Biometrics Advance the Second Credential

Feb. 1, 2016
Pairing codes with credentials brought a higher level of authentication was possible, but it was still not airtight. Biometrics ushered in the era of authentication to security and access control.

After securing premises, the next order of business is to control who is allowed to enter. The importance of securing the premises cannot be understated.

Specifying and installing locking hardware is the essential step towards physical security. Multiple choice question: And who installs the locks? A skilled and trained locksmith should do the locks. Controlling who enters is once again the purview of the locksmith.

A key, PIN or card/fob is issued to individuals who are authorized to enter. The term Physical Security is used to describe controlling doors and premises.

Since the industrial/technological revolution the general perception is that, for most situations, an acceptable level of protection is achievable by some kind of unmanned technology.

Keys: Have been around for quite a while, as a matter of fact for so long that many say that locksmithing is actually the world’s oldest profession. In terms of authentication, keys suffer because once a key is issued, it is unknown who will get possession of it. Additionally, most keyways are non-proprietary; meaning the key blanks can be obtained and duplicates created, just about anywhere.

Patented Keyways limit the availability of blanks and prevents keys from being duplicated, but still these keyways do not prevent a key from being shared, lost, stolen or used surreptitiously used to gain access. Even if key control measures are implemented, a key can fall into the wrong hands and problems occur before the lock can be rekeyed.

Interchangeable Cores: Are a big help in this regard, but still the core is changed after an employee is fired and they fail to return their key, or a key is reported to be missing.

These problems fostered the introduction of access control, which began with mechanical pushbutton locks where all users enter the same code, and electronic keypads with a single user code. So it was not even required to lose a key, just whisper the code to your buddy. It was easier, however, to reprogram the memorized code then to rekey the opening and give out another bunch of keys.

Credentials were the next transition. First were the magnetically encoded cards, which were all identically encoded. Then the idea of using the card in conjunction with a code. All these measures were small steps in the right general direction.

Uniquely encoded credentials and individually issued PINs were possible once security began to adapt to digital electronics.

But the original problems associated with codes and credentials persevered ‑ sharing. By pairing codes with credentials, a higher level of authentication was possible, but it was still not airtight.

Biometrics ushered in the era of authentication to security and access control. Biometrics measures a physical characteristic to determine the identity of an individual, and then check to see if that individual measures up (is authorized to gain entry.)

The transition to biometrics has been an evolutionary process. Certain constraints existed, such as cost, reliability, and the limits of the technologies.

Access control systems now use biometrics for specialized  applications (drug storage, computer rooms), but not necessarily for every opening in a premises.

Logical security (controlling access to data) applications have also embraced biometric technologies.

Since many sites have existing access controls, and administrators and end-users have perceptions and preconceptions about technologies, the idea of multiple factor authentication has caught on and is finding more and more use.

So instead of the biometrics totally replacing the code or the credential, the biometric template is used in conjunction with the credential and/or PIN.

It is generally agreed that the more authentication, the safer the premises.

In the old days, a security guard was regarded as the highest and most expensive security. With network tools enabling remote site surveillance and management, we may be again be utilizing human intervention to raise the bar on authentication levels with video surveillance entering the vernacular of access control and site security for a wider range of applications; from a single residential door to an entire campus.

Being well versed in all these solutions is imperative if the locksmiths and professional security providers intend to provide their clients the state of the art in protection.

Barantec Keypads

Barantec offers two specialized keypads for demanding access control applications. Model AT1GKR is a fully ruggedized single-gang or mullion styled keypad/HID Reader for weather/vandal prone areas that require dual authentication.  AT1KR was designed using the AT1G keypad technology while embedding the HID SE reader module to provide a secure door locking solution. Fully designed for high volume in a rugged environment usage, AT1GKR provides users the ability to present a card and a PIN, or card or Pin, as required when configured. This product is ideal for commercial garages, hospitals, equipment, pools, anywhere that requires severe duty service.

Features include:

  • HID 125mHz. Reader
  • Built in Form C Relay
  • Up to 500 User codes
  • Field Programmable: Door open time, anti-tailgating, latch mode
  • Proven Reliability: Tested for 50,000,000 cycles
  • Weatherproof: For use in harshest outdoor conditions
  • Touch Activated: Operable with gloves, tools, etc.
  • Sterilize/wash down proof up to 2450Psi. with most chemicals
  • Vandal Resistant: For use in high traffic and abusive areas

Model AT1G is a fully ruggedized single-gang or mullion styled keypad for weather/vandal prone areas, ideal for applications that typically face high volume, are abused or left unmonitored. Designed with no moving parts and milled from aircraft grade aluminum, AT1G provides a true lifetime of service no matter how much abuse. Field programmable up to 200, 4-6 digit access codes, allows easy configuration and rapid installation.

Features include:

  • Built in Form C Relay
  • Up to 200 User codes
  • Field Programmable: Door open time, anti-tailgating, latch mode
  • Proven Reliability: Tested for 50,000,000 cycles
  • Weatherproof: For use in harshest outdoor conditions
  • Touch Activated: Operable with gloves, tools, etc.
  • Sterilize/wash down proof up to 2450Psi. with most chemicals
  • Easily programmable through the keypad
  • Fail-safe or fail secure electric locking device.
  • Controls garage door or electric gate
  • Triggers CCTV or doorbell or controls an auxiliary device
  • Available in black or natural silver

 Camden Controls ‘Designer Series’ 

Camden Door Controls’ new CV-900 ‘Designer Series’ Wiegand devices include backlit keypads, dual format proximity card readers (HID/AWID) and capacitive biometric fingerprint readers.

“Designer Series’ devices offer an elegant style to meet the demands of architects and interior designers, ‘all metal’ construction and IP65 rating to meet the demands of high traffic applications and 26, 30, 34 and 40 bit plus clock & data outputs to be compatible with virtually any access control system.

 ‘Designer Series’ keypads, prox and fingerprint readers can be surface mounted and are supplied with a flush box mounting plate. They can be ordered in single device or dual-device configurations.

They are available in a range of anodized architectural finishes including white silver, charcoal and metallic red to enhance any décor.

Visual confirmation of operation is provided by an innovative green/yellow/red LED light ring. Other features include selectable keypad PIN code length, AWID/HID format prox readers and tamper alarm output on all devices.

The capacitive biometric reader stores up to 9500 fingerprints. Fingerprint reader management software is supplied free of charge.

More Info: www.camdencontrols.com

Securitech VIZpin Bluetooth Entry Locks

Securitech now offers VIZpin®-enabled Bluetooth standalone access control in the Control Trim Series of electric release door handles. They feature Bluetooth entry functionality from ECKey, allowing authorized smartphones be used as temporary or permanent keys. The Bluetooth locks are ideal for card or key access in various locations for employees, tenants, visitors and vendors. Enabling remote administration without the need for panels or complex IT networks, users can reduce installation costs by as much as 75 percent.

Securitech 2 Cylinder trim provides an old-school solution for multiple authentication. Models are available which require both keys to be present and rotated in order to unlock the door. Other versions of this lever trim allow either cylinder to unlock the door. The lever trim can operate with mortise locks or exit devices.

More Info: www.securitech.com

DETEX Tailgate Detection System

The Detex AT-5200 Series Tailgate Detection System assures that only one individual enters a secured doorway for each authorized card read. Compatible with most card reader technologies, the AT-5200 is easy to retrofit. This cost effective optical security system, which uses unique algorithms and infrared sensor beams to detect tailgating, is perfectly suited for areas requiring tighter security.

Typical applications include employee entrances, computer rooms, bank vaults, dorm entrances, and areas with restricted access. Its subtle design does not distract from interior aesthetics and it mounts easily on standard door frames.

Benefits:

• Adds additional security to a restricted area where unauthorized entry must be controlled

• Integrated door prop alarm for additional security.

Compatible with most access control systems and easily retrofits, providing enhanced security

• High throughput easy entry or exit for authorized personnel

• Encourages employees, students, visitors, etc. to maintain access control procedures

• ADA compliant

• Blends in with architectural styling

Features:

• Local control/annunciator; unauthorized access/egress is annunciated locally and with the access control system

• Key switch for local alarm shunt/override

• Alarm can be reset through an on-board timer

• Mounts on standard width door frame or wall Spacer mounting kit standard, can be used as a raceway for wiring

• Alarm can be reset by a remote contact

• Remote annunciator plates fit in a single gang box

• Status indicator lights (Wait or Proceed)

• Field configurable for card in/card out or card in/free exit operation

• Adjustable access period

• Alarm status relays for remote annunciation

• Tamper Switch

More Info: www.detex.com

HandKey® II 

Allegion's HandKey II product is ideal for applications where consistent and dependable security is of prime importance. The product is easy to maintain, and provides a mix of convenience, security and peace of mind.

Verification in less than one second makes it ideal for high throughput applications. It also eliminates the worry of lost, stolen or unauthorized transfer of ID cards plus the cost of purchasing and maintaining these cards

Hand geometry technology is well accepted by end users, as there are no fingerprints or palm prints taken and the user does not leave behind any trace of their biometric data

HandKeys can be used as standalone systems to protect critical access points that can be easily integrated into virtually every access control system.

Features and benefits:

  • Convenience of multiple credential options
  • such as proximity, magnetic stripe, barcode, HID iCLASS® and MIFARE®
  • Field installable Ethernet module
  • Outdoor enclosure options that make the HandKey II an ideal solution for outdoor usage
  • Field upgradeable and expandable memory options from 512 to 259,072 users for scalable security that grows with your needs
  • Three user-definable outputs to connect to auxiliary devices such as audible or silent alarms, door locks or lighting systems
  • Ability to write the industry’s most compact biometric template on a card instead of in a database results in higher security and unlimited user capacity
  • Specially formulated antimicrobial coating with silver ions on the platen to inhibit the growth of bacteria, mold and mildew to mitigate hygiene concerns. The coating is safe and lasts for the life of the product
  • Blue hand outline on the platen facilitates easy enrollment and reduces error rates during verification.

Each HandKey II is a complete, integrated door controller providing lock operation, request-for-exit and alarm monitoring. Biometric templates and decision-making capability reside locally, ensuring your doors are always secure and will continue to operate properly even if all communication to the main access control system is lost.

Zwipe

Zwipe enables the addition of a biometric authentication factor to virtually any credential-based access control system. A credential with biometrics is referred to as two-factor authentication.

Zwipe offers a fast method to add biometric authentication factor to a credential-based electronic access control system because implementing Zwipe does not involve replacing readers or installing software.

An additional authentication factor such as a PIN can also be added by using a card reader with a keypad.

Each standard credential is replaced with a Zwipe.

Each Zwipe credential is enrolled into the access control system the same way any credential would be. Then each user who is issued a Zwipe enrolls their biometric signatures onto that credential. The enrollment of the biometric signatures is done right on the credential without a separate enrollment station or process. The biometric scan data never leaves the credential and does not reside elsewhere except on the credential. Once programmed and deployed, the credential will only send the credential data when a valid finger has been recognized by that particular credential.

The credential will accept the biometrics for an individual user. If the credential is lost or stolen, it cannot be used by anyone else, as the card will activate only for the enrolled individual. Although the credential is assigned to a single user, the credential can be enrolled into multiple systems, and user privileges can be changed in the EAC software in the same way any conventional credential can.

The Zwipe credential as about the same size as a conventional credential, and it obtains its operating power from the card reader. The card, the onboard scanner and electronics are robust and have a life expectancy of millions of transactions.

Specifications

Power: Self-contained battery

Form : Pocket size credential

Dimensions: ISO 7810 ID-1: 85.6mm x 53.98mm x 5mm (WxLxH) 3.370 in x 2.125 in x 0.2 in (WxLxH)

Weight: 21 grams (0.75 oz)

Operational Frequency: 13.56 MHz

RF Protocol: ISO 14443 A, MIFARE® Classic or DESFire® EV1

Baud Rate: Data transfer up to 848 kbps

Construction: ABS Plastic

Operating Temperature: 0°C to 40°C (32°F to 104°F)

Fingerprint Enrollment: Direct on-card

Sensor: 3D capacitive, tested for 10 million fingerprint scans

Fingerprint Processing: Less than 1 second

Reusability: Single User

Programming: Standard MIFARE® Classic and DESFire® EV1 procedures prior to finger print enrollment. After finger enrollment, card programming requires a finger authentication

Warranty: 3 years

More Info: www.zwipe.com