1.07.2010

Scripting and the ISONAS System.

source: ISONAS

Script Programming supports Customized Actions
  • Is there a need to have your ISONAS system initiate multiple advanced actions under certain conditions?
  • Do you or your customers wish to receive email notifications when doors are left ajar or when ex-employees are attempting to re-enter the facilities?

These types of project requirements can easily be met through the Script Programming features application suite. Select the events you wish the system to monitor, and then specify what additional actions you would like the system to take when these events occur.



Schools Locking down their Facilities
 
A common use of Scripting is to configure the ISONAS system to place the exterior doors of a school into lock-down mode, when the administrators of the school require it. Scripts can be initiated in many ways, including by the use of specified credentials, or through the activiation of emergency mushroom buttons.

Additional common usages of scripting include the activation of the building's alarm system, or unlocking all entrances to a facility when a special event is beginning.



Email Notifications

Emails can be generated by the Crystal Matrix system, throught he Scripting feature. Example uses of the email notifications would include being notified of a networking failure, or being notified of an after-hours attempt to enter the facility.

Click here for more details on this solution.

Click here to visit the Kondor Security ISONAS page.

Click here to visit ISONAS.







12.14.2009

Digital locking cylinder - Network Inside

We already have the unique WaveNet, which wirelessly networks the components in the Digital Locking and
Access Control System 3060. Until now, this process has required a separate wireless LockNode at each door in addition to the Digital Locking Cylinder 3061.


Now, with the help of miniaturisation, this LockNode has been so dramatically scaled down it can be integrated in the knob of the new “Digital Locking Cylinder 3061 - Network Inside”.


But not only that: At the same time additional functions have been implemented, so that the Network Inside cylinder can for example also be used as a “gateway” in the virtual network, transferring information
via the transponder. The transponder sends and receives information through the “gateway”; this information can for example be transmitted to other doors or made available to the system administrator. The following tasks should be particularly noted:
  • time correction in the system
  • tasks and access authorisations can be linked to dates and appointments
  • forwarding of a cylinder battery warning as part of system status monitoring
  • reading the access lists
In new buildings, the System 3060 can be networked wirelessly in a few minutes by installing a compact
special cylinder. In existing locking and access control systems from SimonsVoss, the wireless WaveNet network can be upgraded quickly and cost-effectively at any time by replacing the knob cap on the cylinder,
without having to change the door or door frame.
_

PRODUCT VERSIONS.
  • Version „network inside“ for direct wireless networking
  • With integrated Lock Node
  • Available with each profil and in all versions
  • G2 locking cylinder with advanced functionality refer to G2 locking systems
_
TECHNICAL DATA.
  • Available as cylinder with Euro-profile according to DIN 18252/EN 1303, with Scandinavian Oval, British Oval or Swiss Round profile
  • Battery lifespan: up to 150.000 lockings or up to five years stand by
  • 3,000 operations can be recorded
  • 5+1 time zone groups (G2: 100)
  • Up to 8,000 transponders can be managed per cylinder (G2: 64,000)
  • Up to 48,000 lockings can be managed per transponder (G2: 304,000)
  • Various duration / opening modi (office function)
  • Upgradeable firmware
  • Additional technical specifications refer to profil and versions of the suitable cylinder
_
Technical data of the network knob.
  • Network knob as retrofit knob for networking of a TN4 cylinder
  • Dimensions of the knob: length 26 mm, diameter 30 mm
  • Power supply: 3V DC battery in the TN4 cylinder
  • Power consumption with no data traffic: approx. 8µA
  • Battery life: up to 5 years on standby or up to 150,000 activations
  • Max. transmission power: approx 1 mW
  • Sensitivity: -95 dBm
  • Range from central / router node: up to 30 m, depending on building structure
  • Only suitable for indoor use (down to 0°C)

12.03.2009

Access Control - Then and Now


Access control systems have changed and grown exponentially since they were first introduced. In 2009, amazingly, the majority of access control systems on the market continue to utilize the same basic technologies that were introduced in the late ‘60s: a combination of simplistic card readers lacking electronic intelligence, linked by multiple wires to a centralized power supply and a central control panel. This setup makes the “allow entry” decisions for the card or other credential presented at the door. These systems are energy hogs, they’re difficult to install and –more simply put- they’re a relic of past technology.

Then – A look back in access control history

The original access control system was a simple lock and key. Still in use today, keyed locks are easy to install and affordable, yet easy to break into. The first generation of automated door access systems used what would today be referred to as primitive readers with no intelligence which passed credential information -from a magnetic or RFID-enabled card- to a central control panel, which made the “allow entry” decision. The next generation of readers made slight improvements so that the reader could be connected to the control panel with an RS-485 bus and had enough intelligence to open the lock. These second-generation “semi-intelligent” readers however still passed the credential codes to the control panel so there was no improvement in either installation cost or energy consumption cost.

Although the advent of “intelligent” readers improved memory to allow access decisions to be made at the reader, independent of the control panel, the panel was still necessary since updates to the system and event histories were uploaded to it. Though some current panels have added the ability to connect to a network, they still offer no new advances in installation time, costs or energy consumption.

As shown below, the installation of even the most modern panel-based system remains a labor and cost intensive exercise. The panel also has the disadvantage of limitations to the number of doors supported per panel – typically 4, 8 or 16 doors depending on the brand and model. This means that adding just one more door to a full panel system necessitates the addition of another panel, thus increasing the cost on both a total system and a per-door basis. The ongoing operational costs of any panel-based system are also higher than the state-of-the-art ISONAS alternative for two reasons;

Panel-based systems must be maintained by specially trained  personnel since they do not employ widely available computer standards of operations.

 They consume significantly more energy






Now – Intelligent IP reader-controllers

Alternatives exist today that take advantage of modern computing and networking technologies to provide a number of significant improvements over panel-based systems by improving the basic functionality of access control systems, improving the overall security parameters of these systems, lowering the cost of installation, lowering energy usage associated with the system’s operation and easy integration with other security and building management systems.

The ISONAS Powernet Access Control System utilizes a customer’s existing Ethernet-based Internet Protocol (IP) network to link intelligent reader-controllers via a CAT5 or CAT6 cable -the same cables that provide power to the ISONAS reader allow data communications to any inexpensive standard Windows computer running the system’s access control software – the ISONAS Crystal Matrix Software System.

“Allow entry” decisions are made at the door by the intelligent PowerNet IP reader-controller with historical event data passed, on a periodic basis, to the host software. The PowerNet reader contains a list of individuals that are allowed entry to the door (cabinet, gate, etc.) along with the times or shifts that they are allowed entry. Management of the system is easily accomplished via web-based pages from any computer with access to the internet. Individual reader-controllers can be set to stay open for specified periods or to remain locked until an authorized user’s credential is presented. Requirements such as anti-pass back, holidays and other special actions are easily accomplished through the Windows-based management software. Should the network go down, the PowerNet reader-controller continues to function in “standalone mode” and automatically updates the Crystal Matrix software when the network comes back online.

With Power over Ethernet (PoE) made possible by using the customer’s existing Ethernet network and industry standard CAT5 or CAT6 cabling, the additional power sources and wires needed for a standard panel-based system are simply unnecessary. The PowerNet reader-controller, the magnetic lock or strike and all the typical accessories, such as request to exit (REX) devices and door sensors, are powered by low voltage PoE through the PowerNet reader-controller. The on-going power usage of the system as a whole is therefore significantly more efficient than with any panel system, and installation is accomplished much faster -and is more cost effective- than is possible with a panel-based system.

The PowerNet is designed for both indoor and outdoor use and since it is not encumbered by a control panel, it can be installed in virtually any location with no limitation on the number of doors or access points. Adding new doors is as simple as adding a single CAT5 cable to the existing network facilities, attaching the PowerNet, the appropriate lock and accessories to the entry point and programming the reader-controller via the reader’s web-based pages from any computer with access to the internet.

Since the PowerNet system is managed by a software system (the ISONAS Crystal Matrix Access Control Software System) that runs on a standard Windows-based server, and is accessible through the normal IP network, integrating the PowerNet reader-controller with a web-based video system, building management system or other electronic security system is quite easily accomplished. The combination of access control and IP video into a single platform not only optimizes security and efficiency during operations but it also minimizes the costs of hardware, maintenance, and training of security personnel.

With this platform in place, it can easily be expanded to create a complete IP-based security and process monitoring system. Perimeter security devices, motion detectors, and/or additional cameras for monitoring key operations can be quickly added to the infrastructure. As illustrated below, the installation of a combination of IP-based access control and video surveillance is more efficient and cost effective than the installation of panel-based system.

Summary
Utilizing the capabilities of PoE allows access control devices to break free from the limitations of a control panel. Today one of the major advantages brought by PoE to the security marketplace is the freedom to install reader-controllers virtually anywhere. In a traditional panel-based system if the control panel fails the functionality of all the doors in the system is lost, severely impacting facility security. With an ISONAS system if the reader-controller fails it is isolated to one door.

The reason for the reduced installation costs of the ISONAS system is simple: Since the IT infrastructure already has PoE built in, no additional power infrastructure needs to be added to support the access control system. The number of wiring terminations required for an ISONAS system versus a panel based system is significantly reduced since an electrician installing a panel-based system terminates the wire at a junction box near the door and runs proprietary wiring back to the control panel where it has to be terminated again. With the CAT5 wire installation of the ISONAS system, “termination” is a single wire per reader-controller, pulled by less expensive installation personnel (no electrician required since CAT5 is low voltage) and uses the same simple plug familiar to anyone who has ever plugged a laptop into a network.

The installation labor of an ISONAS system is typically at least 30% less than a comparably sized panel-based system.

With a lower manufacturing carbon footprint and the lower voltage required from the PoE ISONAS devices, access control can now legitimately claim to have gone “green” since the power usage of an ISONAS system is significantly lower over its lifetime than with any panel system.

And since the actual hardware cost of a panel system with all its pieces and parts is more expensive than the simpler but more powerful ISONAS IP-at-the-door reader-controller, the whole system is more cost effective than any alternative available. Better security combined with more cost effectiveness – the difference between THEN and NOW.

11.13.2009

What Is Lock Bumping & Should I Care?

Bumping, also referred to as "rapping" is not new. In fact, it's been around for at least half a century! When this method is used correctly it is extremely effective in over 90% cylinder type locks. As with any other lock picking technique it requires some time and patience to master. A bump key is a key in which all the cuts are at the maximum depth. Bump keys can be cut for standard pin tumbler type locks as well as "dimple" locks.

In the 1970s, locksmiths in Denmark shared a technique for knocking on a lock cylinder while applying slight pressure to the back of the lock plug. When the pins would jump inside of the cylinder, the plug would be able to slide out freely, thus enabling the locksmith to disassemble the lock quickly. The use of a bump key was not introduced until some time later and was first recognized as a potential security problem around 2002–2003 by Klaus Noch who brought it to the attention of the German media. After further examination of the procedure, a white paper was drafted in 2005 by Barry Wels & Rop Gonggrijp of The Open Organization of Lockpickers (TOOOL) detailing the method and its applicability.


A patent exists for a lock device following the same principle as the bump key from 1926–1928. The technique then attracted more popular attention in 2005 when a Dutch television show, Nova, broadcast a story about the method. After the method received further publicity from TOOOL presentations at security conference talks, members of TOOOL and a Dutch consumer group, Dutch Consumentenbond, analyzed the capability of the method on 70 different lock models and with trained and untrained users in a 2006 study.

At the same time, Marc Tobias, an American security expert, began to talk publicly in the United States about the technique and its potential security threats. In 2006, he released two further white papers regarding the technique and its potential legal ramifications.


High-quality locks may be more vulnerable to bumping unless they employ specific countermeasures. More precise manufacturing tolerances within the cylinder make bumping easier because the mechanical tolerances of the lock are smaller, which means there is less loss of force in other directions and pins move more freely and smoothly. Locks made of hardened steel are more vulnerable because they are less prone to damage during the bumping process that might cause a cheaper lock to jam.


Locks having security pins (spool or mushroom pins, etc.)—even when combined with a regular tumbler mechanism—generally make bumping somewhat more difficult but not impossible. Electronic locks, magnetic locks, and locks using rotating disks are not vulnerable to this attack.


Because a bump key must have the same blank profile as the lock it is made to open, restricted or registered key profiles are not any safer from bumping. While the correct key blanks cannot be obtained legally without permission or registration with relevant locksmith associations, regular keys can be filed down to act as bump keys.


Locks that have trap pins that engage when a pin does not support them will jam a lock's cylinder. Another countermeasure is shallow drilling, in which one or more of the pin stacks is drilled slightly shallower than the others. If an attempt were made on a lock that has shallow drilled pin stacks, the bump key will be unable to bump the shallow drilled pins because they are too high for the bump key to engage. Many bump-resistant locks are available which can not be easily opened through the lock bumping method.

Of course you can also prevent such worries with an access solution such ISONAS' PoE PowerNet IP or SimonsVoss' Digital Locking & Access Control System.



If you have any questions, please do not hesitate to contact us here.


Creating a Keyless World with Simons-Voss

SimonsVoss has taken it upon themselves to make living and working with their system more secure, easier, more convenient and more efficient. In doing so, they've revolutionized classical mechanical locking media by applying digital technology and access control features. Their idea of a digital transponder instead of keys has been globally accepted. They've successfully and consistently turned their vision into reality with a radio-controlled, wireless locking and access control system.


SimonsVoss is the undisputed technology leader in the rapidly growing marked for digital, battery-operated locking and access control systems. More than 56,000 systems have been installed all overt the world proving that their vision has already become a reality. Below, you'll find a list of some of the most frequently asked questions about their innovative access control system.

Do I need both an RF lock and a SmartRelay for a Door?
No, the two components work independently of one another and have different tasks in the system. The RF Lock operates a mechanical latch. The SmartRelay operates a solid-state relay. As a result, you need only one of these components at a time.

Can the transmission of data over the radio link be tapped and reproduced?
The radio transmission is based on a method tested by the military. It is a constantly changing code sequence (crypto codes), which is not reproducible. Even renowned test institutes such as VdS and BSI, for example, couldn’t crack the code.

How is the system protected from attack?
The components are designed to resist mechanical, electrical and magnetic attacks.

Can I add a wireless network at a later date?
Yes, the system is designed to add a wired, wireless or virtual network at any time.

Can the lock system be expanded at a later date?
Yes the modular hardware components and the flexible lock plan software allow a modification or expansion of existing systems at a time.

Which components must be programmed?
All components, transponders and locks, must be programmed.

How can the digital locking cylinder’s battery be checked?
The status  of the battery can be displayed form the host computer through the SmartCD or wireless network.

Can the lock read HID cards?
Not yet. That technology is passive and does not transmit well through metal. However, a reader interface is being developed and other technology breakthroughs are being considered.

What happens when the battery dies?
There is a three-stage process of battery management that ensures authorized access. In all the years of operation access has never been denied due to battery failure.

Is there a mechanical override?
The deadbolt on the mortise lock can function as a mechanical override for mortise locks. The SV1C cylindrical lock does not have a mechanical override.

What certifications does the lock have?
These products are certified by the FCC not to interfere with other RF-based products. The US RF Locks have all been tested to ANSI Grade 1 standards. The locks are also approved by UL to meet the 10-C standard for fire doors under positive pressure.


Do you have a lock for a glass storefront door?
Yes. The Digital Mortise Cylinder (DMC4) can be used with the most popular aluminum storefront door locks.

How many transponders are supported by each RF lock?
Each RF Lock can support up to 8.000 transponders currently and will be upgradeable to 64,000 sometime in 2010.

What is the anticipated life of the batteries?
The batteries in the locks are certified for 150,000 cycles. The batteries in the standard transponders are certified for 1,000,000 clicks.

When using the wireless network, what is the range between the Central Node (computer) and the door?
The distance between each radio span (Central Node to Router or Lock Node or between routers) is a maximum of 150 feet. The distance is based on the RF environment and can be reduced by the surrounding materials.

What is the radio range for the signal between the Lock Node and the RF Lock?
The Lock Node must be located with 12” of the RF Lock. There is an optional external antenna for the Lock Node to extend this range up to 16 feet.

What are the environmental ratings of your locks?
The operating temperature of the SimonsVoss RF Lock is rated for -4 - +140 degrees Fahrenheit at non-condensing humidity of less than 90%.

Can the lock detect the position of the door?
SimonsVoss Technologies RF locks do not include a traditional door status switch. This capability is not significant to a standalone door with no real-time communications. When the 915 MHz wireless network is used, the Lock Node can monitor up to three input points.

What is the range between the SimonsVoss Technologies transponders and locks?
The maximum measured range is 20”. This distance is based on environmental elements such as the material of the door, the walls, and other radio products in the area.

Is it possible to use the SimonsVoss Technologies locks with an existing third-party access control system?
Yes, you can do this by using a Switching Transponder (TRA.SCHALT) which has wires that are connected in parallel to the button of the transponder. These wires are then connected to the relay terminals of the third-party access control panel. When the relay closed it activated the transponder just as if the button was pushed, opening the SimonsVoss Technologies RF lock.

Can I use third-party access control cards with SimonsVoss Technologies locks?
SimonsVoss has a reader that can read Mifare cards and use that information to send the proper user ID to the lock for the access decision. Extending this reader to other card technologies is currently in development.

11.11.2009

Company responsible for 1/3 of the world's junk email shut down.


A botnet that was once responsible for an estimated third of the world's spam has been knocked out of commission thanks to researchers from security firm FireEye.

After carefully analyzing the machinations of the massive botnet, alternately known as Mega-D and Ozdok, the FireEye employees last week launched a coordinated blitz on dozens of its command and control channels. The channels were used to send new spamming instructions to the legions of zombie machines that make up the network.

Almost immediately, the spam stopped, according to M86 Security blog. Last year, the email security firm estimated the botnet was the leading source of spam until some of its servers were disabled.

The body blow is good news to ISPs that are forced to choke on the torrent of spam sent out by the pesky botnet. But because many email servers already deployed blacklists that filtered emails sent from IP addresses known to be used by Ozdok, end users may not notice much of a change, said Jamie Tomasello, an abuse operations manager at antispam firm Cloudmark.

The takedown effort is significant because it shows that a relatively small company can defeat a for-profit network that took extraordinary measures to ensure it remained operational. Not only did Ozdok reserve a long list of domain names as command and control channels, it also used hard-coded DNS servers. When all else failed, its software was able to dynamically generate new domain names on the fly.

With head chopped off of Ozdok, more than 264,000 IP addresses were found reporting to sinkholes under FireEye's control, an indication of the massive number of zombies believed to have belonged to the botnet. FireEye researchers plan to work with the ISPs to identify the owners of the orphaned bots so their owners can clean up the mess.

FireEye researchers said the key to dismantling the giant ring was a coordinated effort that worked in multiple directions all at once so that bot herders didn't have a chance to counteract. "As it turns out, no matter how many fallback mechanisms are in place, if they aren't all implemented properly, the botnet is vulnerable," they wrote.

10.28.2009

New 3061 digital locking cylinder from SimonsVoss:

Up to 300 000 activations without a battery change

SimonsVoss, a market and technology leader in the field of battery-operated electronic locking and access control systems, is presenting the latest generation of its digital locking cylinder 3061.

One of the main features of the new cylinder is that it is powered by a battery with a significantly longer service life. SimonsVoss guarantees that the cylinder can be activated up to 150 000 times with standard button cell batteries, while the special variant can even be activated up to 300 000 times. With the 3061 digital locking cylinder, frequently used central doors can be operated for years without the battery having to be replaced.

With the introduction of this new generation of digital locking cylinders, SimonsVoss Technologies AG is setting new standards for the future of locking and organisational technologies. SimonsVoss transponders and cylinders far outstrip any other comparable locking technologies on the market in terms of battery life.

With respect to its aesthetic design, the cylinder features small, elegant symmetrical knobs. The inside of the cylinder has been completely revolutionised, because the 3061 digital locking cylinder can now be updated using a network or programming device, allowing users to simply ‘download’ new software-based features.

The new generation of digital locking cylinders can also store 3000 access authorisations as well as administering 64 000 transponders per cylinder and 320 000 cylinders per transponder within a single locking system.

And of course, the system also features various convenient ‘permanently open’ functions and a full range of remote diagnosis options.

The new generation of digital locking cylinders from SimonsVoss, like its predecessor, allows for wireless networking and is available in all variants: for example half-cylinder, anti-panic cylinder, VdS-approved, free-rotating, pushbutton control, multi-ratchet version or waterproof versions. We are also developing a version that can be addressed using high-frequency radio signals from standard radio routers (as defined in IEE 802.xx).


SimonsVoss presents new battery-operated and network-compatible Q3008 biometric wall reader


The Q3008 integrates seamlessly into existing SimonsVoss locking systems, because the ID assigned to each fingerprint can also be used for all other SimonsVoss locking components. This allows digital locking cylinders, Smart Relays, furniture locks, half cylinders, lever cylinders, shunt locks and cabinet handles to be activated by fingerprint recognition.

And the fingerprint reader is just as easily integrated in SimonsVoss networks, which means that IDs assigned to a fingerprint can be transferred to other fingerprint readers without having to physically walk to each biometric reader. The data can even be transferred to other locations, so that a fingerprint scanned in Munich will even work in Singapore, for example. The reader can store up to 50 different fingerprints and can be mounted on a plaster wall without the need for cables. Up to 80 000 operations are possible using a single battery.

The new Q3008 biometric reader complements the current Q3007 portable biometric solution from SimonsVoss, which combines the convenience of a transponder with the added security of biometric fingerprinting.

The ‘master finger’ function allows all SimonsVoss biometric readers to ‘learn’ new fingerprints quickly and easily.

You decide which door opens when and for whom.
And with just the press of a button.


With the digital Locking System 3060 from SimonsVoss, you can implement locking systems of varying sizes and complexity. You can make modifications, expand the system, block transponders – in short, handle all individual access authorizations – easily by pressing a button. At the same time, you can allocate up to three mutually independent locking systems to any given transponder. Thus, for example, you need only a single key to open the doors to the office, the private home or to the club facilities.

You can assign and activate each lock and transponder conveniently, quickly and reliably by using either a programming transponder or a combination of PC and PDA with the SmartCD programming device. Furthermore, you can connect the components with one another over the cablefree network – even some time down the road. This allows you to administer the entire System 3060 conveniently from a PC.

Programming in Small Systems

The Programming Transponder 3067 allows the quick and economical programming of the digital Locking Cylinder 3061 and the Transponder 3064. Without a PC or special system software, you issue or change access authorizations in small systems with the simple press of a button, for example, if a key is lost or if there are changes in the locking plan.

The Configuration of Extensive Locking Systems


You can set up extensive locking plans by checking off entries in an easy to view lock-user matrix on a PC or laptop. You can make modifications, expand the system, block transponders – in short, handle all individual access authorizations – by mouse click in a graphic user interface under Windows. You can also transfer the prepared locking plans from the PC to a PDA. Then the handy PDA, with the wireless SimonsVoss SmartCD, takes over the programming of the locking components and transponders for you.

Cablefree Network


In large locking systems, actions such as monitoring individual doors, reprogramming or reading out the access logging is usually time-consuming and therefore cost-intensive. The convenient Network 3065 offers online programming of the entire locking system or selected doors from one or more PCs. The network node, installed in a flush socket device, takes over the cablefree radio communication to the locking components and to the PC . This does away with the need for expensive, time-consuming installations on the door and doorframe.

Control done over the network nodes offers real-time monitoring and, optionally, makes it possible to drive integrated external systems and to switch on lights or heating systems automatically when doors are used. Using the radio-based network, you can even monitor buildings from a distance, for example, by modem or Internet.

The Event Manager in the Networked Locking System


The Event Manager allows you to define the most varied events in the locking system, along with any number of reactions. For example, if a door has been opened but no regular entry has been determined, an alarm can be triggered. Other potential reactions would be to send an E-mail to an alarm control center or an SMS alarm message to the cell phone of the locking system administrator. We save on the keyhole. And we save you a lot of money.

Low life-cycle costs, minimum administration and maintenance efforts and a useful life that is pleasantly long offset the investment in a digital locking system. Incidentally, you can also save on the investments in additional access control systems, because this function has already been integrated into the digital Locking and Organization System 3060 from SimonsVoss. Especially friendly to the budget: The modular construction allows the system to be expanded step by step. If you then also include the enormous timesavings for the planning, administration and documentation of a digital locking system, it all adds up to a good investment after only a few years.