Hyin Technology Co.,Ltd

Feedback

Expecting your recommendation for us to supply you better service

Biometrics and RFID combined for access control

2011/11/29

 

     The US-based transportation services company TransCore has launched a secure access control system that combines RFID and biometrics to positively identify both vehicles and drivers from the vehicle lane as they attempt to enter a facility.

     The system works wirelessly, and includes a keychain-attachable fingerprint biometric device that operates from within the vehicle. The system was designed for use at military bases, nuclear and chemical plants, and other facilities that require multiple layers of security and control while still providing authorised drivers with quickly verified access. 116.30.151.81 This article is copyright 2005 UsingRFID.com.

     At the heart of the system is TransCore''s SmartWatch SecurePass software, which is capable of utilising data gathered from vehicle-mounted RFID transponders, biometric devices, proximity cards, badges and other forms of automatic identification.

     For the system''s initial testing with the US military, TransCore combined its own RFID technology with the Privaris BPID Security Device - a wireless, handheld device that uses fingerprints to biometrically authenticate its user prior to releasing sensitive or confidential information. The Privaris BPID Security Device handles all fingerprint sensing, encoding, matching, and template storage itself, meaning that the fingerprint template never leaves the device. In other words, no centralised biometric database is needed. Credentials stored on the device are only released upon a successful biometric authentication of the registered user. The device supports two-way encrypted communications and employs combinations of low frequency RFID (125 KHz), high frequency RFID (13.56 MHz, ISO 14443/15693), Bluetooth, IEEE 802.15.4, and custom RF channels.

     In automated "assist" mode, the SecurePass system identifies pre-screened and registered vehicles and users, and grants facility access without input from a guard, although guards may monitor all activity from a computer screen and incorporate override gates, alarms, and lane controls if necessary. In this mode, the system continuously monitors arrivals, grantsor denies access, opens and closes gates, and provides real-time activity data and a number of automatically generated reports.

     But for situations needing tighter security, "control" mode provides a Windows-based user interface to help guards perform access inspections. When a registered user and vehicle approach, the system reads the vehicle''s RFID tag and recognises the registered user after their successful biometric authentication. The system then automatically displays pre-entered matching data on the guard''s computer monitor, such as vehicle information, the user''s photograph and status such as military rank, and any other relevant information. The guard uses this information to perform a visual verification of the car and driver before granting or denying access.

     One key benefit is that higher-risk, non-registered drivers and vehicles are automatically isolated from pre-authorised users. Depending on the situation, the system can also be customised with a number of alarms and contingency actions to handle invalid RFID tags, failed biometric authentications, illegal entries, loitering in the lane, gate crashes, and other security risk scenarios.

 

 

 

 

                                                                                                                     Extract From Using RFID