Two Factor Authentication (2FA)

Two Factor Authentication (2FA) is becoming a powerful prevention protocol for thwarting unauthorized access, fraud, and cyberattacks. The physical security world is driving to protect sensitive information, and control staff and the public from accessing restricted areas. There is an increasing need to verify and authenticate user identity.

As security becomes more technologically advanced, so do the analytics behind addressing security needs. Two factor methods have become vital to the access control process, and will not only have to address the security concerns of the end user, they will also have to be flexible to the client’s network and current infrastructure. This white paper will explain the details of how the Blue Line Technology two-factor method works, and the practical use case scenarios that would benefit the client.

Access control systems control doors and locations. To prevent misuse, access control provides a way to monitor, control, and manage a door’s “status.” The access control software can allow or deny a user of the token, and is based on door location, designated timeframe, and authorization privileges.

The inherent security risk in single token presentations is theft, loss, being loaned to another user, or the token cloned to gain access.  Facial recognition as a biometric two factor authentication assures the token matches the face and creates a much more secure environment.

Two factor authenticators are classified as:

  • something you know (Password)
  • something you have (Card, fob, cryptographic key)
  • and something you are (Face, fingerprint, iris scans).

Blue Line Technology’s First Line Facial Recognition system with 2FA was designed with the goal of creating a safer and more secure environment, allowing multiple client locations to work seamlessly.

Using a 1:1 matching process, First Line Facial Recognition Software provides an extremely accurate validation process for 2FA authentication, threat detection, and an enterprise approach to better protecting employees, visitors, and customers.

 

This solution requires a token (card/FOB/code) and a registered face to gain entry.  Our software matches your current token to your face.  Once the token is presented the software (via camera) immediately verifies the person using the token is the authorized user.  The 2 factor authentication occurs at the speed of the token with no delays for a face match process.   If the face doesn’t match the card, entry is denied. With the Blue Line Technology API (Application Programming Interface), a biometric mismatch alert can also be sent to designated recipient.  The Blue Line software is compatible with current access control systems eliminating the need for costly tear outs.  The logic and reporting are performed by the existing access control platform with an added layer of performance. Alert messaging of threats can be sent via VMS/email/text to designated personnel.