Sagem Morpho Introduces TWIC-Compliant Smart Card Access Device With Biometrics

Sagem Morpho Inc. recently introduced the MorphoAccess 521 TWIC compliant biometric reader, the first smart card access device to meet Transportation Security Administration implementation requirements for the Transportation Worker Identification Credential program.

The MA521 TWIC is designed to read encrypted biometric data, such as a digital fingerprint, perform the match to the card holder and perform an active card authentication across a contactless interface.

SMI -- a developer of biometric solutions including fingerprint, iris and facial recognition -- has initiated the process of submitting the MA521 TWIC compliant device and technical documentation to TSA for an Initial Capability Evaluation (ICE). TSA will formally begin the TWIC biometric reader evaluations on July 21 with completion expected by January 2009.

“Once the MA521 TWIC is fully certified and deployed, it will serve on the frontline of security at U.S. maritime ports from coast to coast,” said Consuelo Bangs, senior program manager at SMI. “This reader will ensure that port or vessel access is provided only to workers with authentic TWIC smart cards containing their own unique biometric identification information.”

Mandated by the Maritime Transportation Security Act, the TWIC program is jointly administered by TSA and the U.S. Coast Guard. The goal of the program is to issue biometric credentials in the form of tamper-resistant smart cards to the nearly one million longshoremen, sailors, truck drivers and other laborers who need access to secure areas in U.S. port facilities and vessels.

TWIC cards and readers must meet Federal Information Processing Standard 201 (FIPS 201), which requires nationwide interoperability to guarantee that biometric identification data can be recognized and verified at any maritime port.

TSA has already begun issuing TWIC cards. Each contains a Card Holder Unique Identifier (CHUID), personal information (name, address, employer, etc.) and a Federal Agency Smart Credential Number (FASC-N). Encrypted into the card is a unique digital biometric identifier. This information can only be unlocked, or decrypted, with a privacy key uniquely associated with each individual card.

To gain access to a secure port facility, the worker will hold his or her TWIC card up to the contactless interface on the MA521 TWIC. As security levels increase the device can be configured to augment authentication requirements. At the lowest security level the MA521 TWIC will first read the CHUID to verify that the card is authentic, unaltered and active. At a higher level of security after the card has been authenticated, the MA521 TWIC passes the FASC-N to a secure server where the privacy key for that cardholder is retrieved and loaded onto the biometric reader. The MA521 TWIC then uses the privacy key to unlock the biometric information stored on the card and proceed with live verification of the cardholder.

At the highest level of security, in addition to the biometric authentication, the reader performs a challenge/response dialogue between the MA521 TWIC and the TWIC card presented to perform an active card to reader authentication. In unattended situations the MA521 TWIC is capable of implementing a technology called liveness detection to identify the presentation of a fake finger. At the highest level of security the entire procedure takes less than two seconds. At the lowest level of security the process takes less than a second.

“The MA521 TWIC is the only TWIC-compliant biometric reader that can validate the card’s authenticity and verify the cardholder’s identity using decryption, across a contactless interface,” said Bangs, explaining that a no-contact interface was required for the TWIC program due to harsh port environments where damp weather can interfere with a traditional magnetic contact strip reader.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3