Authentication emerges as new layer of access security
While verification has been the mainstay of access control systems, many in the industry say that authentication and validation of documents - be it a card, passport, driverÃ¢â‚¬â„¢s license or other form of identification - is the next frontier to be conquered.
Beyond determining whether a document is real comes the greater questions of is the person who is holding the document who they say they are and if so, what are they allowed to be doing?
Central databases are often used for this validation purpose, noted Phil Libin, president and co-founder of CoreStreet, a validation software provider based in Cambridge, Mass., Ã¢â‚¬Å“but that doesnÃ¢â‚¬â„¢t work in the real world.Ã¢â‚¬Â
Libin said validation needs to take place quickly, yet securely. CoreStreetÃ¢â‚¬â„¢s software uses a series of patented proofs to validate everything from secure email and document signing to smart locks, Libin noted.
The technology, he said, is demonstration of how physical security and IT are increasingly coming together. Ã¢â‚¬Å“The two worlds are interconnected,Ã¢â‚¬Â Libin said.
Imaging Automation has also taken a role in the document authentication arena, beginning with border control, but increasingly finding interest with more conventional access control situations, said Bud Cunningham, director of business development for the Bedford, N.H.-based firm.
Ã¢â‚¬Å“ WeÃ¢â‚¬â„¢re finding a tremendous amount of activity in access control,Ã¢â‚¬Â Cunningham said, such as document authentication at a nuclear power plant and within a correctional facility.
Just verifying a document is no longer enough, Cunningham said, Ã¢â‚¬Å“you also need to authenticate it so you can be sure it hasnÃ¢â‚¬â„¢t been tampered with.Ã¢â‚¬Â He said this check of documents used to receive access credentials is one growing area.
In addition, he said, card-based systems are adding features that can be checked by Imaging AutomationÃ¢â‚¬â„¢s system. These forensic checks can include video images for facial recognition or other biometrics.
John Dorr, vice president-marketing at Viisage Technology, Littleton, Mass., said facial recognition systems help answer that question of Ã¢â‚¬Å“is the person who is holding the credential really that person and has the rights to it.Ã¢â‚¬Â
While still on the Ã¢â‚¬Å“bleeding edge,Ã¢â‚¬Â Dorr said systems such as ViisageÃ¢â‚¬â„¢s deal with the access controlÃ¢â‚¬â„¢s greater issue of ID validation Ã¢â‚¬Å“rather than just how can I open the door?Ã¢â‚¬Â
Facial recognition for access control, Dorr said, is still typically used Ã¢â‚¬Å“in a setting where you want to have more control, rather than less control.Ã¢â‚¬Â This includes security points at airport, high-security government facilities or even government contractors.
Already used in several states to assist in validation for driverÃ¢â‚¬â„¢s license issuance, Dorr said facial recognition systems also have applications beyond access control and surveillance, such as identifying high rollers at a casino for special attention, or verifying criminalsÃ¢â‚¬â„¢ identities in a pre-booking process.
What is comes down to, said Cunningham, is the need for more than one step to gain access or validate identity. Ã¢â‚¬Å“More and more commercial and state businesses are seeing itÃ¢â‚¬â„¢s important to add layers of security,Ã¢â‚¬Â he said.