Development and future application trends of access control systems

The development of access control systems has gone through several key stages, including low-frequency card technology, high-frequency card technology, and the latest virtual credential card technology. In the past 15 to 20 years, low-frequency cards have been the standard in the security industry, providing efficient and effective access control. These cards are simple in structure, allowing anyone with a card issued by the company to enter the building. However, this simplicity also introduces vulnerabilities, as stolen or lost cards can be used by unauthorized individuals. To enhance security, companies have added visual security information like photos to their cards. Employees wear ID/access cards with their own photos, and security personnel are trained to verify identity. Despite these efforts, low-frequency cards can still be easily copied, leading to potential security risks. In the view of security managers, distributors, integrators, and equipment manufacturers (OEMs), HID’s 125 kHz RFID Proxy card and card reader are considered the industry standard for access control systems. The HID proximity card is reliable, affordable, and seamlessly integrated with the access control system. While HID Prox technology still offers great price/performance and convenience, the 125 kHz RFID card technology and format are not as secure as contactless smart cards, which has led to the development of access control systems moving towards contactless smart card technology. Currently, networked access control systems using non-contact high-frequency smart card technology are widely used across various sectors such as government departments, financial institutions, transportation, energy, intelligent communities, factories, and hospitals. By embedding multiple layers of security components in the smart card chip, all doors are managed by a computer, enabling powerful access control functions and permissions, real-time entry and exit tracking, and query capabilities for all door records. As the number of doors increases, the settings become more complex, but the system remains easy to manage. At the same time, the access control system can communicate with the computer, and the access control software installed on the computer can be used to set card permissions and query entry and exit records. Without using the computer, the system can also run normally offline. The software allows for permission and parameter settings, real-time monitoring of door entries and exits, and statistical attendance reports. It is easy to set up, manage, and more secure. HID Global iCLASS® contactless card technology has become the industry standard for high-frequency smart cards. In 2002, HID Global introduced the first generation of iCLASS technology, extending the advantages of proximity cards to a more powerful and versatile platform, which is equally reliable, convenient, and cost-effective. At the same time, the platform can be encrypted and verified by data, providing greater security. To make the access control system more powerful, HID iCLASS 13.56 MHz contactless smart card technology and read/write fields are interoperable and support a variety of applications, such as biometric authentication, microelectronic payment, and PC secure login. The iCLASS technology platform has been providing reliable service for nearly 10 years, and together with the multi-technology multiCLASS solutions used by HID Global, it has become the standard for efficient, secure, and effective access control systems. With the evolution of the times, the access control system is moving towards virtualization and mobility. Near Field Communication (NFC) is a technology for access control systems that enables data exchange between devices within a few centimeters. NFC is also fully compliant with the ISO standard for managing contactless smart cards, which is a significant feature of its ideal platform. By using an NFC-enabled mobile phone to carry a portable identity voucher and then wirelessly reading it from the card reader, the user simply opens the door by presenting the phone in front of the card reader. The simplest mode of NFC virtual credential is to copy the access control principle in the current card. The mobile phone passes the identity information to the card reader, which in turn transmits it to the existing access control system and finally opens the door. In this way, a smarter, more portable way to configure, monitor, and modify credential security parameters is eliminated without the use of a key or smart card, which not only eliminates the risk of the credential being copied, but also temporarily distributes the credential card if necessary. If you lose or steal it, you can cancel the voucher card. HID Global's iCLASS SIO technology-enabled (SE) platform is the first to provide and manage security certifications by introducing technology-independent Secure Identity Object (SIO) virtual credentials. Virtual credentials containing identity information can be embedded in a variety of portable devices, including NFC smartphones, microprocessor-based SmartMX cards, enabling access control technology to break through traditional card and reader modes, with virtual credentials using the mobile phone as an access card. As a result, the access control technology used in the past few decades can now be embedded in mobile devices such as mobile phones. When the door is opened, we no longer need keys and cards, just put the mobile phone with NFC function and built-in virtual credential card before the card is used. The advantage of iCLASS SE virtual credential card technology is its portability, which ensures the security of the system. The SIO Virtual Credential Card provides additional diversified keying, authentication, and encryption capabilities for data to prevent security breaches. This security feature of SIO binds data to specific devices based on the unique characteristics of the device, preventing SIO from being copied to another device, thus preventing copy card intrusion in various places. The SIO Virtual Credentials Card operates within HID Global's Trusted Identity Platform® (TIPTM) framework, which establishes a secure and trusted boundary for secure key delivery in SIO-based access control applications. The TIP framework provides a convenient way to securely configure SIO virtual credentials on various platforms such as mobile devices. No matter where the user is or what network connection is used, there is no problem. In addition, SIO technology supports remote configuration and management. For example, the SIO mode provides secure remote management. If the user's mobile phone is lost, these management functions can be used to securely and conveniently configure, monitor, and modify the security parameters of the virtual credential card, thereby eliminating the possibility of copying the virtual credential card and temporarily issuing new ones. Virtual credentials card and abolished lost or stolen virtual credentials. The development status of mobile access control shows that according to a survey by market research firm Research and Markets in 2012, North American and European NFC chips account for more than 60% of the total market, while Asia Pacific has the fastest growth, especially in Japan, China, and South Korea. NFC applications are attracting more and more people as the market grows. The report also said, NFC application brought by market revenue expected to grow from US $7.686 billion in 2011 increased to 3.4515 trillion US dollars in 2016, a CAGR of 35%, which is mainly revenue from electronic payment, followed by including ticketing and access control business. Despite the promising prospects of the NFC application market, there are several conditions that must be met to develop mobile access control for Near Field Communication (NFC) and other applications: First, you need a mobile device with NFC capabilities. For higher market usage, these mobile devices must support four main operating systems: iOS, Android, Windows, and RIM (Blackberry). In addition, we must be able to communicate wirelessly with mobile devices. We need to provide three configurations for mobile devices: (1) a secure applet to hold a virtual credential; (2) a data interaction application; and (3) a virtual credential. Configuring a virtual certificate card model that can be run on a mobile device is also a key element of success. Second, you need to configure the hardware that can read the virtual credential card from an NFC-enabled mobile device. Such hardware can include NFC-enabled readers, electromechanical locks, and third-party hardware ecosystems that support different applications, such as attendance, secure print management, PC secure login, storage biometric templates, or corporate restaurants. Or electronic payment for vending machines. Finally, an ecosystem must be developed that includes mobile network operators, trusted service managers, and other operators that provide and manage mobile credential cards. At present, the market has begun to develop in the above aspects and promote the application of NFC. On the hardware, the main mobile operating systems, including iOS, Android, Windows, and RIM (Blackberry) are advancing the widespread use of NFC technology, and began to launch NFC-enabled mobile phones. At the same time, the industry has extensively cooperated to embed virtual credential card technology into NFC chips to accelerate the application of NFC technology. HID Global and NXP Semiconductors jointly launched a global mobile NFC mobile access control solution. HID stores the virtual voucher card in the NXP Embedded Secure Element (eSE) component in the phone, which is compatible with the widely used access control readers and systems. NXP's technology supports multiple application management, such as payment, e-government, access control, and ticketing, and all application management is done through a microcontroller. At the application level, major domestic telecom operators have implemented projects using NFC or similar NFC technologies in some large cities, such as RF-SIM or MicroSD technology, enabling users to pay by mobile phone, buy food and beverages, and take public transportation. Major telecom operators, terminal manufacturers CUP and also from the beginning of this year to compete for the full NFC market, China Unicom UnionPay jointly launched the first NFC phone in November 2012, China Mobile plans in February 2013 to launch NFC services in 12 provinces. The participation of operators will accelerate the formation of an ecosystem of NFC technology applications, and expand NFC mobile phones to mobile access control, electronic payment, ticketing, network login, and other applications. Combined with NFC technology and virtual credential cards, it will provide an ideal platform for emerging applications, such as electric vehicle charging stations. The driver can park the car in front of the charging meter and use NFC phones for access and payment services. Personal health records are also accessible using an NFC phone. Patients can present their mobile phone at the hospital to provide personal information without having to fill out a form, and during the emergency medical treatment, the same information can be provided to the caregiver by accessing the voucher card. Another emerging application is the use of smart posters for micro-marketing. Consumers can use the NFC phone to read the label on the poster, after which the phone navigates to a specific web page with more information. At the same time, virtual credential card technology can achieve the integration of access control and computer desktop login. Our technology enables smartphones to receive virtual cards and information from service providers over the Internet or over the air, and to read smartphones with virtual credential cards in front of iCLASS SE readers. These phones also generate a one-time One Time Password (OTP) to securely log in to another mobile device or desktop computer and access the network. In addition, advances in back-end convergence technology will provide powerful authentication and card management capabilities for computer and network logins, ensuring identity information on both plastic cards and smartphones. As users increasingly expect to use one-time password tokens or key fobs, they can open doors, log on to the network, access applications and other systems, and securely remotely access the network with a single credential. The use of a single credential is more convenient and enables strong authentication of critical systems and applications across the entire IT infrastructure, thus greatly improving security. This approach enables organizations to leverage existing credential card investments, increase computer desktop network logins, and create a fully interoperable, multi-layered security solution for enterprise networks, systems, and facilities, reducing deployment and operational expenses. Convergence resolutions also help companies meet regulatory requirements, enforce consistent policies, achieve consistent audit records across the enterprise, and reduce costs through consolidation tasks.

Single Pendant Light

Single Pendant Light, Bedside Pendant Light, Modern Single Pendant Light, luxury pendant light

JINGYING , https://www.jingyinglight.com

Posted on