Identity Management Supplement

Fusion Frenzy

Combined sensor technology to help airport security

IN U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

Most often referred to as greeters, they are tasked with identifying passengers by their photo ID or passport, along with a brief check of their boarding card, to verify that each passenger is rightfully attempting to enter a controlled airport area. But these agents are currently not equipped with effective tools to detect forged documents.

Such a solution can be expected to perform faster, higher quality security identification checks, complementing existing protocols with automated explosives and other threat detection capabilities.

Detection systems fusion protocol (DSFP) -- an emerging methodology for the connection of multiple security sensors and intelligent communication between them and other systems -- is poised to change that.

From an operational standpoint, more and more passengers today are growing accustomed to interfacing with quick and efficient aviation kiosks of various types. In the same way that retrieval of boarding passes at automated kiosks can save time and effort, deployment of ID kiosks as a replacement to at least a portion of the greeter function reduces the lines -- and staffing needs -- at the entrances to checkpoints.

From a cost perspective, at about $130,000 per unit, an ID kiosk is a cost-effective alternative to human resources that might better be deployed to perform other tasks. Such a future kiosk would be a freestanding, data-integrated unit, likely be deployed in groups of up to five units, depending on traffic demands, per checkpoint area. It will be able to perform several security tasks, including validating the identity of a passenger by comparing the passenger?s government-issued photo ID with a digitally captured picture of the passenger's face. It also will verify the ID document presented by the passenger is both authentic and current. Using a link to airline databases, the kiosk also will verify the passenger's boarding card is valid and current.

The ID kiosk also will be able to scan the passenger for presence of explosives using a trace-based finger sampling technique. A quadrupole resonance-based shoe scanner will scan for explosives and other threats in passengers' shoes. Taken together, advent of the technologies leads to elimination of shoe- and jacket-removal requirements at some checkpoints.

The data collected by various sensors in the ID kiosk will then be associated with the passenger's ID number -- taken from the boarding card or other travel document -- for the purpose of optimizing the effectiveness of downstream security checks and passenger flow.

Such a solution can be expected to perform faster, higher quality security identification checks, complementing existing protocols with automated explosives and other threat detection capabilities.

Data Management Prowess
The kiosk document processor, a module within the ID kiosk, will extract data from various ID documents, standard and non-standard travel documents and driver's licenses. It will obtain the passenger's name and other ID information while providing an indication of suspected document forgeries.

The ID kiosk will process the data from the ID document and compare its information with security information databases in order to automatically define the passenger's required security screening level. The kiosk also will identify the country of origin of the ID document and address the passenger in their own language.

At the GE Global Research Center, developing the feature, there are plans for a two-phase program focused on enabling automatic verification of photographic IDs. In the first phase, an initial prototype system will use a commercial, off-the-shelf facial recognition engine to compare an actual image of the traveler and the presented ID's photo.

However, GE officials believe there is considerable room for improvement over generic face recognition approaches. If a face-ID verification engine tuned specifically for the ID kiosk is developed, greater accuracy can be achieved.

Most facial recognition engines are designed for searching large databases as opposed to verification of a given match. Thus, a match score is defined for each comparison, and decisions are made based on a threshold. However, in verification, problems are associated with people trying to impersonate the true owner of the photo ID. This suggests a discriminative approach, which attempts to maximize the margin between true and similar matches.

In phase two, an ID verification engine will be developed specifically for the ID kiosk application. To do this, GE Security has developed the DSFD methodology for connecting multiple sensors, as well as a communication protocol to optimize system communication.

DSFP is a small software plug-in that could become the first industry-wide sensor fusion standard. It defines how systems exchange data, make decisions, and merge decisions and inputs.

The DSFP protocol can help get sensor fusion up and running in the security industry. Its simplicity can save manufacturer research and development costs and shorten the time to market for new sensor combinations. DSFP gets all sensors to speak the same quantitative language and provides the means to integrate intelligence and other non-sensor data into multi-sensor systems.

DSFP quantifies risk by assigning the threat status of a person/passenger or bag a numeric value -- a threat state. Sensors using the DSFP protocol can refine the threat state without the need for an external computer to do top-level information handling. The process is referred to as threat-state propagation as the state of the threat, on a per-item basis, propagates from sensor to sensor while becoming more accurate with every step.

For example, as a passenger and their bags pass through multiple systems or sensors, the sensors collect and share information. The threat states for the passenger and bags move from sensor to sensor, being increasingly refined and more accurate with additional real-time information.

The resulting threat states then more accurately indicate risk than standalone systems. Such a system can reduce false alarm rates, as well as speed up the security process for the entire system.

How ID Systems Operate
The ID kiosk will interact with passengers through a driven-user interface. Through its graphical user interface, software will guide passengers through a series of actions, such as touch the trace explosives detector sensor button, place identification on the KDP or scan boarding passes.

The ID kiosk will be networked to a database application running on a remote computer. Passenger data, including items such as a bar-code identifier, explosive trace detection results, photograph, facial recognition match and documentation verification, will all be readily available for query. Using the passenger's boarding pass barcode to make a query, data can be retrieved, or when new data is available, it can be added to the passenger record. Such an ID management program allows a dynamic record to follow a passenger navigating the security process, allowing the process to adapt to threat probability.

In the sensor-fused airport environment of tomorrow, no longer will greeters be assigned a task virtually impossible for humans to successfully undertake, especially hour after hour. An automated system will not only detect and determine activities the human eye cannot detect, but it will additively sum together any and all discrepancies noted during the screening process. From bomb detection to fraudulent entry -- or exit -- automation of the ID management process will increase both safety and passenger convenience.

This article originally appeared in the January 2007 issue of the Security Products Identity Management supplement pg. 26D-26E.


Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities