Testing 500 terminals

January 2016 Access Control & Identity Management, Integrated Solutions

Suprema is on a mission to revolutionise the biometrics security market. 2015 saw the release of two key products that will serve as the cornerstone of the revolution.

First, BioStar 2, Suprema’s Biometric Open Security Platform that will serve as a basis for all the future terminals to come. Second, BioStation 2, Suprema’s ultra-performance fingerprint access control and time and attendance terminal.

BioStation 2 will change how biometrics is infused with security. It is highlighted by its reliability and performance, even when pushed against its limits. The most important aspects of physical security are securing scalability and reliability within the system. A key element in achieving these characteristics is the high-performance of the system. BioStar 2’s architectural philosophy is based on securing such aspects.

BioStar 2 is suitable for enterprise level applications with up to 500 doors and 20 000 users. It is built with efficiency in mind and is optimised to operate on as little resources as possible.

To demonstrate this, Suprema set up a simulation comprising 500 BioStation 2 devices in a test to process 20 000 users at a single site. To see the power of the new system architecture, 20 000 users were transferred to 500 devices at once. Using Hyper Data Transfer, the system was able to transfer a total of 10 000 000 users’ data simultaneously, using very little resources.

The asynchronous data transfer mechanism ensures that the data is transferred quickly. As the device does not have to go offline during the process, the terminal can still be used while the transfer is taking place.

In this high traffic environment, test firmware was loaded and the terminals were switched onto auto-identification mode. During this test authentication entries were being recorded randomly across the system and the real-time log reports updated on the system. It was noted that even while the network and services were being put through its paces the server operated normally.

A key strength of BioStar 2 is its ability to cope under network failures. The distributed intelligence of the system allows the terminal to continue to provide secure access and collect logs. Once the network has recovered, locally collected logs are transferred to the system automatically without hassle.

This was demonstrated by disconnecting the network connection between the server and devices by unplugging the network cable. The system showed the devices as disconnected and logs were no longer being recorded. Even though the network was down the device still functioned normally.

View Suprema’s video at https://www.youtube.com/watch?v=KkA_OvbdbVg

For more information contact Suprema, +27 (0)11 784 3952, [email protected], www.suprema.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...