Cyber Physical Security
 
   
 
Home
Electronic Security
RF
Virtual Reality
3D Printing
Motion Control
High Performane Computing
Magnetic Bearings
Magnetic Apparatus
Jackson Model
Technology
Contact
Distributors
About

Hong Kong Security Association

IntelligentMagnetics™ AI High Electronic Security
Industrial/Aerospace/Military Specifications
Designs by the world's leading expert in Magnetic Physical Electronic Security Components

 BMS / HSS - Balanced High Security Magnetometer Invulnerable to Defeat Keys (Balanced Magnetic Switches)


Cyber Security Systems and Physical Security Systems have been slowly merging.

The most technologically advanced systems are now referred to as "Cyber Physical Security."

The most advanced systems require professionals with degrees in electronic engineering.

Gone are the days where skilled labor was adequate.

High Security Fence
 Wireless Physuical Security System


Integrated Wireless Cyber Physical Security System with open source operating system.
Wireless Cyber Physical Security System

 

 

Protocol
 Blockchain AI Maximum Physical Security System

Asymmetric Maximum Cyber Physical Security System

Our Complete Blockchain Physical Security Network System transforms the traditional Physical Security System into a "Trustless" decentralized immutable Maximum Security Operation Center (SOC) utilizing Blockchain, AI and IT at both the hardware and software layers. A Suite of Blockchain Compliant Sensors have been developed that replace legacy sensors.

Single Point Central Command Center Attacks of all types have been rendered futile.

Asymmetric
 BMS / HSS - Legacy BMS Compatible and Network Magnetometers

BMS / HSS Magnetometer with Onboard AI

"The Next Generation Military Grade High Security Intrusion Sensor"; a novel 3D Balanced High Security Magnetometer System (3D-BMS). This revolutionary new generation of BMS replacement is the only known intelligent 3D Magnetometer Security integrated device (also called Smart Magnetometer or digital Magnetometer). Onboard AI recognizes its own magnetic field and knows when there is any attempt to defeat it. It is the only High Security Switch (BMS / HSS) in the world that cannot be defeated by "Trivial Means". It is also the only BMS technology in the world that can be networked and interrogated.

JRM1212L
 Smart RS485 Hub

JRNET100 8-Port RS485 Hub with Dual USB 2.0 Ports

The hub supports eight RS485 networks with control lines, power and status indicators on the front panel corresponding to each port. Any legacy device can be connected which includes passive BMS / HSS, passive infrared motion sensors and other devices. It supports up to eight separate RS485 High Security networks. Legacy and network devices can be combined in a variety of configurations.

This is a full featured RS485 hub with command line control suitable for any industrial application including, but not limited to, robotics, industrial controls and laboratory instruments.

JRNET100
 BMS / HSS - Tester for both the Basic and RS485 Networked Models
Handheld Test Unit JRT3285

The JRT3285 can be used alone or in combination with the JRNET100 hub for installing BMS / HSS switches and other devices. Devices, such as the JR1212 Series magnetometer, can be tested at the point of installation. The tester interfaces through a RJ11 P6C6 socket to the JR1212 Series magnetometers. A 9 pin D-Sub connector is the interface to a RS232 serial port for communication with networked magnetometers.

It is useful for trouble shooting device installations and networks to determine point of fault as well as insuring proper sensor wiring before connecting it to the network or hub.

JRT3285 Tester
 Classical BMS/HSS Substitutes

The Classical BMS/HSS High Security Switch technologies are all in the public domain and any associated patents have long expired.

These substitutes, made in China, can be supplied in minimum quantities: enquire.

BMS Classics
 Defeat Technologies

"Recent research shows most access control technology currently in use is not as secure or convenient as many security managers believe, according to day-to-day users of the system. Furthermore, responses provided by more than 1,600 managers, directors, analysts, and senior managers in a survey conducted by The 05 Group found 22 percent of organizations do not use any methods of electronic access control, further exposing these businesses to potential breaches.

“In the absence of something bad happening, real vulnerabilities are often perceived as just theoretical,” says Daniel Bailin, Vice President, Strategic Business Development and Innovation with HID Global. But significant threats can arise from system, technology, and policy shortcomings. Survey results found that while users desire more convenient access control methods and extended capabilities, there remains a lack of understanding and adherence surrounding the importance of policy and security protocols. This leaves significant opportunity for threats to become real incidents that can wreak havoc on an organization. Additionally, many organizations lack significant training and onboarding procedures that can be implemented to help educate employees on best practices for access management.

While the majority of employees trust their organization’s access control systems (75 percent), there is evidence to suggest that the systems are not as secure as they might think. In many instances, this is due to an organization’s reliance on access control technology that is decades old or has been deployed in an insecure manner. A recent survey from ASIS International found that more than three out of four enterprises depend on legacy technology that fails to meet modern security standards and best practices. These legacy systems are invariably vulnerable to a number of basic attack vectors using information and technology that is readily available online." [1]


Defeat Sticks (Sentrol, Securitron, Honeywell, others)

Jackson Research has developed "Trivial Means" to defeat all known High Security Switches of the traditional BMS / HSS types including several listed under UL634 Class 2. Only Jackson Research devices are immune to this form of attack.

 
Other Defeat Technologies:
 
 BMS / HSS - HowTo
Door Installation
 Precision Electromagnetic Traction Locks
BHMA/ANSI Magnetic Locks - Single or Pairs of Outswinging or Inswinging Doors
FCC Class B and CISPR Radiated, Conducted, and Pulse Emissions Compliance

Our Precision Electromagnetic Traction Locks clearly out perform any competition. The fully networked digital Balanced Magnetic Switches and Intelligent Magnetics™ Precision Traction Locks represent the next generation of IntelligentMagnetics™ High Electronic Security Systems Revolution which has no peers.

maglock
 Technology

Despite its importance, the “field” of physical security is scarcely a field at all. This has not changed since September 11. There is a severe shortage of meaningful standards, metrics, fundamental principles, rigor, studies, and theories. Unlike cyber security, it is difficult to get a degree in physical security from a major 4-year university, and young people (especially females) ignore the field in droves. Vendors and manufacturers of security devices and systems often make exaggerated or fraudulent “snake oil” claims. There are virtually no conferences where research & development results are presented, and until just recently, no peer-reviewed research journals devoted to physical security. The VAT has attempted to contribute to the development of the field by founding a new research journal for physical security. The Journal of Physical Security (ISSN 2157-8443) is the first scholarly, peer-review journal devoted to physical security R&D.
http://www.ne.anl.gov/capabilities/vat/journal.html

 Electronic Physical Security Equipment Standards