Identification Solutions at Security Essen 2018

Comfortable and efficient processes in the economy are now hardly conceivable without any checking or security measures. Only access, presence or identity checks make it possible to achieve and maintain a high security level. How important reliability is in this respect is shown, above all, by glitches. For example, this summer during the checking negligences at the airports in Munich or Frankfurt which meant that thousands of passengers were stranded or could not board their flights. Or during the millions of identity thefts every year which are used not only for the subsequent fraud to the detriment of online traders and customers but also for sabotage, espionage and manipulation attempts.

Reliable automated checking or authorisation tests are therefore cornerstones of the vast majority of security concepts. At Security Essen which will take place at Messe Essen from September 25 to 28, an important role will be played by the many facets of admission and authorisation checks. In addition to technical solutions, personal checking services or access checks in data traffic will also be introduced at the fair.

However, in many other security solutions too (e.g. in video surveillance, logistics security or danger alarm technology), it is important that only authorised people have access to the data, the programs and the hardware. The fair-accompanying Cyber Security Conference with the main subject area of "Secure Identification" on the second day of the fair will interest suppliers of security technology to a particular degree. In this respect, the five lectures at this conference in total will concentrate on biometrics, cryptography and the possibilities of how wireless technologies can be utilised securely.

At present, identification and authorisation management systems in conjunction with admission and access control are amongst the most dynamic segments in the security market. Worldwide, growth rates of 8 percent per year are being forecast here. The EU GDPR is making a small contribution to the growth in this case too: In the new Federal Data Protection Act (BDSG), it is now being expressly demanded that any unauthorised people must be refused access to the processing installations (Section 64,3,1 of BDSG), i.e. both physically and logically.

Two trends in the field of identification are particularly important at present: On the one hand, biometric procedures which constitute the most reliable solution when it is to be checked whether a person really is the one whose rights he/she wants to exercise. And on the other hand, solutions which, using additional sensors or data analyses, recognise when something is not right in spite of an initially proven authorisation. Such anomaly recognition is facilitated by cloud solutions or Access Control as a Service concepts in which service providers assume responsibility for the authorisation management altogether or in part. Biometric identification is also being promoted by decisions taken by politicians. For example, according to the will of the EU Commission, every identity card in the EU should include biometric face data and the biometric fingerprint in five years at the latest.

At Security in Essen, a whole series of exhibitors will show biometric solutions. In the meantime, fingerprint procedures are standard and also cost-favourable due to the use of smartphones. In most cases, face, iris or hand vein recognition systems are utilised for more stringent security applications. Furthermore, new biometric or behaviour-oriented recognition methods are being tried out in the research time and time again, e.g. movement patterns when typing, swiping, walking or speaking or even physical characteristics such as the combination of the heart size and rhythm as well as the microvibrations of the hand and brain signals. High-level security is achieved when several methods are combined (multifactor authentification).