SlideShare a Scribd company logo
1 of 7
Download to read offline
TBS
Trust Based Security
      System
1                       1



       1                       1
1 Airport Peripheral Security

               A combination of long
               range, IR, Radar, Laser
               and Video systems
               protects the periphery.



                         Vehicle
                         entrance
                         check



               TWICS* Entrance
               (Trusted Worker ID Card
               System)
2                                2
2   Terminal and Airside Entrance Protection




           Smart CCTV system
               “The Sixth Sense”
               Smart people &
               Vehicle tracking
               software.

          TWICS*
          Crew, Workers and Suppliers
          * (Trusted Worker ID Card System)
3




3   Inside Terminal & Check In Protection




           Smart CCTV system
               “The Sixth Sense”
               Smart people tracking
               software.

               WeCU
               Unique Computerized
               software based
               Behavioral analysis
               during Kiosk Check in.
4




4   Terminal Access Control
     Unique IT System (In-Q-Sec)
     Tracking passenger and Luggage

          ID-U
          Unique ID and Verification “on
          the fly” system For registered
          travelers and TWICS

           RFID (Boarding pass)
           Access control system for
           travelers

             MICROSPARK
             X-Ray + Exp. Detection
             Fast Track

        SDS
        Secondary Automatic Suspect
        detection
5




    5 Background Systems




A unique IT Platform that supports real time
communications, alerts and information
sharing (PTP & PTMP) while providing real
time statistics and billing info.
TBS is Copyright
protected and owned by
 AR Challenges (USA),
          Inc.

More Related Content

What's hot

LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
EC-Council
 
2013 Basic Presentation-A
2013 Basic Presentation-A2013 Basic Presentation-A
2013 Basic Presentation-A
Jim Stockstill
 

What's hot (20)

ACTAtek 3 Introduction
ACTAtek 3 IntroductionACTAtek 3 Introduction
ACTAtek 3 Introduction
 
AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.AET63 product presentation by Advanced Card Systems Ltd.
AET63 product presentation by Advanced Card Systems Ltd.
 
ACTAtek unique features
ACTAtek unique featuresACTAtek unique features
ACTAtek unique features
 
iClock990
iClock990iClock990
iClock990
 
WiFi-Based IMSI Catcher
WiFi-Based IMSI CatcherWiFi-Based IMSI Catcher
WiFi-Based IMSI Catcher
 
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
 
RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEM
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)
 
The Veri Chip
The Veri ChipThe Veri Chip
The Veri Chip
 
Overview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and CertificationsOverview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and Certifications
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
 
Strong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital ServicesStrong Authentication and US Federal Digital Services
Strong Authentication and US Federal Digital Services
 
Shopping Service Based on FIDO Voice Authentication
Shopping Service Based on FIDO Voice AuthenticationShopping Service Based on FIDO Voice Authentication
Shopping Service Based on FIDO Voice Authentication
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
Safe Landing for Luggage: SMART RFID for Airports
Safe Landing for Luggage: SMART RFID for AirportsSafe Landing for Luggage: SMART RFID for Airports
Safe Landing for Luggage: SMART RFID for Airports
 
FIDO and Strong Authentication in US Federal Government
FIDO and Strong Authentication in US Federal GovernmentFIDO and Strong Authentication in US Federal Government
FIDO and Strong Authentication in US Federal Government
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
2013 Basic Presentation-A
2013 Basic Presentation-A2013 Basic Presentation-A
2013 Basic Presentation-A
 
My ppt
My pptMy ppt
My ppt
 

Similar to Tbs Explanation

Inspira Biomorf Profile
Inspira Biomorf ProfileInspira Biomorf Profile
Inspira Biomorf Profile
uknadh
 
Market Research Report :Security Equipments and Services Market in India 2012
Market Research Report :Security Equipments and Services Market in India 2012 Market Research Report :Security Equipments and Services Market in India 2012
Market Research Report :Security Equipments and Services Market in India 2012
Netscribes, Inc.
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdf
LongJidin1
 
Rosslare Access control, car parking, elevator control with CCTV Integration...
Rosslare  Access control, car parking, elevator control with CCTV Integration...Rosslare  Access control, car parking, elevator control with CCTV Integration...
Rosslare Access control, car parking, elevator control with CCTV Integration...
PowertechGM
 
CSFI_ATC_Cyber_Security_Project
CSFI_ATC_Cyber_Security_ProjectCSFI_ATC_Cyber_Security_Project
CSFI_ATC_Cyber_Security_Project
Ben Othman
 
12206725‐pss7
12206725‐pss712206725‐pss7
12206725‐pss7
karylung
 
12200727‐pss7
12200727‐pss712200727‐pss7
12200727‐pss7
ting0631
 

Similar to Tbs Explanation (20)

RFID PPT
RFID PPTRFID PPT
RFID PPT
 
C True Presentation V9
C True Presentation V9C True Presentation V9
C True Presentation V9
 
SMARTGUARD SYSTEMS
SMARTGUARD SYSTEMSSMARTGUARD SYSTEMS
SMARTGUARD SYSTEMS
 
SMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILESMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILE
 
Scada Classification By-Rahul Mehra
Scada Classification By-Rahul MehraScada Classification By-Rahul Mehra
Scada Classification By-Rahul Mehra
 
Omniscout Corporate Overview
Omniscout Corporate OverviewOmniscout Corporate Overview
Omniscout Corporate Overview
 
Inspira Biomorf Profile
Inspira Biomorf ProfileInspira Biomorf Profile
Inspira Biomorf Profile
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Market Research Report :Security Equipments and Services Market in India 2012
Market Research Report :Security Equipments and Services Market in India 2012 Market Research Report :Security Equipments and Services Market in India 2012
Market Research Report :Security Equipments and Services Market in India 2012
 
12206571 pss7
12206571 pss712206571 pss7
12206571 pss7
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdf
 
Rosslare Access control, car parking, elevator control with CCTV Integration...
Rosslare  Access control, car parking, elevator control with CCTV Integration...Rosslare  Access control, car parking, elevator control with CCTV Integration...
Rosslare Access control, car parking, elevator control with CCTV Integration...
 
12206571 pss7
12206571 pss712206571 pss7
12206571 pss7
 
Kits final email
Kits final emailKits final email
Kits final email
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
RFID Emergency Evacuation
RFID Emergency Evacuation RFID Emergency Evacuation
RFID Emergency Evacuation
 
CSFI_ATC_Cyber_Security_Project
CSFI_ATC_Cyber_Security_ProjectCSFI_ATC_Cyber_Security_Project
CSFI_ATC_Cyber_Security_Project
 
12206725‐pss7
12206725‐pss712206725‐pss7
12206725‐pss7
 
12200727‐pss7
12200727‐pss712200727‐pss7
12200727‐pss7
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 

Tbs Explanation

  • 2. 1 1 1 1 1 Airport Peripheral Security A combination of long range, IR, Radar, Laser and Video systems protects the periphery. Vehicle entrance check TWICS* Entrance (Trusted Worker ID Card System)
  • 3. 2 2 2 Terminal and Airside Entrance Protection Smart CCTV system “The Sixth Sense” Smart people & Vehicle tracking software. TWICS* Crew, Workers and Suppliers * (Trusted Worker ID Card System)
  • 4. 3 3 Inside Terminal & Check In Protection Smart CCTV system “The Sixth Sense” Smart people tracking software. WeCU Unique Computerized software based Behavioral analysis during Kiosk Check in.
  • 5. 4 4 Terminal Access Control Unique IT System (In-Q-Sec) Tracking passenger and Luggage ID-U Unique ID and Verification “on the fly” system For registered travelers and TWICS RFID (Boarding pass) Access control system for travelers MICROSPARK X-Ray + Exp. Detection Fast Track SDS Secondary Automatic Suspect detection
  • 6. 5 5 Background Systems A unique IT Platform that supports real time communications, alerts and information sharing (PTP & PTMP) while providing real time statistics and billing info.
  • 7. TBS is Copyright protected and owned by AR Challenges (USA), Inc.