This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
SDMmag logo
search
cart
facebook twitter linkedin youtube
SDMmag logo
  • MAGAZINE
    • eMagazine
    • Current Issue
    • Archives
    • Monitoring Today
  • PRODUCTS
  • NEWS
    • SDM Newswire
    • COVID-19 Coverage
  • EXCLUSIVES
    • SDM 100 Report
    • Top Systems Integrators Report
    • Annual Industry Forecast
    • State of the Market Series
    • Dealer of the Year
    • Systems Integrator of the Year
    • TMA Monitoring Center Excellence Awards
    • Blog
  • TOPICS
    • Trends & Industry Issues
    • Video Solutions
    • Access Control & Identification
    • Smart Home
    • More SDM Topics
  • COLUMNS
    • Editor's Angle
    • 5-Minute Tech Quiz
    • Security & the Law
    • Integration Spotlight
    • Security Networkings
    • Digital Shuffle
    • Technology @ Work
    • Insider News & Business
    • Technology Solutions & Skills
    • Marketing Madmen
  • BLOG
  • EVENTS
    • Industry Calendar
    • SDM 100 Gala @ ESX
    • Webinars
  • MORE
    • Videos
    • Podcasts
    • Polls
    • Photo Galleries
    • Newsletters
    • Classified Ads
    • SDM Store
    • White Papers
    • Sponsor Insights
    • More Resources
  • DIRECTORIES
    • Buyers Guide
    • Take a Tour
    • Guide to Distributors
    • Guide to Central Stations & Monitoring
  • CONTACT
    • Contact Us
    • Advertise
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Integration Intelligence Issues: GETTING READY FOR FIPS 201

You have 0 Articles Left This Month. Register Today for Unlimited Access.

Integration Intelligence Issues: GETTING READY FOR FIPS 201

August 1, 2006
Joan Engebretson
Order Reprints
No Comments

Security integrators who work – or would like to work – with the federal government should familiarize themselves with the Federal Information Processing Standard (FIPS) 201, if they haven’t already. The FIPS 201 standard defines a process for verifying the claimed identity of employees and contractors seeking physical access to federal government facilities and electronic, or logical, access to federal information systems.

Beginning Aug. 27, 2006, all federal agencies are required to begin implementing FIPS 201, although some are implementing it at just a single location to start and may be using it only to control logical access. Authorized individuals will swipe a smart card into a reader and present their fingers for scanning by a biometric reader in order to obtain access to their agency’s computer network.

A key component of the new program is the background check that federal employees and contractors will go through. Users’ fingerprints will be sent to the Federal Bureau of Investigation for clearance and then will be imprinted on the smart card, also known as a personal identity verification (PIV) card. The goal is to ensure that each individual really is the individual he or she claims to be.

As Rob Zivney, chairman of the PIV Working Group for the Security Industry Association (SIA) and vice president of marketing at Hirsch Electronics explains, “The PIV card uses a scheme to make sure that the number on the card is unique for the federally issued space. This number is 14 digits, or 48 bits, long and is derived from the issuing agency code, the agency’s local site or system code and a personal credential number. Because the number is larger than traditional numbers used in a physical access control system – such as 26-bit Wiegand – the card can be used interoperably and uniquely among federal agencies.” Other features of the PIV card include a facial image, a PIN and cryptography measures, Zivney says.

Once cleared, authorized individuals ultimately may be able to use a single credential at multiple federal agencies, although interoperability between agencies is likely a few years away. As Paul Brisgone, national director of ADT’s Federal Systems Division explains, “The government is working toward creating a federal bridge that will act as a cloud above different agency databases, but that will take a couple of years.”

How extensively PIV cards will be used for access control remains to be seen. End users typically find contactless cards to be easier to use than contact cards, although the convenience of having a single card for physical and logical access may outweigh the inconvenience of having to swipe the card. Before using PIV cards for access control, however, agencies would have to replace existing card readers with PIV-compatible models — and any equipment used to support FIPS 201 installations also must be approved by the National Institute of Standards and Technology (NIST).

As of late June, four cards and two biometric equipment manufacturers had been approved, Zivney notes. “The specification for readers has just finished the review for comment phase,” he adds. “It is anticipated that reader testing can begin after this document is officially published.”

Although some federal agencies may opt to do their own FIPS 201 installations, both Zivney and Brisgone anticipate that other agencies will hire security integrators to handle that task. “There will be significant opportunity for security dealers and large system integrators to provide turnkey solutions,” Zivney notes. “The government does not have the resources to install this entire program themselves.”

ADT also sees an opportunity to leverage its nationwide presence to help create credentials for some federal agencies. These will need to be created on a local basis — and some agencies may not want to make the investment in the equipment needed to manufacture the cards at multiple locations. ADT plans to establish locations nationwide that would handle credential creation for multiple federal agencies on an outsourced basis. “We have an end-to-end solution from enrollment to issuance and management all over the country,” Brisgone notes.

You have 0 complimentary articles left.

Register for free today to continue reading!

Already have an account? Sign in here.

Privacy Policy
Subscribe For Free!
  • eMagazine Subscriptions
  • SDM eNewsletter & Other eNews Alerts
  • Online Registration
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the SDM audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • ip_verso_bluetooth_900x550_2101(1)__P0KP2DXA0D__
    Sponsored byAxis Communications

    Q&A: Low touch access control during the pandemic and beyond

  • HomePage__CA5LXZWMHA__
    Sponsored byTAICS

    IoT Cybersecurity: Taiwan Can Help

Popular Stories

MAIN HenryO_5284a

State of the Market: Access Control

G4S

Allied Universal Acquires G4S in $5.3 Billion Deal

ADT Tech

ADT Faces Another Lawsuit Over Spying Employee

2021 SDM 100

Events

May 18, 2021

The Road to Recovery: An Optimistic Outlook for Security Integrators in 2021

2020 has come and gone and while we still have a ways to go in the post-pandemic road to recovery, the economic outlook for 2021 and beyond is showing signs of turning the corner. In February, Brivo and SDM surveyed security integrators to get their perspective on trends shaping their business outlook going forward.
June 22, 2021

The 4 Cs for Obtaining Clarity From the CLOUD

Join a fast-paced hour-long webinar on June 22 when 3xLOGIC’s experts introduce the company’s latest, evolving technology release, VIGIL CLOUD. 3xLOGIC is expanding our ecosystem into the cloud with features designed to harness the power, scalability, and ease of use that are the hallmarks of cloud services.
View All Submit An Event

Poll

How do you think COVID-19 will impact your company financially?

How do you think COVID-19 will impact your company financially? Select the answer that best applies.
View Results Poll Archive

Products

Contemporary Security Management, 4th Edition

Contemporary Security Management, 4th Edition

 Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. 

See More Products

SDM-50Years-315

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest security marketplace trends.

SUBSCRIBE TODAY!
  • Resources
    • List Rental
    • Online Exclusives
    • Industry Innovations
    • Partners
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing