Stop thinking access control: start thinking identity control

April 2008 Access Control & Identity Management

The way we use identity is changing. In a continuing assessment of these developments, Lynne Larsen looks at how identity is being used to extend the benefits offered by secure access systems.

Last August, Hi-Tech Security Solutions spoke to Mark Eardley about BioDentity's approach to identity, including the company's PLAT methodology and the ways it associates data according to Person, Location, Activity and Time. The premise that identity has several interrelated or associated components is a fundamental principle in this approach to using identity as a business tool that accelerates processes and increases their integrity. In this issue, we look at solutions that are doing just that.

Linda Glieman, divisional manager of time and access solutions at Business Connexion, agrees with Eardley's thinking around the methodologies of working with identity. Business Connexion is currently rolling out its new access validation module (AVM), which extends how the company uses identity to produce solutions that are more capable of managing authorised access.

Glieman says, "It is no longer acceptable to simply grant access based on a single identifier linked to a name and employee number. We need integrated solutions that tell us much more about a person before granting access. For example, many organisations need to know if a person has received the correct induction training and that it is still valid; that the right medical clearances are in place and up to date, or that the person is appropriately licensed or accredited to perform certain tasks."

Glieman sees the traditional role of access control changing to encompass risk control, thereby delivering benefits in relation to operational health and safety issues. She says this is particularly relevant for organisations operating in inherently hazardous environments, citing the mining, petrochemical and heavy industries as pertinent examples, "We are working with companies in all these sectors to reduce the risks created by unauthorised access. It goes way beyond the usual security constraints of preventing illicit access and the criminal activities associated with it.

"Obviously, security remains a cornerstone of AVM, but it is not its sole motivator. Highly competent, proven biometric systems are now available to authenticate identity. Such biometrics also eliminate the inherent weaknesses of card or pin-based systems - positively identifying someone is no longer the challenge it used to be. For us, the next step is to work more smartly with that verified identity."

Identity in logistics

Electronic Logistics Integrity Management ELIM exemplifies how the traditional thinking around identity is evolving. Eardley refers to this evolution as 'extended identity'. He explains that, within the world of access control, "We are accustomed to thinking of identity as primarily relating to individuals. The principles of 'extended identity' are being applied within ELIM to include other types of identity such as vehicle registration numbers, waybills, package barcodes and POD certifications."

From opening a container at Durban docks, right through to placing an item on a retailer's shelves in Johannesburg, ELIM can record the location and time of each activity involved in the process. In itself that may be nothing new. What is new is the fact that ELIM uses fingerprints to authenticate and record the identities, activities and locations of each person in the chain. "Essentially, ELIM uses fingerprints to authenticate who did what, where and when throughout a supply chain."

According to ELIM's developer, Marius Coetzee, managing identity is critical within the logistics industry. "We have spoken to a number of logistics companies and have found a commonality of identity-related challenges amongst them. Being able to monitor activities based on identification is central to many of these issues. The system extends identity management beyond personnel to include items such as trucks, containers and the goods within them," he explains.

"We will be ready to take ELIM to market in May this year, and are working towards this with one of South Africa's major access control and T&A solution providers. The official launch will take place at the SAPICS Supply Chain & Operations Management Conference at Sun City from 29 June to 2 July."

The hardware component of ELIM is Sagem's MT2G mobile biometric terminal. Coetzee says, "The unit's combination of fingerprint biometrics and GPRS communications is particularly significant. It enables us to manage identity accurately and to deliver diverse functionalities to the terminal from our servers."

As examples of these functionalities, Coetzee explains that, "We can capture weighbridge readings and the identity of the person who entered them, and then auto-link this info to time and location. On the same basis, we can record who cartonised a shipment, who packed it on a truck and who received it at a retailer. All of these types of functions can be run from the mobile terminals."

Identity in action

Stanley Blick already has many years' experience of providing access and T&A solutions to the logistics industry. Blick's Chris Thompson introduced Value Logistics to EVIM (Electronic Visitor Identity Management) some months ago and after on-site trials the company has ordered four EVIM mobile terminals to control access at its Isando depot.

Thompson says, "Our clients in this sector were quick to realise the advantages of biometrics for highly accurate access and time management and were already comfortable with the efficiencies delivered by the technology. The EVIM platform represents the next generation of practical solutions that can deliver a new set of commercial benefits to our logistics clients, based on processes and technologies that are well-proven."

In addition to capturing visitor information and confirming their identities, Value is extending its use of the system to record various data relating to trucks as they enter and leave the group's main Johannesburg depot. Rory Greene, the company's national loss control manager explains, "We first capture the details of the vehicle, tractor, trailers, containers and their seals. We then allow the driver to capture his own ID number and to sign off the details by scanning his fingerprint. All of this is done on the portable terminals which then print a numbered exit or entry permit with the name of the driver printed clearly on the slip."

Web-based identity reporting

All of the identity data relating to the truck is uploaded in realtime via the GPRS-enabled terminal to BioDentity's central servers at Verizon. Greene accesses his information through EVIM's Web-based functionality, giving him complete, time-based reporting on every visitor to the site.

He sees the system as delivering a number of distinct benefits. "First of all, it is far more secure and far more accurate than the old paper registers. Quite simply, there is nothing else like it on the market. Our four terminals handle over 400 visitor transactions a day. Previously, we used traditional visitor books to register who was coming onto the site. Now, we do not get people entering their name as Peter Pan or Patrick Swayze like we got in the old registers. Neither do we have to live with the problems the books created in terms of accuracy, storage and retrieval. Now it is all available at the push of a button - and the identities are verified."

Greene goes on to say that Value's multiple business units can access the information: "For instance, our operations and warehousing staff are able to use the data for their own, task-specific purposes relating to the arrival and departure of trucks and the containers they are carrying." He also likes the flexibility the system gives him, saying that, "To cope with foreign nationals who do not have a South African ID number, our system now includes a field for passport numbers and is able to validate their authenticity."

For details contact QData DynamiQue (Business Connexion), +27 (0)11 266 5287, [email protected], www.bcx.co.za or BioDentity, +27 (0)11 234 0865, [email protected], www.biodentity.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Reliability, innovation and flexibility
Entry Pro Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Through constant innovation and advancement in technology and systems, Entry Pro strives to provide its clients with not only the most suitable, but also the most advanced solution.

Read more...
Smarter security with automated visitor management
LD Africa Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Automated visitor management solutions, like LD Access, are transforming this process by reducing human workload, while enhancing security and efficiency.

Read more...
Paxton enhances installer loyalty programme
Paxton Access Control & Identity Management News & Events
Paxton has made it easier for security installers to benefit from its popular loyalty programme, Paxton Rewards, with points now added automatically when purchasing through approved distribution partners.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Rethinking access control in high-risk logistics environments
ATG Digital Access Control & Identity Management Transport (Industry) Logistics (Industry) Facilities & Building Management
South Africa’s logistics sector is under constant pressure, not only from external threats like hijackings and cargo theft, but also from internal vulnerabilities, operational blind spots, and limited support.

Read more...
Nice unveils MyNice Smartgo
News & Events Access Control & Identity Management
Nice SA has announced the release of MyNice Smartgo, a compact access automation solution, designed specifically for the South African market, combining an easy-to-install device with a user-friendly smartphone application.friendly smartphone application.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.