electronics security pspi 2010
TRANSCRIPT
-
8/8/2019 Electronics Security PSPI 2010
1/19
LOGO
Electronics security
ING. El Kalamouni Samer
-
8/8/2019 Electronics Security PSPI 2010
2/19
LOGO
Security Systems
Security is the condition ofbeing protected against
danger, loss, and criminals.
-
8/8/2019 Electronics Security PSPI 2010
3/19
LOGO
Difference Disjuncture
Types of Electronics security
CCTV
Alarm Security Systems
Intruder detector
Access Control
-
8/8/2019 Electronics Security PSPI 2010
4/19
LOGO
Biometrictechnology
Access
Control
VeinGeometry
Finger
PrintReader
FaceKey
HandKey
Irisscanning
-
8/8/2019 Electronics Security PSPI 2010
5/19
LOGO
Proxy Reader
I
-
8/8/2019 Electronics Security PSPI 2010
6/19
LOGO
Fingerprint
Cards can be stolen, replicated or shared.
fingerprints identify the authorized person, which ensures the highest levelof security.
-
8/8/2019 Electronics Security PSPI 2010
7/19
LOGOwww.themegallery.com
-
8/8/2019 Electronics Security PSPI 2010
8/19
LOGO
Biometric Fingerprint Reader
-
8/8/2019 Electronics Security PSPI 2010
9/19
LOGO
FingerKey
Biometric Fingerprint Reader
Time Clock with Fingerprints
Fingerprints& Facekey
-
8/8/2019 Electronics Security PSPI 2010
10/19
LOGO
Time Clock with Fingerprints
Benefits and Features:
Easy installation
Connects directly to the local area network
Equipped with fingerprint reader and keypad
Utilizes optical fingerprint reader
Acknowledgment of acceptance: LED indicator,
display indication and voice reply
Many ways to identify:
Fingerprint only Card + Fingerprint
Password +Fingerprint Card only
-
8/8/2019 Electronics Security PSPI 2010
11/19
LOGO
biometric one door locked
There are three ways to unlock thedoor:
o Pin + fingerprint,
o Pin only
o mechanically by using the special keywhich is supplied.
When ordering specify either a left orright handed door lock model.
-
8/8/2019 Electronics Security PSPI 2010
12/19
LOGO
Access Keypad With FingerprintReader
-
8/8/2019 Electronics Security PSPI 2010
13/19
LOGO
Facekey Biometric
Verifications time : Less than 1 sec
-
8/8/2019 Electronics Security PSPI 2010
14/19
LOGOwww.themegallery.com
Face key &fingerprint
reader Obtain the highest levels of
security by combining
multiple biometric devices.
Comes complete with camera
and fingerprint.
Connects directly to a local
area network.
-
8/8/2019 Electronics Security PSPI 2010
15/19
LOGO
Iris Scanning
Iris scanning measurespatterns on the colored part ofthe eye - the iris.
your eye is 3 to 10 inchesfrom the camera .
When the camera takes apicture, the computer locates:
The center of the pupil .
The edge of the pupil .
The edge of the iris.
The eyelids and eyelashes.
-
8/8/2019 Electronics Security PSPI 2010
16/19
LOGO
Speaker recognition systems useSpectrograms to represent human voices
Biometric voiceprints
the data used in a voiceprintis a sound spectrogram, not awave form.
A spectrogram is basically agraph that shows a sound'sfrequency on the vertical axisand time on the horizontalaxis.
Different speech soundscreate different shapes within
the graph.
-
8/8/2019 Electronics Security PSPI 2010
17/19
LOGO
Vein geometry
Vein scanners use near-infraredLight to reveal the patterns in apersons veins.
To use a vein recognition system, you simplyplace your finger, wrist, palm or the back ofyour hand on or near the scanner.
The hemoglobin in your blood absorbs thelight, so veins appear black in the picture.
-
8/8/2019 Electronics Security PSPI 2010
18/19
LOGO
When networking readers you are only required to enroll on a single reader, your
template is then passed to all other readers.
-
8/8/2019 Electronics Security PSPI 2010
19/19
LOGOEdit your company slogan