Infrastructure:Electric,Gas & Water / Education: K-12 / Arenas/Stadiums/Leagues/Entertainment / Education:University / Transportation/Logistics/Supply Chain/Distribution/ Warehousing / Retail/Restaurants/Convenience / Identity Management / Construction, Real Estate, Property Management / Security Leadership and Management / Ports: Sea, Land, & Air / Hospitals & Medical Centers / Banking/Finance/Insurance

Buy a Coke, Copy a Class Lesson, Oh, and Open a Door

September 1, 2010
KEYWORDS PKI / smart card
/ Print / Reprints /
ShareMore
/ Text Size+


Card access control, especially newer multi-functional approaches, can do more than secure a door or provide entry to a parking garage.

Today, a card, sometimes branded to the issuing organization, opens up a world of financial services, computer networks, meals from the cafeteria, buying a bag of chips at a vending machine, purchasing a textbook, and, by the way, providing secured access to a building.

For some enterprise security executives, multi-functional cards not only provide personal identification of employees, visitors, students, healthcare workers and others but also can act as a bridge among distinct systems that may handle magnetic stripe, proximity, barcode and other technologies.
Michael Clemens of IDenticard Systems knows that many enterprises want certain people to wear a photo identification card or badge as a level of security. But there are plenty of uses beyond that, especially with one credential with multiple technologies on it, ranging from elevator control to taking a book out of the library, he says.

Then there is the single sign on approach used in the military, at certain government agencies and in healthcare. Single sign-on (SSO) is a session/user authentication process that permits a user to present a card or enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session. Nowadays, single sign-on can work through a smart card as well as other methods.


One Credential for all Purposes

It’s a solution that mirrors past physical security card access situations in which an employee had to carry a number of cards related to different facilities or applications.

Smart cards are a natural way to expand access control beyond a door.

David Cullen, president, ISI - Intelligence Security International, and who has worked with corporate security management in the past, sees growing use of smart cards in financial services, healthcare, transportation and computer access.

A smart card is a device that includes an embedded integrated circuit chip that can be either a secure microcontroller or equivalent intelligence with internal memory or a memory chip alone, he says. The card connects to a reader with direct physical contact or with a remote contactless radio frequency interface. With an embedded microcontroller, smart cards have the ability to store large amounts of data, carry out their own on-card functions (e.g., encryption and mutual authentication) and interact intelligently with a smart card reader. Smart card technology can be in plastic cards, fobs, subscriber identification modules used in GSM mobile phones, and USB-based tokens.

According to the Smart Card Alliance, smart cards are increasingly accepted as a credential for securely controlling physical access. Standards-based smart ID cards can be used to easily authenticate a person’s identity, determine the appropriate level of access, and physically admit the cardholder to a facility.

More than one access application can be carried on a single smart ID card, enabling users to access physical and logical resources. Security can change access rights dynamically, depending on perceived threat level, time of day, or other appropriate parameters. Smart card support for multiple applications allows organizations to expand card use to provide a compelling business case for the enterprise. 

Smart cards not only secure access to physical or logical resources, they can store data about the cardholder, pay a fee or fare if required, certify transactions, and track ID holder activities for audit purposes. Because supporting system components can be networked, shared databases and inter-computer communication can allow separate functional areas in an organization to exchange and coordinate information automatically and instantly distribute accurate information over large geographic areas.
There are two general categories of smart cards: contact and contactless.
A contact smart card must be inserted into a smart card reader with a direct connection to a conductive contact plate on the surface of the card (typically gold plated). Transmission of commands, data and card status takes place over these physical contact points.


Smart Card Advantages

A contactless card requires only close proximity to a reader. Both the reader and the card have antennae, and the two communicate using radio frequencies over this contactless link. Most contactless cards also derive power for the internal chip from this electromagnetic signal. The range is typically one-half to three inches for non-battery-powered cards, ideal for applications such as building entry and payment that require a very fast card interface.

Of course, expansion of applications or the design of an access control system across myriad enterprise departments or locations can be achieved through software, as Mark Hart, director of security and environmental safety for Christus Santa Rosa Health System, has discovered. His operation now relies on Bethesda, Md.-based Brivo access control for improved security at five of its hospital campuses spread throughout South-Central Texas. INET Security and Surveillance is the integrator for this large and on-going project implementation.

Christus Santa Rosa Health System, a faith-based, not-for-profit health system, and a part of Christus Health, is comprised of more than 40 hospitals, inpatient and long-term care facilities as well as dozens of clinics, physician offices and healthcare services in more than 70 cities in Texas, Arkansas, Louisiana, Oklahoma, Utah and Mexico. To date, the solution has been installed in the downtown San Antonio Christus Santa Rosa Hospital – City Centre, Christus Santa Rosa Children’s Hospital, Christus Santa Rosa Hospital – Westover Hills, Christus Santa Rosa Hospital – Medical Center, and Christus Santa Rosa Hospital – New Braunfels. The five hospitals combined have a total of 1,128 beds, nearly 3,900 associates and 2,000 physicians. The system manages approximately 210 doors spread among the five hospital campuses.

Hart, a seasoned professional, had a quality working relationship with Steven Ballard of INET, and called him in for a consultation on upgrading access technology.

The initial installation was at the newest hospital campus, where the system’s servers are located, and then rolled out to other hospital campuses. “We did not want to manage two different access control databases,” Hart says. He was able to move from a successful initial installation to the other targeted facilities “by selling management a plan that enabled us to keep all data and all access management under the one system, operated with a single graphical user interface.”

The on-going installation requires an extraordinary amount of coordination with the multiple departments involved and the different security and access needs of each department. It meets the level of control required to manage the multiple needs of all the departments served and to organize the nearly 9,000 users into an impressive 127 groups, all with different privileges in terms of locations, days and time periods of access.


Storing Data on a Card

In addition, Hart and Ballard have been heavily involved in the on-going STRAC (Southwest Texas Regional Advisory Council) Version 2 access control system upgrade. This Version 2 Universal ID Card is a credit card-sized FIPS-201-compliant (PIV-interoperable) smart card. It stores the physician’s personal digital identity and can only be accessed by the physician. The card is useful to physicians who visit many different locations such as hospitals, pharmacies, labs, designated physician parking areas, secure locations in certain buildings and their own offices. Many of these access points require an ID card for access. The STRAC Universal ID card consolidates all of a physician’s separate digital identities onto one card. This card also provides physicians the ability to use a portion of their badge for convenient access at all Christus Santa Rosa Health System facilities. 

Colleges and universities are also at the forefront of squeezing more out of identity management tools. Some firms partner with educational institutions. One source is the Student Advantage card from CBORD as well as IP-based door access control technology tailored specifically for the unique needs of campus security systems.

Gary Conley, facilities and systems engineer in the office of business operations at the University of Virginia, Charlottesville, is using the new Schlage AD-Series locks in a beta test. In addition, the University of Virginia Identification (ID) Card – available to students, employees and some others – combines many features all on one card including:

• Identification
• Library circulation privileges
• Building access
• Meal plans
• Student health facilities
• Access to recreational facilities
• Charge privileges at university bookstore locations
• Admission to athletic events
• University transit
• Access to student legal services

The new electronic locks at the university provide options to customize the access control solution. As business needs change, so can access control to new credential technologies, a variety of network protocols, increased security levels and system expansions.

When it comes to uses of card access control, enterprise security leaders “are only limited by their imagination,” points out Jerod Zakson of RF IDeas, a firm he describes as technology agnostic.
Office Printers Involved

In one example, he suggests that corporate multi-function office document printers can include a card reader so that an employee can wave his or her card at the printer to activate printing that may be in line. There is no waste of paper from print jobs that just stack up waiting for pickup. There’s better security of sensitive documents and an audit trail of jobs printed, he says.

In another example, a Texas medical center affiliated with a university had a department with weekly meeting comprising 200 doctors and needed to record their attendance. They were having problems reading the signatures and having to type the names in a database. Now users just walk past the proximity reader and are registered for the class.

An interesting tool from RF IDeas and aimed at end users and systems integrators who are looking for integration of myriad cards and card-based application is card analyzers, intelligent portable tools for determining the manufacturer and/or card technology and optionally analyzing the card’s data and format of virtually any type of proximity and contactless smart card.

Roger Berk with ScreenCheck North America and a PKI/logical access/multi-application card expert, points out that cards can perform myriad duties but that a centralized database can be essential to working various applications. “Card applications can be endless,” Berk says, but in many ways there needs to be increased security. ID card software can then include plug-ins for turnkey mifare and iClass encoding and biometric capture.

There also is public key infrastructure (PKI), a set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique within each CA domain. The binding is established through the registration and issuance process, which, depending on the level of assurance the binding has, may be carried out by software at a CA, or under human supervision. The PKI role that assures this binding is called the Registration Authority (RA). For each user, the user identity, the public key, their binding, validity conditions and other attributes are made unforgeable in public key certificates issued by the CA.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Bill Zalud

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+