{"title":"The Use of ID Reader-Authenticators in Secure Access Control and Credentialing","authors":"T. Kuklinski, B. Monk","doi":"10.1109/THS.2008.4534458","DOIUrl":null,"url":null,"abstract":"Knowing who is entering, and whether they should be granted access, is key information for many types of military, government and commercial facilities. In many situations, access is granted based on an Identification Document (ID) such as a driver's license, passport, visa, or other specialized ID card. Although screeners are trained to detect false IDs, they have the daunting task of trying to do this within a few seconds for large numbers of people and types of documents on a daily basis. Newer cost effective ID Reader-Authenticators can add a high degree of automation and accuracy to the secure access control process. Available in a variety of physical configurations, they can automatically read IDs in full color at high resolution with multiple light sources, extracting image fields such as photos, as well as data fields, whether from text, barcodes, magnetic stripes, or embedded chips. The data extracted can be vetted against external watchlists without compromising privacy. They can process most currently issued IDs whether or not they contain machine readable enhancements. IDs can be authenticated via a wide variety of tests based on detecting embedded security features. Reader-Authenticators are particularly useful in the enrollment process (as part of new government ID initiatives) to avoid issuing IDs based on false breeder documents. Secure access control, whether at a national border, secure installation, lobby of a building, or airport screening area, can be enhanced with the use of today's advanced Reader-Authenticator technology.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"200 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE Conference on Technologies for Homeland Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/THS.2008.4534458","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Knowing who is entering, and whether they should be granted access, is key information for many types of military, government and commercial facilities. In many situations, access is granted based on an Identification Document (ID) such as a driver's license, passport, visa, or other specialized ID card. Although screeners are trained to detect false IDs, they have the daunting task of trying to do this within a few seconds for large numbers of people and types of documents on a daily basis. Newer cost effective ID Reader-Authenticators can add a high degree of automation and accuracy to the secure access control process. Available in a variety of physical configurations, they can automatically read IDs in full color at high resolution with multiple light sources, extracting image fields such as photos, as well as data fields, whether from text, barcodes, magnetic stripes, or embedded chips. The data extracted can be vetted against external watchlists without compromising privacy. They can process most currently issued IDs whether or not they contain machine readable enhancements. IDs can be authenticated via a wide variety of tests based on detecting embedded security features. Reader-Authenticators are particularly useful in the enrollment process (as part of new government ID initiatives) to avoid issuing IDs based on false breeder documents. Secure access control, whether at a national border, secure installation, lobby of a building, or airport screening area, can be enhanced with the use of today's advanced Reader-Authenticator technology.