How do you think the new GigE standards will influence the machine vision industry?
Respond or ask your question now!
By Lee J. Nelson
Sentinel also performs AWD, determining if a user leaves the workstation unattended. In some instances, the operator may exit the camera’s field-of-view only to re-enter shortly thereafter. During that predetermined grace period, Sentinel won’t permit anyone else to assume control of an existing session. In event the individual does not return within a programmed interval, Sentinel ends the computer session, averting unauthorized access.
David Ting, Chief Technical Officer of Imprivata, Inc. (Lexington, Mass.), a Viion Systems strategic partner, says: “Best practices for information security mandate that you need to know what your employees are accessing and have the means to audit their usage of any system. Having confidence in who is getting on the system means trusting in more than just the user name and password someone enters. It means relying on strong authentication and having a comprehensive model to prove a user’s identity.”
Ting hastens to add that controlling access to applications and information is only part of the overall security equation. There is an equally compelling need to continue to be alert, after granting admittance. Notwithstanding that all proper precautions are in place, the inadvertent opportunity still exists to leave the system in an exposed state.
“[In today’s] mobile environment, where people are constantly moving up to and away from their workstation, video-tracking walk-away solutions are especially relevant. The ability of the system to monitor the visual presence of the logged-in user, up to the moment (s)he steps out of the field-of-view, allows the system to intelligently lock the workstation and integrate smoothly with the user’s workflow.”
With the advent of Viion Systems’ Sentinel suite, APDI is establishing itself as an effective channel for automated, walk-away authentication across a broad range of applications and environments. APDI minimizes the requirement to enter a username and password. It can effect substantial cost-benefits through reducing the frequency of manual sign-on operations and curtailing log-on failures; diminishing the need to remember and contend with multiple passwords; and, improving administrators’ facilities to add and remove users or modify their privileges.