Sagem Morpho Introduces TWIC-Compliant Smart Card Access Device With Biometrics

Sagem Morpho Inc. recently introduced the MorphoAccess 521 TWIC compliant biometric reader, the first smart card access device to meet Transportation Security Administration implementation requirements for the Transportation Worker Identification Credential program.

The MA521 TWIC is designed to read encrypted biometric data, such as a digital fingerprint, perform the match to the card holder and perform an active card authentication across a contactless interface.

SMI -- a developer of biometric solutions including fingerprint, iris and facial recognition -- has initiated the process of submitting the MA521 TWIC compliant device and technical documentation to TSA for an Initial Capability Evaluation (ICE). TSA will formally begin the TWIC biometric reader evaluations on July 21 with completion expected by January 2009.

“Once the MA521 TWIC is fully certified and deployed, it will serve on the frontline of security at U.S. maritime ports from coast to coast,” said Consuelo Bangs, senior program manager at SMI. “This reader will ensure that port or vessel access is provided only to workers with authentic TWIC smart cards containing their own unique biometric identification information.”

Mandated by the Maritime Transportation Security Act, the TWIC program is jointly administered by TSA and the U.S. Coast Guard. The goal of the program is to issue biometric credentials in the form of tamper-resistant smart cards to the nearly one million longshoremen, sailors, truck drivers and other laborers who need access to secure areas in U.S. port facilities and vessels.

TWIC cards and readers must meet Federal Information Processing Standard 201 (FIPS 201), which requires nationwide interoperability to guarantee that biometric identification data can be recognized and verified at any maritime port.

TSA has already begun issuing TWIC cards. Each contains a Card Holder Unique Identifier (CHUID), personal information (name, address, employer, etc.) and a Federal Agency Smart Credential Number (FASC-N). Encrypted into the card is a unique digital biometric identifier. This information can only be unlocked, or decrypted, with a privacy key uniquely associated with each individual card.

To gain access to a secure port facility, the worker will hold his or her TWIC card up to the contactless interface on the MA521 TWIC. As security levels increase the device can be configured to augment authentication requirements. At the lowest security level the MA521 TWIC will first read the CHUID to verify that the card is authentic, unaltered and active. At a higher level of security after the card has been authenticated, the MA521 TWIC passes the FASC-N to a secure server where the privacy key for that cardholder is retrieved and loaded onto the biometric reader. The MA521 TWIC then uses the privacy key to unlock the biometric information stored on the card and proceed with live verification of the cardholder.

At the highest level of security, in addition to the biometric authentication, the reader performs a challenge/response dialogue between the MA521 TWIC and the TWIC card presented to perform an active card to reader authentication. In unattended situations the MA521 TWIC is capable of implementing a technology called liveness detection to identify the presentation of a fake finger. At the highest level of security the entire procedure takes less than two seconds. At the lowest level of security the process takes less than a second.

“The MA521 TWIC is the only TWIC-compliant biometric reader that can validate the card’s authenticity and verify the cardholder’s identity using decryption, across a contactless interface,” said Bangs, explaining that a no-contact interface was required for the TWIC program due to harsh port environments where damp weather can interfere with a traditional magnetic contact strip reader.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.