Security Systems

BIM, Services, and Emergency Response

The Building Information Model (BIM) comprises a family of standards, including the three dimensional building model, that compose a comprehensive description of a building. It is an oft hoped desire that the BIM, perhaps working through a mythical BIM server, be accessible to improve situational awareness by emergency first responders

One barrier for this BIM/Emergency management information exchanges is that BIM does not, by and large, define real service mapping. Chemicals and supplies may stored by room number. Ventilation may be by zones established long before the room numbering. Missing people may be...

Read More

Enterprise Interactions for Physical Security

As promised a week ago, here are some scenarios for physical security systems interacting with enterprise systems, and even through the enterprise to other enterprise-enabled buildings systems.Hotels, Customer Service and Energy

Hotels put a lot of effort into their customer relationship management. Building space, if well operated, cost the same in similar cities. Beds are beds, as long as they are clean. Hotels compete for customer loyalty to develop preferences that make the consumer check their hotel chain first rather than merely going to hotels.com.

The vision of Hotel Technology Next Generation (HTNG.org) includes rooms that respond automatically to the customers...

Read More

Emergency Response and Building Intelligence

The first responder faces a number of challenges in extracting useful information from a building. Chemicals and supplies may stored by room number. Ventilation may be by zones established long before the room numbering. Missing people may be in their office as per the directory, or in the conference room, which may not be identified in the BIM, or elsewhere.

BIM (Building Information Models) could rather easily bridge the control system, with its focus on AHU3 by placing AHU3 in the building. If, say a return air temperature sensor is associated with both AHU3 and room 204, then one can imagine standard techniques to visually map rooms, and high heat through the control system.

The biggest issue is control systems tend to present their points fo...

Read More

Service Oriented Physical Security

Enterprise and government security are now deeply enmeshed in service oriented architectures. Policy-based event management increasingly drives access to data and access to information. Complex problems of who is granted what kind of access are resolved in conversations in which practitioners assert semantics and compare ontologies.

Members of the Security Industry Association (http://www.siaonline.org/) are in a complicated world with few standards. The big three services (access control, intrusion detection, closed circuit monitoring) share almost noting in control protocols or in implementation. The special needs of diverse facilities, whether highly hardened, or adverse environment (high radiation, extreme cold …) are likely to prevent technology consolidation. Because security must always be concerned with hostile agents, security systems are arguably an area where standardization is actually bad.

The best security systems interact with the enterprise. The trivial example is awareness that an employee was fired yesterday. Closing the office during the company picnic can change both the access control and intrusion detection rules in the building. But enterprise programmers do not really understand the inner working of these systems and their volatile technology.

Security is never about just locking the gate. It is far easier and cheaper to build a fence with no gate, if the goal is to make sure that no one enters. The point of security is to make sure that right person at the right time can easily access a facility or service. Therefore, the most important attribute of security is situation awareness.

Physical security faces the same key issues as system security. Identification is the first question: who is attempting the activity in question. One of the most important identities is the well known person Anonymous. The next question what roles does this person possess. What job does this person have? What role is he assuming today? Is he working on this week’s maintenance call-back list?

Intrusion detection has the same issues. Intrusion detection is also able to add spatial awareness to the enterprise security system. This week, I was introduced to a security system in which a user’s phone and network access were disabled as long as he was in a certain location.

Clean simple enterprise interfaces to security systems should treat the entire systems as an enterprise appliance, offering up situational awareness and providing simple services. Those services can then be made subject to all of the nuances of policy-based security used in the IT realm.