mobile Devices, almost everybody uses mobile applications, but hardly anyone thinks of their data security while using them! At the same time, when developing system applications, there’s a tendency to focus on Site security rather than on the Application. Security is taken for granted, relying on the backend, where there may also be vulnerabilities.
A poorly protected mobile application can be a serious threat to an entire system. Mobile devices are where we store and work on critical data such as in payments, access, for medical and banking information, almost certainly for personal data, etc.

The problem of mobile application security is, especially concerning in various Android systems. Mainly because as it’s an open system, it is more vulnerable to data breaches at the operational level than Apple iOS (which is a closed system). Android is very fragmented, new versions of the system are deployed to customers’ devices very slowly, which directly impacts the improvement of the entire system’s security. It does not mean your Apple iOS system is completely safe – there are threats related to storing data or web server communication (a Man in the Middle attack) which may make your application vulnerable.

To add perspective to the problem, let’s consider the following examples;

Data and device interception

A Mobile App security breach can be related to several issues, from storing users’ data without encryption in the localised database (which was the case of a popular communication app in 2011) to session token change (a problem for a well-known marketplace application in 2016). The mobile app switched sessions to a different user’s token, most probably collected from deep links. This, through a fake marketplace site, made way for the potential theft of other users’ account data, such as user ID, profile photo, phone numbers, date of birth, access logs, and much other private information.

There are also several examples where an entire device has been compromised through a system vulnerability. Back in 2017, there was a significant security loophole discovered in a Bluetooth driver called BlueBorn; this allowed attackers to obtain complete control of a mobile phone by remotely executing code. In 2018, another issue was discovered; in order to control device modems, an Android firmware used AT commands (dating back to the 1980s). Manipulating these commands allowed hackers to gain control of the entire mobile device. Luckily, you don’t have to worry about BlueBorn issues anymore – it is already fixed on the majority of Android devices running 6.0 or greater and in iOS 10 and greater.

Such vulnerabilities can be used for a variety of reasons, for example, to create false certificates to obtain the data streaming out of your mobile app or install malware to obtain user data. These issues were rather quickly fixed at the operational level, but the question remains as to the extent of the breach. Normally, system loopholes unfortunately result in users waiting for an upgrade and ensuring app security personally.

Ensuring Mobile Application Protection

Ensuring mobile protection is an ongoing process, A most common methodology is to follow a standard security practice; more are now being adapted;.

Standard security practices may include:

  • The encryption of sensitive personal data, including encryption of the local database, cache, or API communication
  • The correct cryptographic key management and user session authorisation (tokens)
  • Token validations – the assigning of one to each consecutive device separately and with different session expiration times
  • Implementation of safe communication standards, e.g. certificate pinning in the case of HTTPs

Mobile-specific security methodology may include:

  • The protection against malicious apps
    • blocking screenshots or masking
    • Masking the mobile app view in the app switcher – preventing any preview of the mobile app’s content when switching to a different app
    • securing the clipboard – so a copied password is not visible in other mobile apps
    • IPC protection (Inter-Process Communication) – a security measure applied to system components to enable communication between mobile apps and the system, such as Activities, Services, Broadcast Receivers, Content Providers
  • UI security analysis, specifically in terms of data leaks (e.g. password masking or data validation)
  • Anti-tampering
  • Android-specific:
    • Code Obfuscation – these limit reverse engineering
    • Proper handling of mobile app signatures
    • Blocking access to overlapping active mobile apps – protection against content scraping done through different apps layered on top of the active mobile app
    • managing permissions in Android apps
  • iOS-specific
    • Using App Transport Security (ATS) for all internet connections
    • Enable the File Data Protection
      All the stated methods cover just some of the risks but be aware of them! Secondly, implementation or verification may require particular expertise.

How does SPG Controls ensure the security of Mobile Applications?

Mobile security is our priority. SPG Controls will ensure our Mobile Applications adhere to industry standards and are robust and resilient to attack.

Security Review

The security review can be done in five steps:
1. SPG Controls review the project to better understand the source code, structure, and purpose of the application.
2. SPG Controls make a list of the application’s various elements responsible for introducing risk to the project.
3. SPG Controls prepare a list of the application security features that should be implemented for all elements, and then verify if all the required security features are in place.
4. After a thorough analysis, if needed, a rescue plan will be created – SPG Controls prepares the list of security protocols which should be implemented.
5. Finally, SPG Controls will maintain the security level of the Mobile Application and ensure it is in the future updates.

Secure Authorisation

Specific permissions dictate the features available to the end user. Permissions are based on asset of assigned roles (or access groups). There are also “Access Policies” defined, which are additional rules needed to access a resource, such as what times an operator is allowed to access a specific resource. An operator who is logged in to the system with more than one role, for example as an Administrator, an Engineer and as a Guard, will be able to select a role and this will define which objects can be viewed with what permissions.

API Integration

The ARCO Platform provides the ability to interface to many 3rd party systems using an Open API. The API is based on the latest Web-based Restful Architecture. All data contained within the ARCO Platform is securely exposed to the 3rd party systems. All commands, events and configuration changes are logged by ARCO including the property changes made, so there is a full Audit trail.

To know more about how SPG’s ARCO Platform and how it can help secure your assets, click here.

Cloud Advantage

ARCO – “powered by artificial intelligence, one of the world’s first cloud-based security monitoring software packages.”

The ARCO platform is an intelligent, centrally controlled, management platform, designed primarily for monitoring data from thousands of remote sites. Built with the latest cloud based technologies, the ARCO platform allows unlimited scalability and interoperability with third party systems. It is specifically enabled to protect high value assets, platforms, services and data stores with no reliance on location dependent IT assets, resources or operations.

Why cloud? As IBM and Forrester have so ably explained –

Cloud computing The key to continuing a successful virtual-to-physical transformation, to taking advantage of new-found agility and innovation, lies in the cloud. Going forward, organizations will need to continue modernizing operations to realize the immense benefits of cloud-native capabilities: location independence, talent flexibility, scalability, resilience, interoperability and seamless transition to a virtualized engagement and delivery model.

First, where cloud was once a desired future end state, it is now an indispensable, immediate environment. Second, organizations can move faster than they realized and be nimbler than they believed possible. Third, earlier rationalizations that prevented successful and speedy digital transformation can no longer be tolerated. Becoming an agile digital enterprise is essential.

All of these efforts, enabled by secure cloud technology; accelerate efficiency, support new work practices and serve as driving forces for transformation and modernization. Organizations embracing public and hybrid cloud are already emerging stronger, better and more resilient with greater transparency, visibility and accountability through common performance enterprise metrics, digitally instrumented.

Increased automation, application of AI and other advanced technologies which drive efficiency, along with quality, security, collaboration and innovation. The shift to digital services will reduce organizations’ dependence on travel and physical presence.

What corporations need (key items for success) –

Security for their growing remote workforce, including unified endpoint management for mobile devices and laptops, as well as identity and access management to safeguard users, applications and data. Access to remote and virtual security experts and analysts who can rapidly extend security team capacity, or make specialized skills and subject matter expertise available on demand.

Location and scale flexibility, reducing reliance on physical, location-dependent IT assets, resources and operations, with long-term benefits for budgets and staffing.

Consolidation of infrastructure and simplification of operational support processes around a standard cloud based platform.
A permanent shift to cloud archive and storage, including replacing manual tape environments that are location dependent and difficult to access under shelter-in-place orders.

Deeper commitment to automation and virtual workflow orchestration, along with a greater commitment to open (non-proprietary), interoperable services.
Ability to generate whole-of-business insights on demand.

Governance and productivity monitoring, with faster cycles of leadership updates, more organizational and operational lesson-sharing, heightened cross-functional communication and decision making.

SPG’s ARCO Solution can provide a consistent work experience with desktops and apps—accessible from virtually anywhere.

Cloud computing allows mobile access to corporate data via smartphones and devices, which is a great way to ensure that no one is ever left out of the loop. Staff with busy schedules, or who live a long way away from the corporate office, can use the Manager App to keep instantly up-to-date with site status.

SPG’s ARCO Solution
Resources in the cloud can be easily stored, retrieved, recovered, or processed with just a couple of clicks. Users can get access to their works on-the-go, 24/7, via any devices of their choice, in any corner of the world as long as they stay connected to the internet. On top of that, all the upgrades and updates are done automatically, off-site by service providers. This saves time and team effort in maintaining the systems, tremendously reducing IT team workloads.

For more information – see www.spgcontrols.com

A Forrester Consulting Thought Leadership Paper Commissioned By IBM January 2020 Reinventing Workflows Power Your Digital Transformation And Drive Greater Impact By Modernizing Processes. Trending Insights – Beyond the Great Lockdown: Emerging stronger to a different normal. COVID-19 Action Guide for Executives. IBM Institute for Business Value.
A Forrester Consulting Thought Leadership Paper Commissioned By IBM April 2020 The Future Of Work Is Now: Build Resiliency And Adaptability With Automation And AI

24 Hour Security – The Perks of AI

Why Security Systems with Artificial Intelligence are Better

Security should always be a priority which means that it should not be neglected. It is important to secure business assets around the clock, and at present, not every Company can manage or afford to do that.

Thanks to the evolution in technology, there are now “machines” that can make it possible for you to guard your property and other assets for 24 hours a day, 7 days a week.

Technology has provided more security gadgets and devices that can help monitor and deter crime without having to invest valuable corporate time and resources.

The Internet of Things (IoT) is gradually growing to be even larger than expected. There are a lot of IoT devices connected to the internet, effectively helping companies with their everyday needs. One of the needs is security.

There are now automated security systems that use artificial intelligence (AI) to better secure businesses. In this case, AI is used to automate what would be repetitive tasks in a better way. The key to automation is including key parameters in the initial set up phase.

Having an AI-assisted security system at your business requires minimal interaction with the system itself. Once you have set desired settings and outcomes, the system will calibrate itself and run smoothly.

If for instance, an automated security system picks up an alert from a motion sensor, security lighting can be enabled, and associated security cameras can quickly pan through the scene. If there is confirmation of an actionable event, smart locks can then be instantly activated, microphones used to listen in and access control, video, sound recordings and management information can be passed to a mobile application and security monitoring centre for further decision making. Confirming an event with multiple sources of information means company personnel won’t be needlessly disturbed.

Advantages of Automated Security Systems with AI

Always Online

Since most automated security systems will make use of IoT devices, this provides an “always-on” capability where connectivity, device status, power supply and battery health and environmental indicators (heat, light, humidity, flood, flow control and many others) are automatically monitored. In addition, this information can be provided to an individual, third party response company or contractor and allows fingertip control to the heart of the solution to program and manage any incident.

Minimal InteractionWhy Security Systems with Artificial Intelligence are Better

Whilst providing control of every parameter of the solution, after set up, automation will take over. There’s no need to spend Corporate resources or time on an ongoing basis.

Audit Trail, Data Integrity & Security.

Every detail of your Company security solution is only available to an authenticated user. An audit trail contains all of the alarm, access, video, voice and environmental monitoring information which you can call up for specific dates without any problem.

SPG delivers outstanding automated security systems for your business. We make sure that Company assets will be protected.

Contact SPG Controls for further information

Open Supervised Device Protocol and Added Security

Open Supervised Device Protocol and Added Security

The Security Industry Association (SIA), which represents electronic and physical security solutions providers, developed the Open Supervised Device Protocol (OSDP) to help improve interoperability for access control security products.

OSDP

What Are The Advantages of OSDP?

OSDP is Flexible

There are many connectivity options available under OSDP; 2-wire communications fibre optics, wireless, and TCP/IP, all of which are readily available and widely deployed. In addition, OSDP is not constrained by communication limitations such as being tied to an RS-485 twisted pair. Security specialists can utilise any full or half-duplex data communication medium available with the appropriate protocol translator and gateway.

The OSDP roadmap specification also allows for extended IP environments and also allows for cross-checking and monitoring of security platforms from different manufacturer devices and solutions, a huge advantage.

OSDP Enhances Output for Audio and Visual Feeds

More data can be displayed thanks to OSDP as it also provides a format that can be used for text displays using the card reader. There are also additional timed functions and help with improving audio feeds and other digital outputs from a legacy reader (with a conversion device) and an OSDP-compliant reader.

OSDP is Scalable

OSDP allows for up to 126 addressable devices in one RS-485 line (splitting them up across different channels). This improves the poll/response cycle times to make security tighter yet more fluid.

OSDP and AES-128

The OSDP specification has an authentication and encryption scheme in place, AES-128. This encryption secures data that is being transferred across a network to controllers and connected devices. Implementing the encryption is also straightforward in low cost embedded peripheral devices.. CMAC chaining is used for securing the channels through key management and such.

OSDP and Implementation

OSDP is a relatively new protocol; however, it is l easy to implement with card data supported in raw format, 200-bit binary and Wiegand.

osdp

OSDP has clear advantages over Weigand;
OSDP is easier to implement overall and is user-friendly.
Training is short and simple for implementing the protocol over networks and devices.OSDP is cheaper and more practical because of the minimal cable requirements. OSDP supports cable ranges up to 1200m while Wiegand only up to 152m.

OSDP uses the high-end AES-128 encryption being more secure than Wiegand.
OSDP supports two way communication between the controller and the card reader.

 

Why Use or Adopt OSDP?

OSDP has been supported by every major Access Control product manufacturer. SIA recommends that OSDP is particularly used in high-risk security applications. In addition, it can also be used in government use cases as it meets federal access control requirements such as PKI for FICAM.

Why Use or Adopt OSDP?

SPG S1000 Control Panel’s features an RS485 multidrop OSDP port Isolated RS232/RS485 configurable port to communicate with SPG Alarm Keypad, Sensor Board and other 3rd party devices.

To know more about OSDP and how it can help your business contact SPG Controls.