Biometrics on the Move

Biometrics on the Move

Smart cards and smartphones make play for access control

Biometrics on the MoveMultiple factors of authentication, including biometrics, can increase the probability that a person presenting a card to a reader is the same person who was initially issued the card. Biometrics authenticates identity by measuring and verifying an individual’s unique physical characteristics, such as fingerprints, hand and face geometry, or patterns found in the eye’s iris. Since these identifiers can’t be borrowed or stolen, biometrics provide identity authentication with a strong degree of confidence.

Until recently, biometric templates, such as those for iris recognition, were carried on a plastic credential and presented for authentication by holding the card in front of an iris recognition camera. Now, these same templates can be loaded onto an NFCenabled smartphone along with other digital ID credentials for physical and logical access control.

Going Mobile

Several trends are driving the adoption of physical and logical access control on smartphones and other mobile devices. The first is the inclusion of NFC technology on smartphones, which provides an industry-standard, short-range wireless link for exchanging access-control data across a several centimeter distance so users can “present” credentials on phones to a reader. As the NFC mobile-payment model grows in popularity, it drives further demand for NFC phones which also can be used in physical access control applications. Smartphones that do not feature NFC technology can be securely upgraded to this capability by using an NFC-enabled add-on device such as a microSD card.

Additionally, there is now a new type of identity representation that operates within a trusted boundary and uses the NFCenabled smartphone’s secure element or SIM—usually an embedded tamper-proof integrated circuit, or a plug-in module version. This setup ensures that all transactions between NFC-enabled smartphones, SIM cards and other secure media devices also can be trusted inside the access-control managed network.

Within this trusted boundary, organizations can provide mobile access-control credentials in either of two secure and convenient ways: Connecting the mobile device to the network via a USB or Wi-Fi-enabled link and use an Internet portal, similar to how traditional plastic credentials are provisioned, or issue digital credentials over-the-air via a mobile network operator, in much the same way that today’s smartphone users download apps and songs. To issue digital credentials, the NFC-enabled smartphone communicates with a Trusted Service Manager (TSM), which interfaces either directly to the mobile network operator (MNO) or to its TSM, delivering a key to the SIM card.

The mobile access model offers a number of benefits. It eliminates credential copying, and makes it easier to issue temporary credentials as needed, cancel credentials if a device is lost or stolen, and monitor and modify security parameters when required. The mobile model is ideal for converged physical and logical access, enabling smartphones to be used for multiple applications including cashless vending; opening residential locks; accessing an on-line physical access-control reader; entering a building protected by an NFC-enabled electromechanical lock; logging on to a PC; generating OTP software tokens to log onto network devices; and implementing biometric authentication.

How Biometrics Work

Biometrics verify that a card holder has been bound to his or her card, using something that can only be possessed by the person to whom the card was issued. Biometric data is unique to each person and cannot be forgotten, lost or stolen. Because of this, biometric technology offers enhanced security when compared with conventional identification methods. It does not rely on passwords, pin codes or photographic ID, and is too complex to forge. Biometrics are generally used as part of a verification system, which checks a biometric that has been presented by an individual against the biometric in a database linked to that person’s file—a one-to-one system, or an identification system—referred to as one-to-many systems because they are used to identify an unknown person or biometric.

Biometrics has long been used by the government, and is a key element of the latest federal identity standards. For instance, the Department of Defense (DoD) has incorporated biometrics into the common access card (CAC) that controls entry to DoD facilities and information systems. Biometrics is an integral part of the latest identity credentials for federal agency employees and contractors. In 2005, the National Institute of Standards and Technology (NIST) released Federal Information Processing Standards Publication 201 (FIPS 201), which defined the identity vetting, enrollment and issuance requirements for a common, highly-secure identity credential called the Personal Identity Verification (PIV) card that leverages both smart card and biometric technology. In 2006, FIPS 201-1 further specified that a facial image, as well as fingerprint biometrics, be included on PIV cards.

On NFC Smartphones

The same benefits associated with storing biometric templates on physical smart cards also apply to the mobile accesscontrol model. Next-generation mobile access platforms enable users to implement biometrics templates similar to traditional physical credential implementation while offering the added benefits of being able to carry the credentials in their smartphones. For instance, a smartphone can carry credentials that securely store biometric templates, such as those for iris recognition. To present these credentials for authentication, the user simply holds the smartphone in front of an iris recognition camera. A variety of biometric templates can be securely stored in these digital credentials.

The smartphone offers a portable database for template storage well suited for installations that span a large number of sites. Storing the template on a digital NFC smartphone credential also simplifies system start-up, and is ideal for supporting unlimited user populations. It reduces installation costs by eliminating the redundant wiring requirements for traditional biometric template management on plastic cards. And, because an access-control system can continuously read the biometrics data carried inside a smartphone, this model enables pre-authentication before someone even arrives at a door, speeding and simplifying each access transaction.

Another advantage of mobile access control is simplification in deployment and management of biometric security and other multi-factor authentication applications. When a situation arises that requires a higher level of security, organizations can dynamically invoke two-factor authentication. To do this, an application can be pushed to the phone that, for instance, requires the user to enter a 4-digit pin, perform a gesture swipe on the phone or present biometric data within the phone to a reader before it sends the message to open the door. With this approach, multifactor authentication becomes a contextual, real-time, managed service.

Latest Developments

HID Global is partnering with a number of leaders in the biometric space to deliver HID-enabled credential solutions that support biometrics, enabling users to securely store a wide variety of biometric templates. An alternative to storing the biometric template on the card is to store them in the reader, on servers, and/or in individual panels. This would be necessary for users of proximity or magnetic stripe cards that are unable to store the template.

The next step is to deploy biometrics on NFC-enabled smartphones, as well. In March 2012, Iris ID Systems Inc. announced interoperability between its IrisAccess platform and NFC-enabled BlackBerry smartphones equipped with HID Global’s iCLASS digital credentials. This means that BlackBerry Bold 9900/9930 smartphones activated with HID Global’s iCLASS digital credentials are interoperable with the installed base of iCLASS readers that are embedded in the Iris iCAM 7000 series for applications ranging from physical access systems in buildings, to systems that track time and attendance, to other identity-dependent solutions. Using an NFC-enabled Black- Berry smartphone, the iris templates of a user are securely stored on an iCLASS digital credential on the phone. This credential can then be presented for authentication by simply holding the NFC-enabled BlackBerry smartphone in front of an iCAM7000 series iris camera, in the same way that users present physical iCLASS smart cards to these readers.

Biometrics continue to be an important element in access-control systems that use multi-factor authentication for the highest levels of security. The latest solutions can be deployed on a combination of traditional plastic ID cards or NFC-enabled smartphones, for a variety of commercial and government applications. The mobile access-control model using smartphones is particularly compelling, and is enabled by NFC technology and a new access-control data structure that operates in a trusted boundary to significantly improve overall system security and user convenience. This offers an ideal platform for converged physical and logical access that includes biometric technology for identity authentication.

This article originally appeared in the May 2013 issue of Security Today.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.