Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Adding Value with RFID, Prox, Contactless Innovations

By Bill Zalud
April 1, 2013

Beyond physical access control, technology that includes proximity, RFID and contactless smartcards, readers and their system platforms is moving outward to a diversity of business missions.

Obviously, new approaches work well for enterprises looking to improve security or expand their facilities.

That is the case for Long Beach Airport.

Located just 18 miles to the southeast of Los Angeles International Airport is a hidden gem for Southern California air travelers. Long Beach Airport (LGB) serves more than 3.2 million passengers per year and has one of the strictest noise abatement ordinances in the nation for its neighboring residential communities. 

 

Busy Facility but Unique

JetBlue Airways has established the airport as its West Coast hub, while US Airways, Alaska Airlines and Delta Air Lines also provide carrier service. Air cargo carriers such as UPS and FedEx transport 57,000 tons of goods through LGB annually. The airport is also home to the production of the Boeing C-17 military transport jet and maintenance facilities for Boeing and Gulfstream Aerospace. Touted as one of the busiest general aviation airports in the world, a large number of flights originate at the airport ranging from charter to private aviation, flight schools, law enforcement helicopters, advertising blimps and tow planes with advertising banners.

Owned by the city of Long Beach since 1923, it has also been known as Daugherty Field, named after the famous barnstormer Earl Daugherty, who first opened a biplane training school with landings right on the beach. LGB has a main terminal, notable for its circa 1941 streamline modern style architecture. Today, it is a historical landmark. A newer, modern control tower overlooks the west side of the field. Due to the airport’s age and limited size, its passenger concourse area has recently been renovated.

A new $45 million terminal modernization project has taken place at LGB since groundbreaking began in late 2010 to create a new 36,000-square-foot eco-friendly facility.

 

Upgrading Infrastructure

In addition to the TSA’s security procedures for passenger traffic, the airport’s infrastructure and administrative facilities require complete access control. Commercial Controls worked with PCSC to replace a very outdated system that existed prior to the renovation.

PCSC’s line of IQ Series access control panels are in use throughout the facility, managing doors, passenger gates, elevators and more. HID Global keypads, along with small dome cameras, are some of the visible hardware seen by the public throughout the terminal’s concourse.

The system is securely integrated with enterprise level access control software, LiNC-PLUS. Security and access control of an airport’s facility is a multifaceted situation. It’s complex and should always be adapting to the needs and requirements.

The end-user of the access control software is managed by the Long Beach Airport’s Safety and Security Operations. “Security is a high priority here at LGB and passenger security and safety are taken very seriously,” says John Blood, chief of security and airport safety.

In another application that blends RFID with business needs beyond physical security, software solutions provider AMCS Group helps waste management and recycling companies it serves worldwide to optimize their processes and reduce costs. Thanks to a partnership with HID Global, those customers now benefit from improved data collection, reporting and tracking, which should result in even greater collection efficiencies and enhanced customer service.

 

Business Basics

The AMCS Group identified a need for durable, reliable RFID technology to provide better real-time tracking and ensure accountability for services provided, as well as to allow faster resolution in the case of trash bin loss or damage. HID worked with AMCS to develop an integrated solution that uses RFID tags and readers to meet the waste collection industry’s challenges of improving efficiency, reducing costs, enhancing customer service and retention and growing the bottom line.

“There has been a huge shift in how the waste management industry manages its business since the introduction of RFID technology,” says Jimmy Martin, chief executive officer with AMCS. “RFID is now an indispensable part of AMCS’ solutions and our future development. Our three main criteria when selecting an RFID tag supplier were durability, quality and responsiveness.”

AMCS deployed HID’s Standard Bin Tags and Plug Tags, custom-designed push-in bin tags for steel containers and OEM reader modules as part of the software solution it provides to municipality and waste collection company customers. When RFID tags are embedded into wheelie bins, readers on collection trucks can identify the container and the system records the weight of the waste it contains. The AMCS system logs the tag’s location and ties it to GPS coordinates. This information is then relayed to the management office to help better guide decisions on route efficiency and fleet optimization. A number of municipal customers also use the RFID technology for recording exceptions such as “missed bin,” “access blocked” and “bin contaminated.”

Technology bridging also can bring higher level security and business benefits to enterprises with legacy mechanical door locks.

One example: Assa Abloy’s Aperio wireless lock family now can include interoperability with Seos credentials from HID Global and the iCLASS SE reader platform. Aperio enables doors to be integrated into an access control system without having to install wiring, make any structural changes to the doors, or modify existing access control credentials or system software.

Then there are other unique RFID applications.

For instance, Elpas, part of Tyco Security Products, has a man-down emergency call transmitter with a holster-worn active RFID tag, which delivers wireless monitoring and tracking of lone workers, prison guards and security personnel who may be subject to attack or injury in high-risk workplace environments.

 

 

This article was previously published in the print magazine as "Prox, RFID, Contactless: From Access to Tracking."


 

 

Future ID? Follow Airport Use, PIV Evolution and Smart Cards

 

Identity and credentials are getting more secure and more intelligent, thanks to advances at airports, with smart cards and as PIV or personal identity verification cards move into enterprises with commercial identity verification or CIV cards.

On the aviation side, cards now can include policy-based badge credentialing, TSA compliance, audit, security checks and identity proofing, enrollment and management.

One example: Quantum Secure’s software suite – SAFE for Aviation version 4.5 – an airport physical identity and access management solution that streamlines the lifecycle of physical identities (from on-boarding to terminations) and automates related processes. Such solutions come with pre-defined policies, workflows and procedures for issuing badge credentials, granting/revoking access to airport facilities while simplifying adherence to TSA and FAA regulations, audits and security directives, thus minimizing insider threats and promoting greater operational security.

In another advance, CIV cards are leveraging the infrastructure of PIV cards.

The PIV card is now deployed and used by federal agencies to assign controlled resource access privileges to federal employees and to authorize the cardholder to access both physical and logical resources. The success of this program is largely due to the development of goals, issuance policies and technical specifications that all agencies agree to follow.

Enterprises can also take advantage of this technology. The CIV credential is technically compatible with the PIV-I credential specifications. However, a CIV credential issuer need not comply with the strict policy framework associated with issuance and use of the PIV and PIV-I credentials. Securitymagazine offers a free Webinar on CIV at www.securitymagazine.com.

Further, smart cards are increasingly accepted as the credential of choice for securely controlling physical access. Standards-based smart ID cards can be used to easily authenticate a person’s identity, determine the appropriate level of access and physically admit the cardholder to a facility. Through the appropriate use of contact or contactless smart card technology in the overall physical access system design, security professionals can implement the strongest possible security policies for any situation.

More than one access application can be carried on a single smart ID card, enabling users to access physical and logical resources without carrying multiple credentials. Security can change access rights dynamically, depending on perceived threat level, time of day, or other appropriate parameters. Smart card support for multiple applications allows organizations to expand card use to provide a compelling business case for the enterprise. Smart cards not only secure access to physical or logical resources, they can store data about the cardholder, pay a fee or fare if required, certify transactions and track ID holder activities for audit purposes. Because supporting system components can be networked, shared databases and inter-computer communication can allow separate functional areas in an organization to exchange and coordinate information automatically and instantly distribute accurate information over large geographic areas.     

KEYWORDS: airport access control asset tracking proximity cards Radio-Frequency IDentification (RFID)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Adding Value by Adding Functions to Cards and Badges

    See More
  • Beyond Prox, RFID Goes Viral

    See More
  • Adding Value with Long-Term Integrator Partnerships

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing