Application cases of access control technology in the NFC era

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

now,
Access control
Technology has made even greater breakthroughs. Virtual identity credentials can be safely configured and reliably embedded in smart phones and other mobile devices, ushering in a new era of development.

With the evolution of the times, access control cards have become more and more advanced and intelligent. Today’s 13.56MHz contactless smart card is a typical example. This type of card includes a tamper-proof RFID element connected to a multi-loop antenna, and can be customized for the cardholder. When the card is read with a card reader, a mutual authentication process is performed. In addition, they can also be used in a variety of applications, such as biometric authentication, small-value electronic payments, computer desktop login, etc. This type of access card can not only securely store our identity information, but also store access rules and determine whether a specific person can open the door, and decide whether to allow or deny access between the card reader and the central control panel (or server) .

Just like any other IT process, in fact our identity information, as well as the encrypted communication and data processing event chain that occurs between the card reader and the server or control panel, can be virtualized and migrated to including mobile phones. New platform. In other words, the information in today’s smart cards and user identity information can be stored in any electronic device that takes appropriate security measures. For this type of virtualized system, to seamlessly integrate into the existing access control system, two prerequisites must be met:

1) Pass the data toAccess controlThe way of the card reader (equivalent to swiping a card);

2) The mechanism for safely managing the identity and authentication information in the equipment (that is, from the configuration to the entire operation process).

As long as the above two prerequisites are met at the same time, the traditional access control technology can be embedded in smart phones and other mobile devices.

Enter the era of NFC

Near Field Communication (NFC) is a technology suitable for access control systems. This NFC standard enables data exchange between devices within a distance of several centimeters. NFC is also fully compliant with the ISO standard for managing contactless smart cards, which is a significant feature of its ideal platform. By using a mobile phone equipped with NFC technology to carry a portable identity credential card, which is then read by a card reader wirelessly, the user only needs to show the mobile phone in front of the card reader to open the door. According to the forecast of the research organization IHSiSuppli, in 2015, manufacturers will ship about 550 million NFC-enabled mobile phones.

NFC is used inAccess controlsuperior

The simplest mode of NFC virtual credential card is to copy the access control principles in the current card. The mobile phone transmits the identity information to the card reader, which in turn transmits it to the existing access control system, and finally opens the door. In this way, without using a key or smart card, a safer and more portable way to configure, monitor and modify the security parameters of the credential card can be provided, which not only eliminates the risk of the credential card being copied, but also can temporarily distribute the credential card when necessary. The voucher can also be cancelled if it is lost or stolen.

ClarionHotel Stockholm in Sweden participated in the virtualAccess controlThe initial test was applied, and the pilot project ended in June 2011. The hotel cooperates with HIDGlobal’s parent company AssaAbloy, ChoiceHotelsScandinavia, TeliaSonera, VingCardElsafe, and Giesecke&Devrient (G&D) to replace the room key with a digital key that can be sent to the guest’s NFC mobile phone.

During the trial period at the Clarion Hotel, guests can use their mobile phones to enter the room. The guests who participated in the test received a Samsung NFC mobile phone with AssaAbloyMobileKeys (mobile key) software installed. Before arriving at the hotel, the guest’s mobile phone receives a text message containing a link to the check-in location and an electronic room key. In this way, guests can save the queuing for check-in, go straight to the room, and when they reach the door of the room, they can open the door by just showing their mobile phone in front of the door lock. When checking out, guests only need to touch the self-service terminal in the lobby with their mobile phones, which saves the front desk manual processing time.

A follow-up survey conducted after the Clarion hotel trial showed that 60% of the respondents said that using the digital key solution saved more than 10 minutes, while 80% of the respondents said that if the solution is currently available, they would choose it. In addition to saving the cost of the card, the hotel has also benefited a lot in other aspects, such as reducing the human resources for check-in and deploying more staff to solve other customer service issues. In addition, the problem of replacing lost keys has become easier to solve.

future development

Take full advantage of the powerful features of smartphones, thereby significantly reducing deploymentAccess controlThere are many opportunities for application costs. Modern smart phones have embedded smart chip features comparable to today’s typical access control systems, and can be used to perform most tasks that were originally performed by a card reader and a server or control panel.

Card readers and locks can be manufactured without important smart features or connectivity functions. The NFC mobile phone can verify personal identity information and any other related rules (such as whether the access request is within the allowed time period, or whether the visitor is allowed to stand at the door and use the GPS function of the mobile phone), and then use encrypted secure communication to send a trusted message to the corresponding door , To achieve controlled access. What the card reader has to do is to interpret the encrypted command used to open the door—the card reader or lock becomes an encrypted door switch that is not connected to the control panel or server, thereby significantly reducing the cost of the card reader or lock.

In addition, NFC smart phones can also store necessary access control rules and processing functions, and send trusted commands to lower-cost, connectionless NFC card readers to open the door lock. We believe that in the future, it can be applied to interior doors, file cabinets, and storage cabinets for storing valuable or managed items (such as painkillers, etc.) to deploy an affordable but equally powerful access system.

In addition to reducing access control costs and creating new market opportunities, virtual credential cards have also become more secure.Compared to lostAccess controlCard, users will lose less mobile phone with virtual credential card. In addition, using NFC mobile phones with embedded credential cards can also modify security parameters more easily and efficiently.

In traditional applications, if you want to enter a US government building, you need to use two-factor authentication to verify your identity. The same is true for bank ATMs. The card is the first authentication and the PIN code is the second authentication. With NFC mobile phones, two-factor authentication can be initiated when necessary (such as when the threat level rises). With the help of an NFC mobile phone with a virtual credential card, it is easy to send a request to the mobile phone (such as requesting the user to enter a 4-digit PIN code on the mobile phone before sending the door opening message), thereby making multi-factor authentication a real-time managed service.

Future application

NFC mobile phones with embedded virtual credential cards will have a wide range of uses in the future. Although airlines still use QR barcode technology, passengers have shown great interest in using mobile phones as mobile boarding passes, which further confirms that the use of mobile phones for various tasks is now becoming more and more popular.

In Japan, NFC payment systems have been installed in fast food restaurants, subways, taxis, and vending machines. This technology is also ideal for university campuses. Students can use NFC mobile phones for various applications, including entering buildings, paying parking fees, shopping, using the campus bus system, borrowing library materials, and determining personal identity information before taking exams. , And access to computer resources, etc.

Virtual credential cards will also provide an ideal platform for emerging applications, such as electric car charging stations. The driver can park the car in front of the charging meter and use the NFC mobile phone to access and pay for services. You can also access personal health records using NFC phones. Patients can show their mobile phones in the hospital to provide personal information, instead of filling out forms, during emergency medical treatment, they can provide the same information to nursing staff through the access credential card. Another emerging application is the use of smart posters for micro-marketing. Consumers can use NFC mobile phones to read the tags on the posters, and then the mobile phones will navigate to a specific web page with more information.

In today’s world, there is always a large amount of electronic data attracting our attention, and the concept of access screening has become more and more important. In fact, the access control technology can be used in reverse according to certain rules and authentication factors to prevent access to the user’s personal mobile phone.

Now, by storing the access control decisions and records on the NFC phone instead of each lock, it is easy to protect places and objects with a disconnected lock, obtain a new key, remotely send the key to other people, and for each usable digital The personnel and use time of the key change rules.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare