Identity Management Supplement

Fusion Frenzy

Combined sensor technology to help airport security

IN U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

Most often referred to as greeters, they are tasked with identifying passengers by their photo ID or passport, along with a brief check of their boarding card, to verify that each passenger is rightfully attempting to enter a controlled airport area. But these agents are currently not equipped with effective tools to detect forged documents.

Such a solution can be expected to perform faster, higher quality security identification checks, complementing existing protocols with automated explosives and other threat detection capabilities.

Detection systems fusion protocol (DSFP) -- an emerging methodology for the connection of multiple security sensors and intelligent communication between them and other systems -- is poised to change that.

From an operational standpoint, more and more passengers today are growing accustomed to interfacing with quick and efficient aviation kiosks of various types. In the same way that retrieval of boarding passes at automated kiosks can save time and effort, deployment of ID kiosks as a replacement to at least a portion of the greeter function reduces the lines -- and staffing needs -- at the entrances to checkpoints.

From a cost perspective, at about $130,000 per unit, an ID kiosk is a cost-effective alternative to human resources that might better be deployed to perform other tasks. Such a future kiosk would be a freestanding, data-integrated unit, likely be deployed in groups of up to five units, depending on traffic demands, per checkpoint area. It will be able to perform several security tasks, including validating the identity of a passenger by comparing the passenger?s government-issued photo ID with a digitally captured picture of the passenger's face. It also will verify the ID document presented by the passenger is both authentic and current. Using a link to airline databases, the kiosk also will verify the passenger's boarding card is valid and current.

The ID kiosk also will be able to scan the passenger for presence of explosives using a trace-based finger sampling technique. A quadrupole resonance-based shoe scanner will scan for explosives and other threats in passengers' shoes. Taken together, advent of the technologies leads to elimination of shoe- and jacket-removal requirements at some checkpoints.

The data collected by various sensors in the ID kiosk will then be associated with the passenger's ID number -- taken from the boarding card or other travel document -- for the purpose of optimizing the effectiveness of downstream security checks and passenger flow.

Such a solution can be expected to perform faster, higher quality security identification checks, complementing existing protocols with automated explosives and other threat detection capabilities.

Data Management Prowess
The kiosk document processor, a module within the ID kiosk, will extract data from various ID documents, standard and non-standard travel documents and driver's licenses. It will obtain the passenger's name and other ID information while providing an indication of suspected document forgeries.

The ID kiosk will process the data from the ID document and compare its information with security information databases in order to automatically define the passenger's required security screening level. The kiosk also will identify the country of origin of the ID document and address the passenger in their own language.

At the GE Global Research Center, developing the feature, there are plans for a two-phase program focused on enabling automatic verification of photographic IDs. In the first phase, an initial prototype system will use a commercial, off-the-shelf facial recognition engine to compare an actual image of the traveler and the presented ID's photo.

However, GE officials believe there is considerable room for improvement over generic face recognition approaches. If a face-ID verification engine tuned specifically for the ID kiosk is developed, greater accuracy can be achieved.

Most facial recognition engines are designed for searching large databases as opposed to verification of a given match. Thus, a match score is defined for each comparison, and decisions are made based on a threshold. However, in verification, problems are associated with people trying to impersonate the true owner of the photo ID. This suggests a discriminative approach, which attempts to maximize the margin between true and similar matches.

In phase two, an ID verification engine will be developed specifically for the ID kiosk application. To do this, GE Security has developed the DSFD methodology for connecting multiple sensors, as well as a communication protocol to optimize system communication.

DSFP is a small software plug-in that could become the first industry-wide sensor fusion standard. It defines how systems exchange data, make decisions, and merge decisions and inputs.

The DSFP protocol can help get sensor fusion up and running in the security industry. Its simplicity can save manufacturer research and development costs and shorten the time to market for new sensor combinations. DSFP gets all sensors to speak the same quantitative language and provides the means to integrate intelligence and other non-sensor data into multi-sensor systems.

DSFP quantifies risk by assigning the threat status of a person/passenger or bag a numeric value -- a threat state. Sensors using the DSFP protocol can refine the threat state without the need for an external computer to do top-level information handling. The process is referred to as threat-state propagation as the state of the threat, on a per-item basis, propagates from sensor to sensor while becoming more accurate with every step.

For example, as a passenger and their bags pass through multiple systems or sensors, the sensors collect and share information. The threat states for the passenger and bags move from sensor to sensor, being increasingly refined and more accurate with additional real-time information.

The resulting threat states then more accurately indicate risk than standalone systems. Such a system can reduce false alarm rates, as well as speed up the security process for the entire system.

How ID Systems Operate
The ID kiosk will interact with passengers through a driven-user interface. Through its graphical user interface, software will guide passengers through a series of actions, such as touch the trace explosives detector sensor button, place identification on the KDP or scan boarding passes.

The ID kiosk will be networked to a database application running on a remote computer. Passenger data, including items such as a bar-code identifier, explosive trace detection results, photograph, facial recognition match and documentation verification, will all be readily available for query. Using the passenger's boarding pass barcode to make a query, data can be retrieved, or when new data is available, it can be added to the passenger record. Such an ID management program allows a dynamic record to follow a passenger navigating the security process, allowing the process to adapt to threat probability.

In the sensor-fused airport environment of tomorrow, no longer will greeters be assigned a task virtually impossible for humans to successfully undertake, especially hour after hour. An automated system will not only detect and determine activities the human eye cannot detect, but it will additively sum together any and all discrepancies noted during the screening process. From bomb detection to fraudulent entry -- or exit -- automation of the ID management process will increase both safety and passenger convenience.

This article originally appeared in the January 2007 issue of the Security Products Identity Management supplement pg. 26D-26E.


Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3