Testing 500 terminals

January 2016 Access Control & Identity Management, Integrated Solutions

Suprema is on a mission to revolutionise the biometrics security market. 2015 saw the release of two key products that will serve as the cornerstone of the revolution.

First, BioStar 2, Suprema’s Biometric Open Security Platform that will serve as a basis for all the future terminals to come. Second, BioStation 2, Suprema’s ultra-performance fingerprint access control and time and attendance terminal.

BioStation 2 will change how biometrics is infused with security. It is highlighted by its reliability and performance, even when pushed against its limits. The most important aspects of physical security are securing scalability and reliability within the system. A key element in achieving these characteristics is the high-performance of the system. BioStar 2’s architectural philosophy is based on securing such aspects.

BioStar 2 is suitable for enterprise level applications with up to 500 doors and 20 000 users. It is built with efficiency in mind and is optimised to operate on as little resources as possible.

To demonstrate this, Suprema set up a simulation comprising 500 BioStation 2 devices in a test to process 20 000 users at a single site. To see the power of the new system architecture, 20 000 users were transferred to 500 devices at once. Using Hyper Data Transfer, the system was able to transfer a total of 10 000 000 users’ data simultaneously, using very little resources.

The asynchronous data transfer mechanism ensures that the data is transferred quickly. As the device does not have to go offline during the process, the terminal can still be used while the transfer is taking place.

In this high traffic environment, test firmware was loaded and the terminals were switched onto auto-identification mode. During this test authentication entries were being recorded randomly across the system and the real-time log reports updated on the system. It was noted that even while the network and services were being put through its paces the server operated normally.

A key strength of BioStar 2 is its ability to cope under network failures. The distributed intelligence of the system allows the terminal to continue to provide secure access and collect logs. Once the network has recovered, locally collected logs are transferred to the system automatically without hassle.

This was demonstrated by disconnecting the network connection between the server and devices by unplugging the network cable. The system showed the devices as disconnected and logs were no longer being recorded. Even though the network was down the device still functioned normally.

View Suprema’s video at https://www.youtube.com/watch?v=KkA_OvbdbVg

For more information contact Suprema, +27 (0)11 784 3952, enquiry@suprema.co.za, www.suprema.co.za


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

Intelligent analytics and the brains to match
September 2019, Bosch Building Technologies , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
What if the brains behind our security cameras could be trained to improve their cognitive ability to pay attention, learn, and problem-solve according to specific rules and situations?

AI-powered autonomous Drone-in-a-Box
September 2019 , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Organisations in the mining, energy and industrial, oil and gas, ports and terminals sectors can optimise security and business operations, whilst reducing risks and operational costs

Biometrics: the game changer in access control
November 2019, IDEMIA , Access Control & Identity Management
For security managers, the question is no longer, should I use biometrics, but rather, which biometrics should I use.

ViRDI UBio Tab 5
November 2019 , Access Control & Identity Management
ViRDI Distribution SA (ViRDI Africa) has announced the release of its long-awaited UBio Tablet to the South African market.

Cloud-based access control
November 2019, Elvey Security Technologies , Access Control & Identity Management
Hattrix is a flexible and scalable security platform that marks a shift toward outsourcing security, similar to other services such as IT, HR, and legal services.

Transforming secure access for SMEs
November 2019, dormakaba South Africa , Access Control & Identity Management
The dormakaba Matrix One access solution is an off-the-shelf access offering that is easy to use, completely secure and browser-based, making it accessible from anywhere in the world.

Manage remote transmitters via GSM
November 2019, ET Nice , Access Control & Identity Management
ET Nice has released a new solution to set up and manage remote transmitters online and monitor access equipment via GSM.

Secure hands-free access
November 2019, Suprema , Access Control & Identity Management
Suprema’s facial biometric terminals bring no-touch access into secure residential estates, high-rise apartments and luxury homes providing fast, easy and intuitive user authentication with the added benefit of hygiene.

There’s an app for gate configuration
November 2019, CAME BPT South Africa , Access Control & Identity Management
CAME KEY is a new generation of working tool for gate automation, allowing setup and configuration from a mobile app.