Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Identity Management: Open Biometrics

By Dore Scott Perler
May 6, 2006
Dore Scott Perler


Providing a solution to a problem for an individual situation is simple. Providing a solution to a problem for the entire United States is an order of magnitude. Providing a solution for which the entire world can share in, and has their individual needs meet, is monumental.

This is exemplified by the current state of biometrics technology. Outside of the AFIS database shared by multiple nations there is no biometrics repository of any kind. In order to effectively track, catch or even slow down terrorists, this is exactly what will be required. Several companies currently provide their version of border control, biometrically enabled identity management solutions. However each company’s software requires registration of the user and storage into their proprietary architecture. This may work for a single country to register all persons entering and exiting at the borders, but how does this relate to providing a comprehensive blanket of protection for the world?

Get specific

In order for that to happen, a consortium of world technology leaders must outline their specific requirements for what is tracked, how alerts are delivered, how information is shared, what information is shared and several other factors. This is all after-the-fact information, accessible after the system knows who is requesting access or departure. Ideally, travelers would go to an authorized registration point within any of the participating countries and register their biometric and other related information. These registrations would then be shared across the globe to all participants.

The sharing of registrations provides not only a single point of convenience to the traveler but also aids in detecting potential circumvention of the system.

For this to work effectively, multiple biometric technologies must be utilized within the system. Since no one biometric works for everyone, a layered approach to biometric implementation should be required. Should a traveler fail to register with a fingerprint they could use iris, voice, face or any of the other biometric technologies. The system would track what has passed and what has failed for further detection of circumvention.

Even if fingerprint registration is not possible, images of the traveler’s fingerprints should be taken. This would provide a wealth of information for development of richer algorithms as well as human visual inspection.

Once this repository is under way, smaller applications could also use the repository for use within their applications. This would eliminate the individual registration for each biometric application. Once installed, the application for time and attendance or access control could download the registrations from the repository. This would also help track suspected terrorist hiding within small towns.

Events management

Short of having a national repository of biometrics, smart cards offer an excellent method for a portable database. The current state of smart cards has proven to be less than stellar for security. But the technology will get better, and over time should become a proven leader for portable applications.

Technology grows by leaps and bounds, so while it is common for first-world countries to expect high-speed wireless connection at McDonalds, much of the world’s population has yet to incorporate the Internet into their daily lives. When taken on a global scale, a common denominator must be found. Contactless smart cards are a low-cost solution to a less-than-perfectly connected world. As the world becomes more interested in securing public venues from terrorist threats, the time to act is now. Smart cards provide the means to increase security with valid credentials instantly.

A large problem with smart card deployment in a large community is the cooperation from vendors on how their data is stored and located on the card. In a university setting a smart card may be employed as a debit system at the campus store. The campus store application uses location A on the smart card for storage of its information. The university library also has a smart card application that tracks which books are checked in and out of the library, and also uses location A on a smart card. The current solution is to issue two smart cards to each student or have the vendors of the applications change their application so that they could both share the same card. But security companies have developed a software abstraction layer for smart cards that allow multiple vendors to work with a single smart card. The universal card engine (UCE) allows a single smart card to support multiple vendor independent applications. By implementing UCE, each vendor could simply change the logical location of storage on the card without recompiling a single line of code.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dore Scott Perler is chairman, CEO and president of Sense Holdings, a developer of security technologies and funding sources for research and development of explosives detection technology at Oak Ridge National Laboratory.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • prints-enews

    Biometrics and the Case for True Identity Management

    See More
  • nurse with mask

    The future of healthcare visitor management will leverage biometrics

    See More
  • Rethinking Identity Management in the Gig Economy - Security Magazine

    Rethinking Identity Management in the Gig Economy

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing