|Home||Internet of Things||Aerospace||Apparel||Energy||Defense||Health Care||Logistics||Manufacturing||Retail|
New Approach to RFID-Powered Building Security
A platform called Tetragate combines RFID-enabled ID cards with cameras and facial-recognition software to monitor and authenticate people as they enter facilities.
Oct 05, 2006—The key card has become a ubiquitous accoutrement of the white-collar worker. Most corporate and government offices distribute these RFID-enabled cards to employees or other authorized visitors, who use them to gain access to offices or buildings, while others must check in manually. Each proximity card transmits a unique ID number that is then written to a database that provides a record of every person entering a secure facility. But if employees hold doors for one another, then no records are kept for those who enter without showing the card.
What's more, unauthorized parties can enter this way as well. For this reason, security experts consider holding doors open a breach of security rather than an act of kindness. What if the person to whom you've granted entrance turns out to be a terrorist? What if he's armed? What if he's out to break into the local area network (LAN) to steal data?
American Barcode and RFID to start researching a new approach to security. This Phoenix-based firm sells bar-code networking systems, as well as bar-code and RFID-enabled loyalty and proximity cards.
"AIG Insurance asked us if there's a way to know, definitively, who is in a building at a specific time [to combat false insurance claims from people who lie about being in a building when disaster strikes], and they wanted to be able to write that data to a Web server so it would not be saved locally," says Ted Morgan, director of card solutions at American Barcode and RFID.
After five years of development, American Barcode and RFID has announced the Tetragate platform, combining RFID-enabled ID cards with video cameras and facial-recognition software. Tetragate is designed to enable companies to monitor and authenticate thousands of people as they enter secure buildings. When American Barcode first began investigating building security, says Morgan, "RFID was just starting to take off, and face mapping was really unheard of. But since 9-11, we kept talking about it, and Tetragate is the result."
Tetragate has a two-prong approach to addressing the security holes generated when people enter access-controlled buildings without presenting a proximity card—such as when someone holds a door open for them. First, Tetragate's RFID-enabled ID cards contain ultrahigh-frequency (UHF) RFID inlays, rather than the high-frequency (HF) or low frequency (LF) inlays used in key cards for access-control systems. The UHF inlay, provided by Symbol and compliant with the EPCglobal Gen 2 protocol, has a read range of up to 25 feet, whereas HF and LF key cards must be held within a few inches of readers. Thus, if someone holds a door open for an employee, allowing that person to enter without presenting a key card to the access-control reader, the Tetragate reader installed at the doorway will sense the UHF Tetragate card, even from inside a brief case or purse. Second, Tetragate uses networked digital facial-recognition cameras to authenticate each person entering a secure area.
Login and post your comment!
Not a member?
Signup for an account now to access all of the features of RFIDJournal.com!
SEND IT YOUR WAY
RFID JOURNAL EVENTS
ASK THE EXPERTS
Simply enter a question for our experts.