The development of access control systems has gone through several key stages, driven by technological advancements and the need for enhanced security. These include low-frequency card technology, high-frequency card technology, and the latest virtual credential card technology.
Low-frequency card technology was widely used in the security industry for over 15 to 20 years, offering efficient and effective access control. However, these cards were simple and could be easily duplicated, allowing unauthorized individuals to gain entry. To improve security, companies added visual elements like photos to the cards. Despite this, the system remained vulnerable to theft or loss of cards. The HID 125 kHz RFID Prox card became an industry standard due to its reliability and affordability. While it provided good value, it lacked the security of contactless smart cards, prompting the shift towards more secure technologies.
High-frequency smart card technology, such as HID Global iCLASS® technology, is now widely used across various sectors, including government, finance, transportation, energy, and healthcare. These systems embed multiple layers of security within the smart card chip, enabling centralized management of doors, real-time monitoring, and detailed access logs. The integration with computer systems allows for easy permission settings and record queries, making it efficient and user-friendly.
HID iCLASS 13.56 MHz contactless smart card technology offers interoperability and supports diverse applications like biometric authentication and secure PC logins. This platform has been reliable for nearly a decade and is now a standard for secure and efficient access control systems.
With the evolution of technology, access control systems are moving towards virtualization and mobility. Near Field Communication (NFC) enables data exchange between devices within a few centimeters. NFC is compliant with ISO standards for managing contactless smart cards, making it an ideal platform. By using an NFC-enabled mobile phone to carry a digital identity, users can simply present their phone to a reader to gain access. Research predicts that by 2015, manufacturers will support NFC mobile phones in large numbers.
The simplest mode of NFC virtual credential is to replicate the current card's access control principle. The phone transmits identity information to the reader, which then communicates with the existing access control system to open the door. This method eliminates the need for physical keys or smart cards, reducing the risk of duplication and allowing temporary distribution of credentials. If a device is lost, the credential can be canceled remotely.
HID Global’s iCLASS SE technology-enabled (SE) platform introduces technology-independent Secure Identity Object (SIO) virtual credentials. These can be embedded in various portable devices, breaking traditional card and reader modes. Virtual credentials use the mobile phone as an access card, embedding decades of access control technology into mobile devices. When the door is opened, there is no need for keys or cards, just a mobile phone with NFC function and a built-in virtual credential card.
The advantage of iCLASS SE virtual credential card technology is its portability, ensuring system security. SIO Virtual Credential Cards provide additional diversified keying, authentication, and encryption capabilities to prevent security breaches. This security feature binds data to specific devices based on unique characteristics, preventing SIO from being copied to another device, thus preventing copy card intrusion.
The SIO Virtual Credential Card operates within HID Global's Trusted Identity Platform® (TIPTM) framework, establishing a secure boundary for secure key delivery in SIO-based access control applications. The TIP framework provides a convenient way to securely configure SIO virtual credentials on various platforms, such as mobile devices, regardless of location or network connection.
In addition, SIO technology supports remote configuration and management. For example, the SIO mode provides secure remote management. If a user’s mobile phone is lost, these functions can be used to securely configure, monitor, and modify the security parameters of the virtual credential card, eliminating the possibility of copying the virtual credential card and temporarily issuing new ones. Virtual credentials can also be revoked if lost or stolen.
Currently, the market is developing in the above aspects, promoting the application of NFC. On the hardware side, major mobile operating systems, including iOS, Android, Windows, and RIM (Blackberry), are advancing the widespread use of NFC technology, launching NFC-enabled mobile phones. At the same time, the industry has extensively cooperated to embed virtual credential card technology into NFC chips to accelerate the application of NFC technology.
HID Global and NXP Semiconductors jointly launched a global mobile NFC mobile access control solution. HID stores the virtual voucher card in the NXP Embedded Secure Element (eSE) component in the phone, which is compatible with widely used access control readers and systems. NXP's technology supports multiple application management, such as payment, e-government, access control, and ticketing, and all application management is done through a microcontroller.
At the application level, major domestic telecom operators have implemented projects using NFC or similar NFC technologies in some large cities, such as RF-SIM or MicroSD technology, enabling users to pay by mobile phone, buy food and beverages, and take public transportation. Major telecom operators, terminal manufacturers, and UnionPay have been competing for the full NFC market. China Unicom and UnionPay jointly launched the first NFC phone in November 2012, and China Mobile plans to launch NFC services in 12 provinces in February 2013. The participation of operators will accelerate the formation of an ecosystem of NFC technology applications, expanding NFC mobile phones to mobile access control, electronic payment, ticketing, network login, and other applications.
Combined with NFC technology and virtual credential cards, it will provide an ideal platform for emerging applications, such as electric vehicle charging stations. Drivers can park their cars in front of the charging meter and use NFC phones for access and payment services. Personal health records are also accessible using an NFC phone. Patients can present their mobile phone at the hospital to provide personal information without having to fill out a form, and during emergency medical treatment, the same information can be provided to the caregiver by accessing the voucher card. Another emerging application is the use of smart posters for micro-marketing. Consumers can use the NFC phone to read the label on the poster, after which the phone navigates to a specific web page with more information.
At the same time, virtual credential card technology can achieve the integration of access control and computer desktop login. Our technology enables smartphones to receive virtual cards and information from service providers over the Internet or over the air, and to read smartphones with virtual credential cards in front of iCLASS SE readers. These phones also generate a one-time One Time Password (OTP) to securely log in to another mobile device or desktop computer and access the network. In addition, advances in back-end convergence technology will provide powerful authentication and card management capabilities for computer and network logins, ensuring identity information on both plastic cards and smartphones.
As users increasingly expect to use one-time password tokens or key fobs, they can open doors, log on to the network, access applications and other systems, and securely remotely access the network with a single credential. The use of a single credential is more convenient and enables strong authentication of critical systems and applications across the entire IT infrastructure, thus greatly improving security. This approach enables organizations to leverage existing credential card investments, increase computer desktop network logins, and create a fully interoperable, multi-layered security solution for enterprise networks, systems, and facilities, reducing deployment and operational expenses. Convergence resolutions also help companies meet regulatory requirements, enforce consistent policies, achieve consistent audit records across the enterprise, and reduce costs through consolidation tasks.
Single Pendant Light, Bedside Pendant Light, Modern Single Pendant Light, luxury pendant light
JINGYING , https://www.jingyinglight.com