Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Wireless Access Tech in the Fast Lane

July 1, 2008
Vehicle access control has a diversity of solutions including wireless and biometrics-based applications.


Less than a decade ago, highway transit authorities needed a convenient, user-friendly way to identify vehicles and collect tolls while simultaneously reducing delays at collection points.  Today, EZ-Pass and Fast Lane transmitters are widely accepted, successful solutions that support the collection of revenue on toll highways while keeping traffic flowing. A similar, but potentially even more critical need is now facing enterprises that operate vehicle gates at secure government and commercial facilities – how can vehicles and drivers be properly identified before allowing them access to the facility without causing back-ups?


Military bases, for example, are seeing significant increases in traffic volume as more and more businesses that serve the government are now located within bases’ secure boundaries. Currently, vehicles attempting to access the facility must come to a complete stop for a manual inspection of identity credentials, or to perform some type of biometric identity verification at the gate. This approach results in significant backups during periods of high traffic. Beyond extending daily commute times for employees and causing productivity losses for employers, these traffic backups are impacting surrounding communities as vehicle lines reach into residential neighborhoods and commercial areas. Yet another more global concern is the pollution generated by large numbers of vehicles sitting in stop and go traffic.



IDENTITY VERIFICATION

The need for identity verification is very real and can’t be overlooked. Secure facilities, whether a port, military base or commercial enterprise, require reliable identity verification in order to meet strict security regulations. In many cases gate operators must not only verify that each vehicle has clearance, but also that the driver is who he or she claims to be, and belongs with that specific vehicle. A known vehicle with an unknown driver may present more of a risk than a completely unknown vehicle.

Traditional identification methods that require a full stop simply aren’t capable of keeping up with the increases in vehicle traffic at these facilities. A logical, but not so practical solution is the addition of new lanes, involving expensive capital construction projects and resulting in manpower increases for new guards. The military, for example, is currently spending half a billion dollars annually to properly staff vehicle gates. A “fast lane” would be ideal -- but it would have to meet very special requirements. Only known vehicles, with known drivers, would be allowed through without stopping, reserving the traditional “full stop” inspection only for visitors. Putting such a concept into practice involves some unique challenges.

IDENTIFYING VEHICLES AND DRIVERS

RFID windshield tags similar to those used on public toll roads are an effective way of identifying vehicles, but while it identifies the vehicle, it doesn’t verify the driver’s identity, perhaps the most critical part of the problem. Advances in two fields of technology – wireless communications and biometrics – have made an entirely new approach to gate access possible. Wireless biometrics can now provide a secure “fast lane” that ensures positive identification of the vehicle and the driver.

MOBILE BIOMETRICS FOR FAST, SECURE GATE ACCESS

Historically, biometrics readers have been affixed to doors and gates, and are permanent, mounted devices. It is now possible to incorporate a fingerprint reader into a tiny personal device the size of a key fob – thereby putting a biometric reader in the hands of every user. The same fob can communicate wirelessly at distances of up to 100 meters (300 feet) to enable biometrically assured gate access at speeds of 15 – 20 mph.


Here’s how it works – as a vehicle approaches a gate, drivers swipe their finger across their personal biometric fob. It compares their live finger to the fingerprint template that was securely stored in their fob when it was issued. After the driver’s identity has been verified, which proves that the device is in the hand of the rightful owner, the fob transmits encrypted credential data via 802.15.4, (an IEEE standard for wireless communications operating at 2.4 Ghz).


The data is received by a transceiver, which decrypts the credential information and passes it to an external gate control system to confirm that the user is authorized for access.  The gate is then opened.  The entire transaction takes approximately two seconds.


The facility reaps all of the benefits of reliable identity verification without requiring vehicles to stop, or even roll down a window. The result is a dramatic reduction in traffic backups with no compromise in security. In fact this approach provides significantly heightened levels of security at gates as compared to most manual approaches, which just inspect photo IDs, and often from afar.



OUTLOOK FOR RAPID ADOPTION

Modern society has an unprecedented need for security, yet that need has to be reconciled with the realities of commercial business. This new approach to an age old problem promises to achieve those often competing goals for secure facilities, while reducing costs and addressing a common evil of modern society – traffic.

About the Source

Security Magazine thanks John Petze, CEO, Privaris, for the information in this article.




Hand-held video cameras working with automatic license plate recognition software aim at enterprises, parking firms and law enforcement.

SIDEBAR: Mobile Video Has Role with Law Enforcement, Corporate Parking

Automatic license plate recognition systems (ALPR), which can work locally or communicate wirelessly, are playing an identification and access control role. The hand-held ALPR camera/illuminator is used by police for the immediate identification of wanted vehicles.  The list of wanted vehicles can be loaded directly to a laptop in the police car and within about 200 milliseconds of seeing a license plate that is on the list, the officer will be alerted of a match. For example, the firm INEX/ZAMIR provides the camera/illuminator, the ALPR software and the alert messaging system software. The company provides a Wizard to facilitate the loading of any database onto the laptop. The hand-held camera/illuminator is plugged directly into a cigarette lighter adapter in the vehicle and the USB port of the laptop and needs no other hardware.  This system was developed to meet the request of police departments who did not want to mount a lot of expensive equipment permanently to a vehicle and have to add processors in the trunk, along with special power supplies; this system simply moves from vehicle to vehicle as needed.   Although this equipment can read vehicles at 120 mph, it has also found other uses in parking applications for lot inventories, security and on-street violation enforcement.




Access must reflect both security needs as well as the facility’s culture. At the Stetson Mansion in DeLand, Fla., a dual gate operating system allows gates to open and close in the majestic manner that mirrors the home and grounds.

SIDEBAR: Keypad, Wireless Intercom at the Gate

Historic Stetson Mansion, DeLand, Fla., now employs a wireless entry intercom and keypad system to both secure and open the way to its home that’s listed in the National Register of Historic Places. Designed by noted architect George T. Pearson in 1886, the mansion has been going through an extensive adaptive restoration. The home, school house and gardens are being updated as if John B. Stetson still inhabited his winter home and wanted it upgraded with the finest modern accessories and conveniences. By the way, Stetson is world-recognized for the Stetson hat, an icon of the Wild West. Ironically, he crafted the hats in Philadelphia. Among those who had custom-made Stetson hats were “Buffalo Bill” Cody, Calamity Jane, Will Rogers, Annie Oakley, Pawnee Bill, Tom Mix and the mythical “Lone Ranger.”

His southern home was in DeLand, on the northeast coast of Florida. “When we looked at the entrance to the mansion, we determined that the technology from GTO would be ideal for the property,” said Michael Solari, installation manager for the Stetson Mansion. The “dual gate operating system allows our gates to open and close in the majestic manner that mirrors the home and grounds.”

The system supports gates up to 650 lbs. and up to 16-feet long per leaf. The system includes a 12-volt battery that provides back up during any power outage and an optional activation alarm. Its soft/start-soft/stop system reduces mechanical stress on operator and gate. It is UL325 certified and listed.

The wireless intercom/keypad system consists of an indoor base unit and an outdoor stand-alone intercom and keypad. Up to 25 entry codes can be programmed into the keypad. It allows visitors to “call” the indoor base station, allowing those inside the mansion to select whom to grant access to the property.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • evidence_enews

    How to Get in the Digital Evidence Fast Lane

    See More
  • Airport fast-lane program Clear shuts down

    See More
  • Business-tech Twofer: Demystifying Fiber, Wireless

    See More

Related Products

See More Products
  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!