public-private partnerships

Card Overload

Government directives can help private sector determine which access control cards best fit their needs

Government directives were designed to help enhance security, increase government efficiency, reduce identity fraud and protect personal privacy by establishing a government-wide standard for secure and reliable forms of identification issued by the federal government to its personnel.

You can use these directives to help those in the private sector to be better informed. With computer hackers stealing millions of electronic records every year, many Fortune 1,000 companies are trying to secure their networks through the use of public key infrastructure. As such, many are turning to HSPD-12.

The Federal Government

As a result of Sept. 11, 2001, in August 2004, President George W. Bush issued HSPD-12, which established the policy for common identification standards for all federal employees and contractors who require routine or regular scheduled access to federal facilities.

The directive developed a common identification standard that ensures people are who they say they are, so government facilities and sensitive information stored in networks and within physical facilities remain protected. To achieve a higher protection level, HSPD-12 requires agencies to issue smart-card technologies to all federal employees and contractors for access to buildings, facilities and computer networks. In addition, HSPD-12 directed the development of federal information processing standards to define systems to achieve a common identification credential. In accordance with HSPD-12, the FIPS 201 standard, the personal identity verification of federal employees and contractors, establishes the technical requirements for the identity credential that is issued based on sound criteria for verifying a person's identity. It ensures the credential is strongly resistant to identity fraud, tampering, counterfeiting and terrorist exploitation and can be rapidly authenticated electronically.

Following this presidential directive, standards have arisen to drive major changes in card technologies. For example, FIPS 201 defines the PIV and platform interoperability. FIPS 140 defines the requirements and standards for cryptographic modules, which include both hardware and software components for security. Finally, NIST 800-116 defines the use of PIV cards within a physical access control system. From these standards have come other programs, like TWIC, CAC (Department of Defense), FRAC (first responders) and PIV-I (interoperable) for government subcontractors and PIV-C (PIV compatible) for private companies that want to use the card as an employee badge.

A new type of card was developed to support both contactless physical access and contact logical access, commonly referred to as a dual interface card. Both interfaces, contact and contactless, are connected to the same processor chip, providing common security and cost efficiency. For physical access control, the cards can support MIFARE or DESFire emulation and, with the addition of a Prox inlay, also can support legacy proximity technologies.

While MIFARE and DESFire are not used within a PIV deployment, the open and interoperable architecture of the technologies aligns perfectly with the non-proprietary strategy behind HSPD-12.

Public key infrastructure is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain and revoke public key certificates As a result of HSPD-12, the government has launched major PIV programs to comply with this directive, including TWIC, Department of Veterans Affairs Personal Identity Verification system and GSA USAccess. It also includes two forms of ID: physical access and computer access using the PIN within the card.

The General Services Administration's Office of Governmentwide Policy has been appointed as the Federal PKI Management Authority to manage the design and development, and implement and operate the Production FPKIA.

Homeland Security-trusted Traveler Program

The purpose of the card is to verify your identity by matching the information stored in the card with the information you provided during your enrollment process.

The National Institute of Standards and Technology has issued specific guidance on the implementation and application of physical access control with PIV cards. This guidance is known as SP800-116 and requires the specific use of the strong authentication and other features of the PIV credential for every access control system. The requirements of SP800-116 represent the use of advanced credential and individual identity authentication that is outside of the scope of most existing access control readers and require PKI processing that transcends the operational capabilities of most PACS infrastructure.

A few companies have developed products specifically to meet and exceed the requirements of FIPS201 and SP800-116 and now offer a complete solution in compliance with these standards and directives.

Featured

  • Data Driven, Proactive Response

    As cities face rising demands for smarter policing and faster emergency response, Real Time Crime Centers (RTCCs) are emerging as essential hubs for data-driven public safety. In this interview, two experts with deep field experience — Ross Bourgeois of New Orleans and Dean Cunningham of Axis Communications — draw on decades of operational, leadership and technology expertise to share how RTCCs are transforming public safety through innovation, interagency collaboration and a relentless focus on community impact. Read Now

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • Right-Wing Activist Charlie Kirk Dies After Utah Valley University Shooting

    Charlie Kirk, a popular conservative activist and founder of Turning Point USA, died Wednesday after being shot during an on-campus event at Utah Valley University in Orem, Utah Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.