public-private partnerships

Card Overload

Government directives can help private sector determine which access control cards best fit their needs

Government directives were designed to help enhance security, increase government efficiency, reduce identity fraud and protect personal privacy by establishing a government-wide standard for secure and reliable forms of identification issued by the federal government to its personnel.

You can use these directives to help those in the private sector to be better informed. With computer hackers stealing millions of electronic records every year, many Fortune 1,000 companies are trying to secure their networks through the use of public key infrastructure. As such, many are turning to HSPD-12.

The Federal Government

As a result of Sept. 11, 2001, in August 2004, President George W. Bush issued HSPD-12, which established the policy for common identification standards for all federal employees and contractors who require routine or regular scheduled access to federal facilities.

The directive developed a common identification standard that ensures people are who they say they are, so government facilities and sensitive information stored in networks and within physical facilities remain protected. To achieve a higher protection level, HSPD-12 requires agencies to issue smart-card technologies to all federal employees and contractors for access to buildings, facilities and computer networks. In addition, HSPD-12 directed the development of federal information processing standards to define systems to achieve a common identification credential. In accordance with HSPD-12, the FIPS 201 standard, the personal identity verification of federal employees and contractors, establishes the technical requirements for the identity credential that is issued based on sound criteria for verifying a person's identity. It ensures the credential is strongly resistant to identity fraud, tampering, counterfeiting and terrorist exploitation and can be rapidly authenticated electronically.

Following this presidential directive, standards have arisen to drive major changes in card technologies. For example, FIPS 201 defines the PIV and platform interoperability. FIPS 140 defines the requirements and standards for cryptographic modules, which include both hardware and software components for security. Finally, NIST 800-116 defines the use of PIV cards within a physical access control system. From these standards have come other programs, like TWIC, CAC (Department of Defense), FRAC (first responders) and PIV-I (interoperable) for government subcontractors and PIV-C (PIV compatible) for private companies that want to use the card as an employee badge.

A new type of card was developed to support both contactless physical access and contact logical access, commonly referred to as a dual interface card. Both interfaces, contact and contactless, are connected to the same processor chip, providing common security and cost efficiency. For physical access control, the cards can support MIFARE or DESFire emulation and, with the addition of a Prox inlay, also can support legacy proximity technologies.

While MIFARE and DESFire are not used within a PIV deployment, the open and interoperable architecture of the technologies aligns perfectly with the non-proprietary strategy behind HSPD-12.

Public key infrastructure is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain and revoke public key certificates As a result of HSPD-12, the government has launched major PIV programs to comply with this directive, including TWIC, Department of Veterans Affairs Personal Identity Verification system and GSA USAccess. It also includes two forms of ID: physical access and computer access using the PIN within the card.

The General Services Administration's Office of Governmentwide Policy has been appointed as the Federal PKI Management Authority to manage the design and development, and implement and operate the Production FPKIA.

Homeland Security-trusted Traveler Program

The purpose of the card is to verify your identity by matching the information stored in the card with the information you provided during your enrollment process.

The National Institute of Standards and Technology has issued specific guidance on the implementation and application of physical access control with PIV cards. This guidance is known as SP800-116 and requires the specific use of the strong authentication and other features of the PIV credential for every access control system. The requirements of SP800-116 represent the use of advanced credential and individual identity authentication that is outside of the scope of most existing access control readers and require PKI processing that transcends the operational capabilities of most PACS infrastructure.

A few companies have developed products specifically to meet and exceed the requirements of FIPS201 and SP800-116 and now offer a complete solution in compliance with these standards and directives.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities