Smartphone as an access card application case

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

With the growing popularity of NFC and other such technologies, a few high-profile examples have emerged.

With the increasing influence of Google Wallet (Google Wallet), the global NFC industry has sprung up. Large mobile phone manufacturers such as Nokia, Samsung (Google), Research in Motion (RIM), LG and ZTE have launched a large number of NFC-enabled devices. product. According to research by market research firm IHS iSuppli, in 2015, manufacturers will deliver about 550 million NFC mobile phones. Like Wi-Fi, NFC technology will gain rapid adoption and become a trend. Wi-Fi (devices) initially jumped from 1% to 10%, while NFC mobile phones are expected to reach 10% to 15% in 2012, and now only about 1% of mobile phones support NFC.

What can NFC do? Japan today is exemplary. Japan has adopted Sony’s FeliCa technology, the de facto standard for contactless smart cards in Japan, enabling smart card and mobile payments in fast food restaurants, subways, taxis and vending machines in Japan. In addition to Japan, many Asian countries are also catching up and actively deploying NFC. China’s major telecom operators have implemented several projects using NFC or NFC-like technology in some major cities in the mainland, such as RF-SIM, SIMpass or MicroSD technology, To enable users to pay by mobile phone, buy food and beverages and use public transport. Another example is Korea Telecom, the second largest mobile operator in South Korea. KT offers an NFC-enabled iPhone accessory that comes pre-installed with MasterCard’s PayPass application, allowing users to complete payments on PayPass terminals with NFC mobile phones. In Singapore, a local taxi company is installing NFC payment terminals in cars to accept NFC payments directly, making it easier for passengers who wish to complete payments with NFC mobile wallets and EMV cards.

The industry has made great strides in bringing payment applications to NFC smartphones, and the next growing trend is to bring key and smart card functionality to NFC smartphones as well. Driven by the growing popularity of NFC smartphones and mobile payments, NFC technology will create new opportunities for placing virtual credentials in smartphones and other portable devices, enabling users to open doors, shop, and secure using smartphones and portable devices. conduct other transactions.

Currently, HID Global is working with leading mobile phone manufacturers and NFC semiconductor suppliers to embed next-generation access control technology directly into mobile phones and take full advantage of virtual credentials. Not long ago, HID Global announced a partnership with RIM, the maker of BlackBerry® phones, to deploy iCLASS® virtual credentials and mobile security identification technology in NFC-enabled BlackBerry smartphones. The new technology allows users to authenticate themselves by exchanging information with a new generation of iCLASS SE™ card readers on their BlackBerry phones. In addition, a smartphone embedded with a virtual credential can not only be used as a key to open the door, but can also be used to make mobile payments and use various other applications.

Manage security

Currently, 13.56 MHz contactless smart cards are widely used for the verification of personnel identification information to determine whether a person can enter a building or use a device. Using this high-frequency smart card technology, a variety of keys and two-factor authentication can be achieved, which can prevent anyone from unauthorized use of the card or card reader, thus improving security. In addition, encrypted data storage adds another layer of security to the information on the card.

Now that we are entering an era of greater mobility, more advanced applications, and more threats to information security, the industry is turning to a new generation of access control architectures to place portable identity virtualisation on fixed and mobile devices Credential card. So, how do we ensure information security?

HID Global’s next-generation access control solution, the iCLASS Secure Identity Object™ (SIO)-Enabled (iCLASS SE) platform, securely embeds and configures virtual credentials in mobile devices, delivering unprecedented levels of security , while allowing virtual credentials to be placed on a variety of mobile devices. The platform is based on credential-side SIO technology and reader-side SIO decoders that combine to perform functions similar to traditional cards and readers, but the iCLASS SE platform uses standards-based, technology-independent, and flexible identity data architecture that provides a new level of security, portability, and performance.

SIO Virtual Credentials ensure the authenticity and privacy of data, while relying on multiple layers of security mechanisms to prevent data duplication. This type of credential adds a layer of security to the device-specific security, and acts as a wrapper to the data, which allows for more diversification of keys and provides additional authentication and encryption , to prevent security breaches. In addition, SIO is built for a specific device and bound to that device, preventing the SIO from being copied to another device, thus preventing various venues from being attacked by copy cards.

Additionally, the SIO virtual credential operates within HID Global’s Trusted Identity Platform™ (TIP™) framework, which establishes a secure and trusted perimeter to secure keys in access control applications based on SIO technology submit. The TIP framework facilitates the secure configuration of SIO virtual credentials on various platforms such as mobile devices, no matter where the user is located or what kind of network connection is used.

For virtual credential management, SIO technology supports over-the-air configuration and management. For example, SIO mode provides secure remote management functions that can be used to more securely and easily configure, monitor and modify the security parameters of virtual credentials if the user’s phone is lost, thereby eliminating the possibility of duplicating virtual credentials , temporary issuance of new virtual credentials (if required), and revocation of lost or stolen virtual credentials.

NFC-based access control systems enable a new generation of more convenient and secure transactions. Achieving this goal requires a simple but secure, fully scalable, standards-based identity submission system that can support a wide variety of authentication devices, ranging from readers and cards to NFC mobile phones. devices, and finally realize the safe use of NFC technology around the world.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare