Identity Management Supplement

Fusion Frenzy

Combined sensor technology to help airport security

IN U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

Most often referred to as greeters, they are tasked with identifying passengers by their photo ID or passport, along with a brief check of their boarding card, to verify that each passenger is rightfully attempting to enter a controlled airport area. But these agents are currently not equipped with effective tools to detect forged documents.

Such a solution can be expected to perform faster, higher quality security identification checks, complementing existing protocols with automated explosives and other threat detection capabilities.

Detection systems fusion protocol (DSFP) -- an emerging methodology for the connection of multiple security sensors and intelligent communication between them and other systems -- is poised to change that.

From an operational standpoint, more and more passengers today are growing accustomed to interfacing with quick and efficient aviation kiosks of various types. In the same way that retrieval of boarding passes at automated kiosks can save time and effort, deployment of ID kiosks as a replacement to at least a portion of the greeter function reduces the lines -- and staffing needs -- at the entrances to checkpoints.

From a cost perspective, at about $130,000 per unit, an ID kiosk is a cost-effective alternative to human resources that might better be deployed to perform other tasks. Such a future kiosk would be a freestanding, data-integrated unit, likely be deployed in groups of up to five units, depending on traffic demands, per checkpoint area. It will be able to perform several security tasks, including validating the identity of a passenger by comparing the passenger?s government-issued photo ID with a digitally captured picture of the passenger's face. It also will verify the ID document presented by the passenger is both authentic and current. Using a link to airline databases, the kiosk also will verify the passenger's boarding card is valid and current.

The ID kiosk also will be able to scan the passenger for presence of explosives using a trace-based finger sampling technique. A quadrupole resonance-based shoe scanner will scan for explosives and other threats in passengers' shoes. Taken together, advent of the technologies leads to elimination of shoe- and jacket-removal requirements at some checkpoints.

The data collected by various sensors in the ID kiosk will then be associated with the passenger's ID number -- taken from the boarding card or other travel document -- for the purpose of optimizing the effectiveness of downstream security checks and passenger flow.

Such a solution can be expected to perform faster, higher quality security identification checks, complementing existing protocols with automated explosives and other threat detection capabilities.

Data Management Prowess
The kiosk document processor, a module within the ID kiosk, will extract data from various ID documents, standard and non-standard travel documents and driver's licenses. It will obtain the passenger's name and other ID information while providing an indication of suspected document forgeries.

The ID kiosk will process the data from the ID document and compare its information with security information databases in order to automatically define the passenger's required security screening level. The kiosk also will identify the country of origin of the ID document and address the passenger in their own language.

At the GE Global Research Center, developing the feature, there are plans for a two-phase program focused on enabling automatic verification of photographic IDs. In the first phase, an initial prototype system will use a commercial, off-the-shelf facial recognition engine to compare an actual image of the traveler and the presented ID's photo.

However, GE officials believe there is considerable room for improvement over generic face recognition approaches. If a face-ID verification engine tuned specifically for the ID kiosk is developed, greater accuracy can be achieved.

Most facial recognition engines are designed for searching large databases as opposed to verification of a given match. Thus, a match score is defined for each comparison, and decisions are made based on a threshold. However, in verification, problems are associated with people trying to impersonate the true owner of the photo ID. This suggests a discriminative approach, which attempts to maximize the margin between true and similar matches.

In phase two, an ID verification engine will be developed specifically for the ID kiosk application. To do this, GE Security has developed the DSFD methodology for connecting multiple sensors, as well as a communication protocol to optimize system communication.

DSFP is a small software plug-in that could become the first industry-wide sensor fusion standard. It defines how systems exchange data, make decisions, and merge decisions and inputs.

The DSFP protocol can help get sensor fusion up and running in the security industry. Its simplicity can save manufacturer research and development costs and shorten the time to market for new sensor combinations. DSFP gets all sensors to speak the same quantitative language and provides the means to integrate intelligence and other non-sensor data into multi-sensor systems.

DSFP quantifies risk by assigning the threat status of a person/passenger or bag a numeric value -- a threat state. Sensors using the DSFP protocol can refine the threat state without the need for an external computer to do top-level information handling. The process is referred to as threat-state propagation as the state of the threat, on a per-item basis, propagates from sensor to sensor while becoming more accurate with every step.

For example, as a passenger and their bags pass through multiple systems or sensors, the sensors collect and share information. The threat states for the passenger and bags move from sensor to sensor, being increasingly refined and more accurate with additional real-time information.

The resulting threat states then more accurately indicate risk than standalone systems. Such a system can reduce false alarm rates, as well as speed up the security process for the entire system.

How ID Systems Operate
The ID kiosk will interact with passengers through a driven-user interface. Through its graphical user interface, software will guide passengers through a series of actions, such as touch the trace explosives detector sensor button, place identification on the KDP or scan boarding passes.

The ID kiosk will be networked to a database application running on a remote computer. Passenger data, including items such as a bar-code identifier, explosive trace detection results, photograph, facial recognition match and documentation verification, will all be readily available for query. Using the passenger's boarding pass barcode to make a query, data can be retrieved, or when new data is available, it can be added to the passenger record. Such an ID management program allows a dynamic record to follow a passenger navigating the security process, allowing the process to adapt to threat probability.

In the sensor-fused airport environment of tomorrow, no longer will greeters be assigned a task virtually impossible for humans to successfully undertake, especially hour after hour. An automated system will not only detect and determine activities the human eye cannot detect, but it will additively sum together any and all discrepancies noted during the screening process. From bomb detection to fraudulent entry -- or exit -- automation of the ID management process will increase both safety and passenger convenience.

This article originally appeared in the January 2007 issue of the Security Products Identity Management supplement pg. 26D-26E.


Featured

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3