public-private partnerships

Card Overload

Government directives can help private sector determine which access control cards best fit their needs

Government directives were designed to help enhance security, increase government efficiency, reduce identity fraud and protect personal privacy by establishing a government-wide standard for secure and reliable forms of identification issued by the federal government to its personnel.

You can use these directives to help those in the private sector to be better informed. With computer hackers stealing millions of electronic records every year, many Fortune 1,000 companies are trying to secure their networks through the use of public key infrastructure. As such, many are turning to HSPD-12.

The Federal Government

As a result of Sept. 11, 2001, in August 2004, President George W. Bush issued HSPD-12, which established the policy for common identification standards for all federal employees and contractors who require routine or regular scheduled access to federal facilities.

The directive developed a common identification standard that ensures people are who they say they are, so government facilities and sensitive information stored in networks and within physical facilities remain protected. To achieve a higher protection level, HSPD-12 requires agencies to issue smart-card technologies to all federal employees and contractors for access to buildings, facilities and computer networks. In addition, HSPD-12 directed the development of federal information processing standards to define systems to achieve a common identification credential. In accordance with HSPD-12, the FIPS 201 standard, the personal identity verification of federal employees and contractors, establishes the technical requirements for the identity credential that is issued based on sound criteria for verifying a person's identity. It ensures the credential is strongly resistant to identity fraud, tampering, counterfeiting and terrorist exploitation and can be rapidly authenticated electronically.

Following this presidential directive, standards have arisen to drive major changes in card technologies. For example, FIPS 201 defines the PIV and platform interoperability. FIPS 140 defines the requirements and standards for cryptographic modules, which include both hardware and software components for security. Finally, NIST 800-116 defines the use of PIV cards within a physical access control system. From these standards have come other programs, like TWIC, CAC (Department of Defense), FRAC (first responders) and PIV-I (interoperable) for government subcontractors and PIV-C (PIV compatible) for private companies that want to use the card as an employee badge.

A new type of card was developed to support both contactless physical access and contact logical access, commonly referred to as a dual interface card. Both interfaces, contact and contactless, are connected to the same processor chip, providing common security and cost efficiency. For physical access control, the cards can support MIFARE or DESFire emulation and, with the addition of a Prox inlay, also can support legacy proximity technologies.

While MIFARE and DESFire are not used within a PIV deployment, the open and interoperable architecture of the technologies aligns perfectly with the non-proprietary strategy behind HSPD-12.

Public key infrastructure is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain and revoke public key certificates As a result of HSPD-12, the government has launched major PIV programs to comply with this directive, including TWIC, Department of Veterans Affairs Personal Identity Verification system and GSA USAccess. It also includes two forms of ID: physical access and computer access using the PIN within the card.

The General Services Administration's Office of Governmentwide Policy has been appointed as the Federal PKI Management Authority to manage the design and development, and implement and operate the Production FPKIA.

Homeland Security-trusted Traveler Program

The purpose of the card is to verify your identity by matching the information stored in the card with the information you provided during your enrollment process.

The National Institute of Standards and Technology has issued specific guidance on the implementation and application of physical access control with PIV cards. This guidance is known as SP800-116 and requires the specific use of the strong authentication and other features of the PIV credential for every access control system. The requirements of SP800-116 represent the use of advanced credential and individual identity authentication that is outside of the scope of most existing access control readers and require PKI processing that transcends the operational capabilities of most PACS infrastructure.

A few companies have developed products specifically to meet and exceed the requirements of FIPS201 and SP800-116 and now offer a complete solution in compliance with these standards and directives.

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.