solutions Biometrics integration



Similar documents
Moving to Multi-factor Authentication. Kevin Unthank

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

L-1 Fingerprint Reader Solutions. V-Flex 4G

22 nd NISS Conference

Framework for Biometric Enabled Unified Core Banking

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Navigating Endpoint Encryption Technologies

Enrolling with PIV and PIV-I Velocity Enrollment Manager

May For other information please contact:

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

Multi-factor authentication

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

DigitalPersona Pro Enterprise

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

The Convergence of IT Security and Physical Access Control

Bridging the Great Divide. The Convergence of Physical and Logical Security

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

The Convergence of IT Security and Physical Access Control

AXS Biometric Security System

Choosing an SSO Solution Ten Smart Questions

Advanced Authentication

NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

Copyright Telerad Tech RADSpa. HIPAA Compliance

Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12

Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company

Vendor Questionnaire

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

W.A.R.N. Passive Biometric ID Card Solution

Two-Factor Authentication Making Sense of all the Options

Section 12 MUST BE COMPLETED BY: 4/22

Smart Cards and Biometrics in Physical Access Control Systems

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Designing a security policy to protect your automation solution

PoE-Touch Fingerprint and RFID Access Control

Application of Biometric Technology Solutions to Enhance Security

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

HIPAA Security Alert

Extending Identity and Access Management

Security Model in E-government with Biometric based on PKI

BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information

Access at the Rack Level in Your

IDaaS: Managed Credentials for Local & State Emergency Responders

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

AX.S Series Access Control and I.AM Series Identity Access Management

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY 1 BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY INCREASES

SCB Access Single Sign-On PC Secure Logon

SAGEM MA520 READERS FINGER & SMART CARD ENROLLMENT

Expertise for biometric solution

BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE

- BIOMETRIC. Tel : Website : marketing@litestar.com.sg

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

ImageWare Systems, Inc.

Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems

e-governance Password Management Guidelines Draft 0.1

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Smart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

Electronic Access Control Solutions

Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Xerox DocuShare Security Features. Security White Paper

m Commerce Working Group

Cisco Physical Access Manager

Access Control Using Smartcard And Passcode

Velocity 3.1 KB640 Release Notes

A C C E S S C O N T R O L S Y S T E M

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Service Whitepaper

User s Manual for Fingerprint Door Control Software

Logical & Physical Security

HAI Access Control. The HAI Access Control Card Reader can be used for:

SHENZHEN PROYU BIOMETRIC T/A & A/C TERMINAL QUOTATION

Hitachi Virtual Storage Platform Family: Security Overview. By Hitachi Data Systems

Deliver Secure, User-Friendly Access to Mobile Business Apps

FDA Releases Final Cybersecurity Guidance for Medical Devices

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Samsung Security Solutions

Practice test Domain-2 Security (Brought to you by RMRoberts.com)

Self-Service, Anywhere

Transcription:

Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability and Accountability Act (HIPAA) require organisations to monitor and control access to private information. Because biometric solutions rely upon non-transferable data, they are ideally suited for access control applications. Government mandates such as the U.S. HSPD-12 mandate the use of multi-factor authentications for government employees and contractors. Solution in brief There are many types of biometric technologies including hand geometry, iris recognition, vascular pattern recognition, voice recognition, and the most common, fingerprint recognition. As each of these biometric factors is considered unique to a single individual, biometric solutions can be used either independently for single-factor authentication or in combination with an access control card and/or password for multi-factor authentication. There are two types of biometric authentication techniques: verification and identification. Identification is typically used in law enforcement agencies for background checks. It works by comparing a biometric template to templates in databases. Verification is more widely used in the commercial space and is also known as 1:1 authentication. This type of identity verification requires multi-factor authentication. Here is one example: Main products & systems: - Security systems Bioscrypt biometric readers A person is granted access permission to a secure area and enrolled in a biometric database. This is accomplished using whichever biometric authentication technology is to be employed. During this initial enrolment, a template is created based on specific unique identification factors that have been collected. This template is encrypted and stored on an access card. As the enrolled person accesses doors requiring biometric authentication, an access card reader establishes the identity of the individual attempting access. The biometric element of the access reader then compares the presented biometric (hand, eye, finger, etc.) with the stored template and if a match can be made, access is granted at that door. Today, in the physical security space, the majority of biometric installations use smart cards with templates stored on the card. These are integrated with the access control system. Biometric readers in these installations use the verification technique. In an integrated system, once the reader detects a match, it sends the access card numbers to the access controller. The access control system looks up

an access list to search for the card number presented. If the card has access to the door, the access control system unlocks the door. Otherwise, the door will remain locked. Value proposition Biometric attributes are unique. They can't be stolen, misplaced, forgotten or copied. This makes biometric authentication applications more secure and convenient than other authentication methods. Biometric authentication provides the most secure business environment possible because it is unique to the individual and tamperproof. The integration of biometric devices with Schneider Electric's security management solutions eliminates the need for separate biometric management software. All administrative functions and template management are handled by a single user interface. This integration reduces operating costs by decreasing the time required for operator training and reducing the number of administrative staff required to operate the system. The integrated security management platform also streamlines the credential vetting process, thus simplifies security operations. Differentiation factors An open interface between the access controller and any biometric reader supports a Wiegand format output. Tight integration with selected biometric manufacturers provides a single user interface for administration, credential provisioning and access privilege assignment.

Architecture

Powered by TCPDF (www.tcpdf.org) solutions Main characteristics Organizations in regulated industries with the necessity to protect confidential information have been early adopters of biometric technologies. Biometric technologies are seen commonly in healthcare facilities where sensitive information is stored, enterprise data centres, and high security facilities such as airports, ports and nuclear facilities. Biometric authentication is required for access control in many transportation segments, including trucking and freight transport. Biometric readers are mainly network based, supporting the standard Ethernet network. However, they also support many serial communication protocols to support installation in the retrofit market where an existing serial network is already in place. Biometric readers can also operate independently, in a stand-alone environment, without any network connectivity or communication with a central management system. In the stand-alone mode, the reader is using the biometric template stored on a smart card to authenticate with the template from the scanner. In a centrally managed system, the reader uses either the template stored on the smart card or a template that has been downloaded to the reader from the management server. Centrally managed network modes also allow added functionalities, such as reader administration, custom messaging and maintenance. Biometric templates are captured during the enrolment process. Biometric enrolment can be performed by using either the reader's administration application. Or enrolment can be performed via the access control management system when the two systems are integrated. Access control biometric integration is the preferred method, as it provides a single repository for card holder information and a single user interface. Biometric readers are connected to the standard access control reader inputs. Card numbers are transmitted to the access controller in Wiegand format using this connection. The normal sequence of operation is as follows: i. A card holder presents the access card to a biometric reader ii. The biometric reader accesses the template stored in the access card iii. The biometric reader captures the biometric by scanning the user iv. The readers compares the template to the scan v. If the templates match, the reader will transmit a valid attempt signal for that access card to the system controller. If the template and scan do not match, the reader will transmit an invalid attempt message to the system controller. vi. The Access system will validate the user's access privileges and if valid, send an unlock command to the door. In any case where the either the template does not match the scan, or the user does not have permission to access the secured space the door will remain locked and a denied access event will be logged in the access control system database.