Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Smart Card Breakthrough?

By Bill Zalud
November 11, 2003


With the cost of smart cards continuing to come down, security, facility and operations managers all seek ways to use them in an efficient manner.

There are financial, identification, government and access control applications with multi-technology cards for physical access providing a reason to migrate to the smart cards.

But, according to some observers, the breakthrough from smart cards still awaits the killer application that justifies swapping out current readers to contact and contactless smart card readers.

According to the international research consultancy Frost & Sullivan, at present many businesses are unable to discern a clear business case for investment in a variety of smart card applications. This is attributed to the absence of killer applications that would provide significant return-on-investment for card issuers and benefit the end user.

Off-shore Action

As has been the case over the last decade, many successful smart card applications originate outside the United States. For instance, “model” multi-application undertakings, such as the Malaysian Government-initiated national identification project called MyKad, are expected to dispel such concerns. This 23 million-card project aims to equip that country’s citizens with a single microprocessor-based smart card.

Some hospitals and healthcare facilities in the United States also are embracing smart cards to speed up patient reception and security of files. Still other cards bridge the gap between proximity and smart cards; one example is the new smart badge for employees of the U.S. Patent and Trademark Office.

What’s really catching on, when it comes to smart cards, however, are uses tied to anti-terror applications. Germany’s Hamburg Airport, for example, has replaced magnetic stripe cards for employees with chip cards with contactless reader technology.

The point of the Frost & Sullivan research is clear: there are hundreds, if not thousands, of uses of smart cards with the big breaks waiting for the killer app.

The specific, more compact models are gradually underlining the business case for microprocessor cards and represent a positive development for hybrid and smart card reader uses. A key, defining trend in the market, says Frost & Sullivan research analyst Karthik Nagarajan, has been the convergence of card applications, especially in the chip card segment. The introduction of multi-application smart cards has enhanced the utility and value additions to the end user. While the access control segment benefits from cards used in both physical access control and network security, national ID projects are featuring multiple applications such as banking, telecommunications and healthcare.

On the hospital side, one giant breakthrough comes from Oklahoma where Beverly Hospital and Addison Gilbert Hospital patients are receiving medical smart cards as part of a program designed to make hospital registration faster and more efficient. With nearly 500,000 cards being distributed within the next year, they are probably the first private hospitals in the United States to issue smart cards to all patients.

The hospitals’ parent company Northeast Health System has been working closely with Oklahoma City-based Health Card Technologies Inc., to develop a patient-admitting system that uses smart cards with embedded computer chips. The cards contain access codes for each patient’s medical record, which are read through smart card readers attached to the hospitals’ admitting terminals.

“Our admissions process is easier and more convenient with patient smart cards,” says Cheryl Akre Teal, director of access services at Beverly and Addison Gilbert hospitals. “The access services staff can pull up the patient information instantaneously, eliminating the need for entering the record number manually. This greatly reduces the likelihood of errors such as duplicate records.”

Accidental creation of duplicate records is a major problem in healthcare computing. It can be caused by an errant keystroke in the data entry process, or when a patient or family member provides the wrong social security number. These errors are not only a time-consuming headache for medical records staff, but they can cause critical medical information to be hidden from treatment professionals. “With the smart card, we will decrease duplicate records and improve patient identification,” Teal says. The application also cuts down on healthcare fraud.

On the government side, the U.S. Patent and Trademark Office (USPTO) has 25,000 smart ID badges from Datakey of Minneapolis all equipped with contactless proximity technology for accessing USPTO facilities. When fully implemented, the badges will include the user’s photograph for identification purposes. Many of the badges are also embedded with a smart card chip based on cryptographic smart card technology enabling use within the USPTO’s planned security infrastructure upgrade.

The cards will be used by both USPTO employees to access the facility as well as by regular visitors to the USPTO building, such as patent lawyers, who need direct access to the various patent databases for research purposes.

A natural application, of course, centers on smart card use at airports.

Hamburg Airport, Germany’s fourth biggest commercial airport, has installed a badge-based access control solution using the contactless smart card technology from LEGIC Identsystems Ltd. of Switzerland.

The airport, with a far-flung area, has only a small part, that's freely accessible. But with 13,000 employees reporting for duty at the airport every 24-hour period, security is a number one priority.

Northern Germany’s top gateway to Europe, the facility handles more than 150,000 takeoffs and landings per year and 42,000 passengers per day; therefore access to working areas for personnel must be constantly monitored to guarantee complete passenger safety.

With employees spread across the airport in a mix of different jobs, all of which are assigned different authorizations, a powerful, flexible and failure-proof access control system was needed. Existing magnetic stripe cards were replaced with LEGIC chip cards with contactless reader technology. Numerous individual access rights have been defined and loaded on the cards. Each card also features a passport type photograph of the holder as an added security measure.

A total of 78 contactless reader terminals are at various access points throughout the airport. Approximately 10,000 employees received computer-readable badges, while the system is designed for a total of 20,000 master records, making it adaptable enough to handle future growth.

Dieter Bode, head of security at Hamburg Airport, stresses the flexibility of the system. Around 2,000 employees already use their chip cards for parking access as well as an ID badge. Further functions, such as canteen and automatic fuel pump use, will be incorporated onto the cards.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Smart Card Alliance Adds Smart Card Certification for Government Identity and Security Professionals

    See More
  • Smart Card Alliance Launches International Smart Card Training in Paris

    See More
  • Secure ID Card Holder Prevents Contactless Smart Card Skimming

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!