Access control readers - Expert commentary

The Growth Of The Mobile Access Card Market In 2020
The Growth Of The Mobile Access Card Market In 2020

The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.

Entrance Control Vs Access Control: Similarities And Differences
Entrance Control Vs Access Control: Similarities And Differences

Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorized personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognizing the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorized person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorized users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.

Making The Shift From Manufacturer To Service Provider
Making The Shift From Manufacturer To Service Provider

The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be  highly functional, flexible, and convenient for organizations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The Role of the Cloud The cloud has proven to be a highly functional, flexible, and convenient method for organizations to leverage as part of their strategies to protect and modernize their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalizing on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.

Latest SALTO Systems news

SALTO Systems Unveils Next-Gen SALTO Contactless Smart Card Ncoder With Support For Multiple Credential Technologies
SALTO Systems Unveils Next-Gen SALTO Contactless Smart Card Ncoder With Support For Multiple Credential Technologies

SALTO Systems has announced the release of its SALTO contactless smart card NCoders. The SALTO NCoder is for next-generation access control systems and they integrate the encoding capabilities of a powerful updated encoder with a built-in desktop reader function. SALTO NCoder The SALTO NCoder configures permissions and user access plans for user credentials. It is compatible with a wide range of RFID cards and mobile keys and can be used in most commercial markets including hospitality, enabling users to control management and user rights within their own building access system. Security meets design with the SALTO BLUEnet generation of smart locking access control products and the NCoder is no exception. Featuring a sleek design, the SALTO NCoder extends SALTO SPACE data-on-card best in class performance while adding innovative features to keep buildings secure, flexible, and smart. It integrates DTLS v1.2 security technology to protect communications. Supports multiple credential technologies SALTO NCoder’s SPACE standards-based design puts system operators in complete control SALTO NCoder’s SPACE standards-based design puts system operators in complete control, working with any compatible cards and smart-locking platform from SALTO Systems. Focused on innovative functionality and secure communication, the SALTO NCoder supports multiple credential technologies (MIFARE and iCLASS Seos) and digital key delivery establishing security between devices. ProAccess SPACE system The ProAccess SPACE system allows operators to grant users access permission for multiple doors and zones, configure date and time for access, and even schedule timed access. The SALTO NCoder lets platform operators manage all access control needs with one smart and secure device. Quickly and efficiently manage system operator user key creation, visitor management, and PPD (SALTO Portable Programming Device) data storage from a single smart and contactless secure management device. SALTO NCoder features: Compatibility: Runs on SALTO ProAccess SPACE and currently programs MIFARE DESFire EV1 and EV2 cards and tags and iCLASS Seos versions. Communications protected by standard cryptography (DTLSv1.2 - AES128) Built-in Ethernet and USB interfaces DHCP IP addressing Standards-compliant reader/encoder with SAM data is not stored in the device to ensure secure key management technology system

SALTO Unveils New Electronic Cylinder, SALTO Neo Cylinder With Advanced Wireless Access Control Technology
SALTO Unveils New Electronic Cylinder, SALTO Neo Cylinder With Advanced Wireless Access Control Technology

SALTO Systems, a globally renowned manufacturer of electronic access control solutions, has released the SALTO Neo Cylinder, a new electronic cylinder that offers more features and better functionality than any other cylinder on the market. The compact SALTO Neo Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, sliding doors and more. It’s available in an extensive range of models to suit almost any kind of door – from Europe to Asia to the Americas. SALTO Neo Cylinder The SALTO Neo Cylinder provides the most efficient and convenient way of securing buildings and assets. The re-engineered clutch system design makes efficient use of energy, dropping consumption to impressively low levels, resulting in 100,000/130,000 cycles with just one set of batteries. System standby power consumption is reduced, which extends the electronic cylinder’s battery life. The IP66-rated SALTO Neo Cylinder is weather-resistant, making it especially suitable for the outdoors in even the harshest of environments. Encapsulated safely inside the tough Neo Cylinder exterior is the absolute latest in electronic lock technology. Certified to high security standards The SALTO Neo Cylinder is designed to provide users the finest in safety and security Certified to the highest security standards, and pursuing ever-higher quality and reliability, the SALTO Neo Cylinder is designed to provide users the finest in safety and security. The SALTO Neo Cylinder offers value far beyond security. However, upgrading a mechanical door to electronic access control enhances security, but the SALTO Neo Cylinder provides greater control over the door by offering end-users access to audit trails, reports, alerts and so much more. Utilizes smart keys and mobile technology Using smart keys and mobile technology with the SALTO Neo Cylinder allows users to manage access rights quickly and keyless, which is more secure than using mechanical keys. There is also additional value in the flexibility, convenience and operational efficiency provided by the Neo Cylinder’s wireless technology. SALTO continues to release impressive technological innovations where connectivity between the door, user and system operations aids the growth of overall access control for any building application or access type. Keyless access control solution “SALTO’s new Neo Cylinder technology allows us to introduce customers, systems operators and installers to new experiences and to connect keyless access where we couldn’t have justified wiring a door before,” said Marc Handels of SALTO Systems. Marc adds, “We’ve seen for years that electronic locking technology is an ecosystem that has continuous change and growth and we’ve had to consider how to best anticipate customers’ needs and recommend smart locking solutions that are easy to adopt and install.” SALTO KS cloud-based access management platform SALTO Neo Cylinder has more functionality and performance capability than any other cylinder on the market" He further said, “The SALTO Neo Cylinder has more functionality and performance capability than any other cylinder on the market, allowing businesses to connect to their on-premises network via advanced SVN technology or the cloud with our SALTO KS cloud-based access management platform.” Because the SALTO Neo Cylinder is compatible with SALTO SVN, SALTO BLUEnet Wireless and the SALTO KS – Keys as a Service – cloud-based technology, it can be switched to any of SALTO’s technology platforms at any time without changing the hardware. This allows businesses to decide which technology fits better with their security, operations and IT needs. Featuring SALTO SVN-Flex and JustIN Mobile technology The SALTO Neo Cylinder adds SALTO SVN-Flex technology, which increases the potential, efficiency and reliability of the SALTO SVN, yielding better security, control and convenience for users and sites. SALTO JustIN Mobile technology is onboard every cylinder. This gives users and system administrators the capability to send or receive a mobile key to open any door or gate with an installed SALTO Neo Cylinder with their iOS or Android Bluetooth or NFC-enabled smartphone. SPACE data-on-card on-premise management software This adds incredible convenience and efficiency for end-users in the field which is where a SALTO Neo Cylinder would most likely be used. JustIN mobile app capability also complements usage of SALTO’s other management platforms, such as SALTO SPACE data-on-card on-premise management software or the SALTO KS cloud solution. For any building, function or model, SALTO offers the perfect electronic cylinder to fit any door. Available in the beginning of July of 2020, the SALTO Neo cylinder delivers an easy-to-use electronic locking platform that integrates all physical security needs through smart, wireless and battery-operated smart cylinders, providing all the latest user access information for virtually all of the doors in a facility.

SALTO And BioCote Develop Anti-Microbial Protection For Door Handles And Locks
SALTO And BioCote Develop Anti-Microbial Protection For Door Handles And Locks

In the new normal, differently and hygiene is something that will play a greater part in one's lives. That’s why SALTO Systems, in partnership with BioCote® the anti-microbial technology supplier, has since 2011 incorporated anti-microbial silver ion technology in the electronic smart lock range, electronic cylinders, locker locks, and supporting devices such as wall readers. The addition of BioCote’s anti-microbial technology helps reduce microbes on door handles and improves hygiene in buildings creating a cleaner, more hygienic environment for both users and visitors. “The more hygienic the handle set, the less chance of cross-contamination. This helps to reduce the spread of microbes around a building as microbes are not transferred from door to door and surface to surface,” comments Aznar Sethna, CSMO SALTO Systems. “We have long seen and offered the benefit of having BioCote® added to our electronic lock products to contribute to customers’ existing cleaning and hygiene regimes.” Silver-ion technology for anti-microbial protection BioCote® has successfully tested against a feline strain of coronavirus, showing a reduction of 90% in two hours, which is a positive indicator of the antiviral properties of their technology. Previous testing has revealed that BioCote® delivers 99.9 percent, 24/7 protection against an array of microbes including Influenza A H1N1, E.coli, Salmonella, and antibiotic-resistant CRE, VRE, and MRSA. BioCote® cannot be wiped or worn away and thus enhances hygiene management and reduces the possibility of cross-contamination. SALTO BioCote® anti-microbial protection consists of silver-ion technology which is integrated during the manufacturing process. SALTO added BioCote® as a standard additive for all the plastic devices it produces as well as with the new XS4 Locker Lock BLE. SALTO also offers BioCote® as an option on its complete line of electronic locks and online wall readers. Lasting hygienic protection from BioCote®-treated hardware The finish is long-lasting and maintains its anti-microbial performance over the expected lifetime of the products "Our findings continue to show the positive impact of having anti-microbial coatings on our smart-locking product range with regards to reducing levels of bacterial contamination. BioCote® silver ion technology significantly reduces the level of microbes on SALTO escutcheons and door handles by up to 99.99 percent which is an incredible achievement,” says Sethna. The finish of BioCote®-treated smart door lock hardware differs slightly from that of standard-finish escutcheons due to the mix of lacquer and silver ion particles. On wall readers, locker locks, and lock readers, it's invisible. The finish is long-lasting and maintains its anti-microbial performance over the expected lifetime of the products. Integrated and lasting hygienic protection Current government guidelines recommend regular cleaning to minimize the spread of microbes in all types of building. However, beyond regular cleaning, little consideration has been given to alternate or non-traditional methods for limiting the potential for cross-contamination within a public environment. By effectively reducing a broad spectrum of microbes by up to 99.9 percent, BioCote® anti-microbial technology provides integrated and lasting hygienic protection that supports regular cleaning regimes and hand hygiene. “SALTO has been an innovative leader in electronic access control technology for two decades and we are just as proud to have been equally as advanced when it comes to the hygienic properties of our products with a leading partner like BioCote®,” said Sethna.

Related white papers

RFID and Smartphone Readers in Physical Access Control

3 Reasons To Migrate To A New Access Control System

Mobile Access- What You Need To Know (Part 1)