MAS Authentication Server

April 2016 Access Control & Identity Management, Products & Solutions

Access control systems are reliant on databases to store user information, keep logs and serve as reference for access control rules. For biometric systems, databases are all the more important as it serves as a reference for verification and identification of users’ biometric data.

The speed of verification and identification depends on various factors i.e. the complexity of the algorithm used, the size of the database and finally the speed at which the physical IT equipment being used to store the database can operate. When a database receives a query from a front end GUI – whether it be a POS, CCTV, access control or stock management application – it starts resolving the query by starting at the head of the database table and works its way down the table of stored information in a First-In-First-Out or sequential basis.

And herein lies a failing – especially for biometric systems – of databases. When an inordinate large amount of users and their biometric information are stored on a database, the system will gradually slow down and eventually will become so slow as to be virtually useless for the user and they could just as well have used a proximity card based system with the same result. The question is how does one overcome this inherent failing?

This is where ViRDI’s MAS Extendable Authentication Server provides a solution. It is in fact not a single server solution but rather a software solution spanning over multiple servers. The system is governed by the Dispatch Server which manages the distribution of queries to the authentication servers, manages the storage of fingerprint templates to the database management server as well as managing bottlenecks in the verification and identification process. By distributing the verification and identification queries over multiple authentication servers without unnecessary data such as user ID, name or other personal information we are able to achieve an identification speed of 1:1 000 000 per second on a 1:N system.

The MAS server solution has been created specifically for clients that have an excessive amount of users on the access control solution and the larger the database, the faster the solution becomes since more servers are deployed and the more processing power becomes available. It uses a customised version of the UNIS Command and Control software, Windows Server 64 bit OS and Microsoft SQL Server. Hardware requirements are an Intel i7 or bigger CPU, 4 GB RAM or higher and AC6000 units with customised firmware.

For more information contact ViRDI Distribution, +27 (0)11 454 6006, [email protected], www.virditech.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...