How to combat Trojan Horses: long-range driver-based vehicle identification

Access & Identity Management Handbook 2007 Asset Management, EAS, RFID

Today's market for long-range automatic vehicle identification (AVI) is undergoing rapid change. Historically AVI has its roots in providing convenience for drivers as they access a parking garage or a gate entrance. The ability to have the barrier or gate open automatically without the need for the driver to open the window has great appeal in situations of inclement weather and also serves as a means of reducing congestion and establishing fast and convenient entry and exit for those who use an AVI tag.

The traditional AVI system is made up of a reader and a vehicle tag which is mounted either in the windshield of the vehicle or on the exterior of the vehicle itself. Security has to this point been measured in terms of the ability to permanently affix a tag or have the tag self-destruct if removal is attempted. However, as the AVI technology is finding its way into security application the requirements are changing with the introduction of driver-based systems.

Lock and key combination

The ever increasing need for a simple way to track the driver credential and potentially the vehicle identification as a lock and key combination, has paved the way for a new philosophy which dictates that a vehicle can never be left with an active AVI access credential present unless occupied by an authorised driver.

A driver-based AVI tag is made up two components: an in-vehicle card reader/transmitter and a personnel credential, such as contactless building access card. The in-vehicle reader will read the building access card and 'boost' the signal to an external reader at ranges up to 11 metres, which will allow plenty of time for the back end security controller to activate the barrier or gate opening prior to the time the vehicle arrives. The booster device will in effect act as the lock and the building access card as the key. In some cases the booster will contain its own embedded vehicle ID, giving the back end the ability to immediately match the right driver with the right vehicle.

No Trojan Horses

Removal of the driver ID is ensured as this credential is required for building access once the driver leaves his vehicle, leaving only the booster in the vehicle, which in itself cannot activate the barrier or gate opening. This is why unauthorised people cannot use an authorised car as a 'Trojan Horse'.

Identification without stopping

Long-range driver-based AVI systems are rapidly finding their way into applications where positive driver identification must be established without bringing the vehicle to a stop. The applications are many but include areas such as military bases, utility companies, corporate and educational campuses, police, fire and other installations where vehicles must be assigned to a specific driver such as company service vehicles.

Long-range driver-based ID is believed to be the growth industry of the future as it addresses the fundamental need for security access to be increasingly convenient without compromising the need for enhanced security.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Learn from their mistakes
October 2019 , Logistics (Industry), Asset Management, EAS, RFID
One of the cardinal rules of business is to learn from the mistakes you make during your journey, but sometimes another company’s error can be just as instructive.

Read more...
SAP and Uber Freight join forces
September 2019 , Transport (Industry), Asset Management, EAS, RFID
SAP and Uber Freight announced a partnership to modernise the freight industry through intelligent process automation and better access to a network of connected and reliable drivers.

Read more...
Securing people, vehicles and cargo
September 2019 , Transport (Industry), Asset Management, EAS, RFID
The transport industry is under siege, not only with fuel price and legislation increases, but also with widespread unrest, looting and violence against drivers.

Read more...
Clear visibility into supply chain complexity
September 2019 , Transport (Industry), Asset Management, EAS, RFID
The Internet of Things is refining the capabilities of the supply chain to reduce theft, increase visibility and transform legacy complexity.

Read more...
Autonomous attendance
September 2019 , Products, Asset Management, EAS, RFID
The SACO RF attendance solution was developed with the focus on driving down costs without compromising functionality and ease of use.

Read more...
TAPA EMEA appoints Thorsten Neumann as president and CEO
July 2019, TAPA (Transported Asset Protection Association) , News, Asset Management, EAS, RFID
The Transported Asset Protection Association (TAPA) has appointed Thorsten Neumann as its first full-time president & CEO.

Read more...
ADI Expo 2019
June 2019, ADI Global Distribution , Calendar of Events
   Johannesburg: 2 July    Cape Town: 4 July ADI will host its successful Expo for the 4th consecutive year this year. This year’s event will be a one day event, held in Johannesburg and Cape Town. With ...

Read more...
Access wherever you are
June 2019, ADI Global Distribution , Associations, News
ADI Global Distribution, a South African distributor of security and fire technology products has joined ESDA, the Electronic Security Distributors’ Association.

Read more...
Active cargo tracking units growth
June 2019 , Asset Management, EAS, RFID, Logistics (Industry)
The number of active tracking devices deployed for cargo loading units including trailers, intermodal containers, rail freight wagons, air cargo containers, cargo boxes and pallets reached 6.1 million world-wide in 2018.

Read more...
Local manufacturing from Hissco International
May 2019, Hissco , Editor's Choice, Asset Management, EAS, RFID, News
Hissco International recently announced it has set up a local manufacturing partnership that will supply X-ray equipment to partners around the world.

Read more...