Electronic Locks (1,272)
Remote access control from anywhere Built on a cybersecure web platform, the Software House C•CURE 9000 Web-Base client lets you manage personnel and monitor alarms from anywhere in the world on any PC with an internet browser. With an adaptive interface, you get the information that you need when you need it. The C•CURE 9000 Web-Base client allows you to easily perform tasks such as configuring, editing, and viewing personnel records and user credentials, and assigning clearances and roles. Alarm monitoring is also made easy with color-coded bubble images for a visually dynamic user experience. Along with the Event Viewer, manual actions and intrusion zones have been designed to handle core alarm management functions for critical infrastructure projects. Balancing security responsibilities Customize what employees can view based on their roles within an organization using Web Views. This allows you to streamline productivity and balance both responsibility and workload. Corporate security administrators can delegate control to individual department managers allowing them to grant access in the physical areas for which they are responsible. Customization for enhanced user experience With the C•CURE 9000 web-based client, you can dynamically change the appearance of personnel screens, customizing the user interface to show different tabs, columns, and fields based on a user’s role within the organization. Simply drag and drop from a list of more than 100 fields to show only the fields you need to see, streamlining and enhancing the user experience. A responsive layout automatically adjusts and adapts to device screen size and orientation.
Anviz CrossChex is a personnel identity verification, access control and time attendance management system. The system facilitates management of personnel information by biometric technology and helps meet customer's time attendance and access control requirements. CrossChex Cloud is a cloud-based time attendance software and can be used to access data anywhere, anytime, from any browser. You can schedule attendance requirements for a specific employee and create shifts for their work period within one click. During this global pandemic, CrossChex Cloud can work with Anviz biometric time clocks to enable users to check whether their employees are wearing a mask or not, and get timely reports on - employee attendance record, entrance record, and temperature record.
HID Global, the worldwide leader in trusted identity solutions, has announced the most feature-rich implementation of the latest MIFARE DESFire EV3 credential. This new access control credential based on NXP MIFARE DESFire EV3 delivers this technology’s full range of advanced security and privacy capabilities and reinforces them with HID’s powerful model for identity data protection. This HID credential provides AES128 encryption, a secure channel for protecting card data from man-in-the-middle attacks, and a random unique identifier (UID) for protecting user privacy. The credential works with readers based on MIFARE DESFire EV1 and EV2 products and is interoperable with HID® Signo™, iCLASS SE®, and multiCLASS SE® readers. In addition to choosing standard or custom security profiles to meet their specific needs, users can take advantage of HID’s Secure Identity Object™ (SIO®) model that protects a credential’s identity data through key diversification, authentication signatures, and encryption. Users can create multi-technology cards with HID’s credential based on NXP MIFARE DESFire EV3 to provide a smooth migration path from vulnerable legacy, low-frequency 125 kHz-based systems to modern and secure credential technology. What are the benefits of HID Global’s MIFARE DESFire EV3 credential solution? Feature-rich security that offers profile choices to fit your needs Advanced security features that aren’t available elsewhere, such as modern encryption, mutual authentication and secure messaging and SIOs Key management and card formatting that adhere to the highest standards of data protection and governance Click here for more information.
Symmetry Mobile is a web credential application designed to be used with AMAG Technology’s Symmetry Bluetooth readers. Symmetry Mobile is a convenient solution for organizations using mobile devices or in conjunction with physical credentials for users who are transitioning to a mobile system to gain access to secured doors. It works with AMAG’s Symmetry Access Control system, as well as other access control systems, providing a seamless, efficient and cost-effective solution for enterprise users deploying more than one system. The touchless solution supports multi-factor authentication when used with a PIN or biometric (fingerprint or facial recognition) on both Android and Apple iOS devices. Users can type their PIN or use a biometric on their phone, eliminating the need to touch the reader and in support of COVID-19 guidelines. The frictionless setup of a credential eliminates the need to physically interact with the security team. Organizations can centrally issue and manage mobile credentials, photos and devices to their entire user base from a remote location, eliminating the need to buy and carry a physical credential and come into the badge office. The virtual credential in Symmetry Mobile displays a person’s name and photo. An unlimited number of credentials can be stored within their digital wallet, allowing people who need to access multiple sites using different access control systems to use the same mobile device. In an effort to support businesses that required employees to be on-site and ensure the health and safety of the labor force, AMAG developed a customizable health screening questionnaire to help reduce the risk of potentially infected employees from entering a building. Upon successful completion of the questionnaire, an employee’s physical access card or mobile credential will be enabled for a specified period of time, for example, one day. If the form is not completed successfully, the access card will expire and the employee will be denied access to the building. The system will send email notifications to managers for visibility. The questionnaire’s functionality operates independently and can be used on virtually any existing Symmetry Access Control system installation — and without any local infrastructure changes. Symmetry Mobile data is highly secure, as all of the data is encrypted when sent to the reader or stored on the phone, ensuring the mobile solution is completely secure. Users can customize the signal strength and read range on a per device and/or per person basis, increasing security and accommodating those who may need a longer read range, such as a person in a wheelchair, to open a door. Door read and unlock time is less than 1.2 seconds. Symmetry Mobile is available as a hosted or on-premise solution. The app is available in English, Spanish, French and Arabic, and is available now in the Apple App Store and Google Play Store.
Incedo™ Business Cloud access management from ASSA ABLOY Opening Solutions is created for businesses on the move, who need a flexible security solution which grows with them. Now, security managers managing an Incedo Business solution can work remotely too – while maintaining complete control over their building’s access points. Incedo connects security software and hardware within a single, seamless platform. To accommodate the restless change and disruption of modern business life, Incedo enables scaling up or down on demand. And now, the new Incedo Business Cloud management keeps security and facility managers in control of their premises from wherever they happen to be right now. Incedo Business Cloud solves many pressing daily challenges of access management, Managers no longer need to be on-site to handle day-to-day security. It operates securely 24/7 from any PC with an internet connection. Installing the system is easy, with no complex integrations needed. Software updates are regular and automatic, with real-time reports and analytics available with a few clicks.
HID® Signo™ Readers bring today’s organizations into the future of access control. Beyond its sleek, modern design, this cutting-edge reader platform provides flexible, reliable performance with support for an unmatched range of credential technologies. HID Signo extends the leadership position of HID Global in the access control industry while providing unrivaled security and powerful performance with the addition of new features to better fortify facilities and beyond. Upgrading your access control readers to HID Signo ensures convenience and security today while preparing you for whatever comes tomorrow—this is the signature promise of Signo. Key Features Highly Versatile - Support for the widest range of credential technologies, including HID Mobile Access via native Bluetooth and Near Field Communication (NFC) capability. Also features Apple’s Enhanced Contactless Polling (ECP) to support credentials in the Apple Wallet. Unparalleled Performance - Ultra secure storage of cryptographic keys on certified secure element hardware, plus a new surface detection feature that allows the reader to automatically recalibrate and optimize read range performance. Connected to the Future - All readers include out-of-the-box support for Open Supervised Device Protocol (OSDP) for secure bidirectional communication. Each reader is also designed to be connected and managed remotely without “sneakernet” or the need to be physically touched.
With the SMARTair® Openow™ app, security managers enjoy Update-on-Card functionality and a touchless credential handling process. Openow brings online benefits to existing offline devices in a SMARTair access control system, so management tasks are completed more efficiently. Powerful features usually only available in online mode are now enabled for SMARTair offline locks — without any need to fit dedicated wall updaters or communications HUBs. This means no cabling at all; and faster, less invasive installation. Now, every time a user opens a SMARTair door with Openow, the event and entire door history are reported in the SMARTair software, alerting security managers about low battery status, access denied, out of time zone and more. Openow is the convenient mobile solution for SMARTair wireless access control systems. Users store validated digital keys securely in their own Openow app. To open a SMARTair lock, they simply tap their phone against its inbuilt BLE reader. An encrypted Bluetooth connection connects the phone and locking device to quickly approve or deny a unlock request. With Openow, if you have your phone, you are already carrying your keys. Facility managers get through their access management workload faster when they replace traditional card and tag credentials with Openow. Because Openow and the intuitive SMARTair TS1000 software handle everything, virtual keys may be securely deployed over-the-air to anywhere in the world and security managers can easily and quickly update access plans. Delays in issuing or revoking keys for sensitive doors no longer jeopardize site security or business efficiency. There are no physical credentials to handle or track; no card encoders to buy; and no queues at reception for staff or visitors awaiting credentials being issued. The entire credential handling process — for both building users and security managers — is touchless.
With resistance to attack and extreme weather, wire-free installation and battery-powered operation, the new SMARTair i-gate Electronic Padlock is built for use almost anywhere. This new device in the SMARTair wireless access control range enables facility managers to add real-time control to non-electrified gates, cupboards, cabinets, closets, crates and more — wherever they are and whatever the climate. Security and access needs do not stop at the perimeter door. Yet finding reliable locking devices which are easy to operate with an electronic access system can be difficult. Gates and outbuildings are hard to reach with cabling. Access devices may not have the resilience required for operation outdoors. The i-gate meets all these challenges. The SMARTair i-gate padlock is robust enough for almost any climate. It has a watertight cover (IP68 rating) and an internal cylinder with Durability EN 15684 Class 6 Certification. It is battery powered and works with all standard proximity credential technologies, including MIFARE®, DESFire and iCLASS®, as well as Bluetooth Low Energy. Upgrading an existing padlocked closure involves simply swapping the devices and integrating the i-gate Padlock into an existing or new SMARTair wireless access control system. No drilling or wiring is required. Exterior and interior openings previously unsuited to electronic access control can now be controlled and monitored from the SMARTair TS1000 or Web Manager. An i-gate is compatible with any SMARTair system management option, including mobile management via the Openowä app.Add to Compare
Another large survey confirms the growing importance of integration across building security functions. According to the Wireless Access Control Report 2021, “95% [of security professionals] cited system integration [of access control] with other building/security management functions to be ‘somewhat’ or ‘very’ important” for the coming five years. Extensive expertise in the security sector made Plexus’ procurement team aware of this growing need for connectivity across functions — including access control. Plexus managers sought a more flexible access system for their own head office in Swansea, Wales. Alongside integrated control, Plexus prioritized modern access control with lower maintenance costs than their current system, as well as the potential to be operated securely from the cloud. Any new installation should offer the option to further scale — in any direction — in the future. They require a broad choice of wireless and wired door devices and readers for multiple types of opening — and of course a straightforward upgrade path for both hardware and software. ASSA ABLOY Opening Solutions’ Incedo™ Business platform is now running at Plexus. Installing wireless locks, readers and controllers from the broad ASSA ABLOY range was fast and simple, streamlining their switch to Incedo Business. “Hardware architecture is well manufactured, and this goes hand-in-hand with software that has fantastic ease of use,” says Marcus Elphick, Operations Director at Plexus Fire and Security. Coming soon: fully featured cloud management With keyless locking and Incedo Business management software, Plexus managers control exactly who goes where around their offices. They can set times when defined user groups may open specific doors. It keeps staff moving and safe without the hassle of physical keys. The “new software has been seamless, much simpler and [with a] common sense approach to structure,” says Marcus Elphick. Incedo Business software is intuitive to operate from any PC. The entire Incedo platform is fully flexible and modular, allowing Plexus to add more locks or change management software options whenever they need. They are already planning to extend control: remote sites, entrance gates and warehouse access control will be covered, too. “We have been so pleased with the system and its capabilities,” he adds. Plexus aim to quickly upgrade to new Incedo Business Cloud management, which offers them real-time 24/7 access from anywhere, and for a greater number of doors, as they look to expand coverage to more sites. “Incedo’s integrated access control platform already delivers connectivity and convenience,” says Stephanie Ordan, VP Digital and Access Solutions at ASSA ABLOY Opening Solutions EMEA. “Now it delivers in the cloud, too. Incedo keeps premises secure and filters access intelligently, to manage the ever-changing movement of people — from anywhere.” “Your business is not static, and there is no reason why your security should be.” “Incedo’s system management options scale from entry level up to cloud-based administration,” adds Kevin Hoare, Incedo Product Unit Director at ASSA ABLOY Opening Solutions EMEA. “You can manage multiple sites and third-party integrations, including security solutions like CCTV. Scale up and down, add or remove hardware and credentials on demand — or switch system management options — all within your single environment. Migration between local and cloud management is always seamless in any direction, ensuring total flexibility for your business.” Whatever the 2020s bring next, Incedo gives security the flexibility to adapt.
Identification Modes: Face, card, password multiple ways to choose, convenient, flexible and safe to use Attendance Status: User-defined function keys to switch attendance state, meeting multiple identification needs Card: Standard EM, Optional Mifare Open the Door Remotely: Remote opening through network and software management Security: Security incident monitoring and alarm Access Control Interface: Support Relay Output, Wiegand26/34 Input and output, magnetic, etc. Infrared Sensing: Infrared sensor activation U Disk Download: Support U disk, user information record backup And firmware upgrade Multi-language: Support Global Multilingual Display
New generation touchless solution for the people to access control on the entrance or record time attendance and simultaneously check mask-wearing without having to touch a terminal or gate. Built-in IR and visual cameras integrated with Anviz’s unique BioNANO algorithm to produce the best in class live face recognition performance.Equipped with a 5" IPS touch screen. Register up to 10,000 users for dynamic face authentication. Recognition distance up to 1.5 M with matching speed < 0.3s by 1: 10,000. Optional battery backup, specifically designed to work consistently in unstable power supply environments, such as Construction sites,Manufacturing, Schools and buildings in countryside, etc.
FacePass 7 IRT touchless facial recognition and infrared thermal temperature detection terminal is equipped with AI deep learning architecture and infrared live detection technology, which provide 24/7 accurate identification. With the temperature detection module, FacePass 7 IRT allows a detection distance of 0.3~0.5 m with a deviation of ±0.3 °C.
You can work smarter and more sustainably when electronic locks and keys power your security. An electronic locking solution minimizes security risks when keys go missing. With an eCLIQ system from ASSA ABLOY, you can manage everyone’s access from anywhere, at any time — electronically, securely and wirelessly. Based on award-winning CLIQ® access control technology, the eCLIQ system is built around precise locking mechanics and high-end microelectronics. A battery inside each programmable key powers the wide range of programmable cylinders and padlocks — and secures every data transfer. An eCLIQ system is also convenient. Thanks to multiple software options, you manage users’ access rights in a way that suits you best. Authorised key-holders carry a single, battery-powered key programmed with only their cleared access permissions. Low maintenance for technical components you can trust Robust and durable, eCLIQ cylinders are available for a wide range of doors, cabinets, lifts, alarm boxes, machines and entrance gates. Looking after your eCLIQ components is easy: an integrated lubricant reservoir ensures cylinders remain maintenance-free for up to 200,000 cycles. eCLIQ keys are durable, compact, and waterproof (IP67). They are easy to reprogram, enabling temporary and time-limited access permissions for every employee or contractor. AES encryption, rapid processing, and efficient energy management is built into the chip. When a key’s battery runs out, it is easily replaced without tools. Mechanical and encrypted electronic elements work together to make an eCLIQ installation highly resistant to both physical and electronic attack. Easy installation — simple, secure management Managing eCLIQ is straightforward. You can program keys with easy-to-use eCLIQ Manager software: choose between a local software installation or our secure web-based software which manages access rights from anywhere, in the cloud. Security managers can host the Web Manager software on their own or use ASSA ABLOY’s Software as a Service solution. Users can also update their own keys with a range of programming devices, including wall-mounted units. With eCLIQ, missing keys are quickly de-authorised, cutting risks associated with key loss or theft. At any time, facility managers can generate a full audit trail to discover who has accessed which locks. Unlike other electronic access control systems, eCLIQ uses no mains electricity. The microelectronics inside an eCLIQ lock are powered by a standard battery inside every key. Energy-efficient and sustainable, battery power also minimizes disruption when you switch to eCLIQ. Because there is no cabling around the door, you don’t need to schedule invasive, expensive electrical wiring. eCLIQ in action “eCLIQ is more durable, more secure and more efficient than conventional locking systems,” says Stephan Schulz, CLIQ® Product Manager at ASSA ABLOY EMEA. “This evolution of our award-winning CLIQ® technology is already protecting businesses and public services across Europe. A range of sectors and building types — from banks and hospitals to shops and warehouses — have learned eCLIQ provides the control and flexibility their premises need.” For an access control overhaul at University Hospital Frankfurt, managers sought a secure locking system for a new building: 1,100 eCLIQ cylinders and keys provided the solution. Now, with eCLIQ installed, nurses update access rights every morning for the day ahead. This new workflow minimizes security vulnerabilities and keeps everyone safer. Retail banking combines high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs and clearances. Creval’s bank doors across Italy’s Lombardy region are now locked with more than 30 eCLIQ cylinders, putting managers in total control of entrance security. In the unlikely event a key is misplaced, Creval administrators simply delete it from the system. In Germany, eCLIQ locks AMPELMANN GmbH branches and their 2,200 m2 logistics centre, meeting the needs of their decentralized branch organization. Its 8 Berlin branches are staffed by several permanent employees. External service providers like cleaners need access. eCLIQ provides it — safely, securely and without major key-management workload. Learn more at: https://campaigns.assaabloyopeningsolutions.eu/ecliqAdd to Compare
Developed specifically for the hotel market, Aelement allows you to integrate all your physical security needs into one stylish, energy efficient, reliable wire-free system. It enables hoteliers to control the security of their entire building, grant access privileges to individual rooms and gather audit trail data from every door - all without leaving the front desk. And thanks to SALTO's new WiDNA technology, you no longer have to choose between the on-line and off-line world. All Aelement locks are designed to be wireless ready right out of the box, users simply choose whether the functionality is activated or not. All you need to do is choose the mode of operation you want "Wireless on-line" or "Wireless ready". If you choose "Wireless on-line" your locks are on-line and communicate in real time with the server. This gives you real time control over the entire property. If you chose "Wireless ready", your locks communicate with the server daily on differed-time communication mode. Wireless ready locks can be "switched" to real time "Wireless on-line mode" at any time. Just plug in the USB-sized RF communication antenna and you are ready to go. The backbone of the system is a series of gateways and repeaters that act as antennas, collecting and sending information from the computer server directly to the wireless locks. One gateway can manage several electronic locks as well as repeaters, minimizing infrastructure costs and maximizing flexibility. It operates on a 2.4GHz wireless network over an 802.15.4 protocol and works with every popular mainstream RFID technology such as Mifare and Desfire, the latest versions of Mifare Plus and Desfire EV1, as well as with standard low cost hotel guest cards. And thanks to its automated "self healing" capabilities plus SALTO patented SVN™ network redundancy, if Aelement should lose RF connection at any time it will automatically scan for a new connection to an alternative gateway or repeater, restoring communication and maintaining security. All Aelement locks are designed to be wireless ready right out of the box, users simply choose whether the functionality is activated or not Advanced security and convenient access management are its core values enabling simple management of guest cards and doors as well as staff cards and back of house doors in a single system. Aelement features a wide range of advanced and innovative hotel management benefits including instant room move and instant extended stay abilities as well as lost card cancellation, intrusion alarm, door ajar alarm, remote opening, real time audit trail, passage mode activation for meeting rooms and automated low battery reporting.For staff management it can provide on-line staff tracking, real time monitoring, dynamic master key functionality and instant master card cancellation. All master cards are uniquely assigned to the specific individual, and have no limitations to how a locking plan is conceived. The card does not need to belong to a group and you can also centrally authorize any card at random and list doors or zones with no need for grouping. There is also no need to issue and collect staff cards every day. Staff cards can be programmed not to work at night (outside their individual time shift) and can be centrally canceled at will at a moments notice, and changes to the locking schedule can be made on the fly, with no need to manually re-program locks or re-issue cards. But Aelement also has more to offer. Not only is it a secure, easy to use access control system that's packed with technology, it's also a stunning piece of design too. The minimalistic design of its RFID reader looks stylish and discreet on any door. It is available in two contemporary colours, Pearl Black and Ice White, and can be combined with a wide range of designer handles, including a selection from Italian manufacturer Olivari exclusive to SALTO, to make a bold statement that will complement and enhance the interior design of any hotel.Add to Compare
SALTO Systems has launched additional new models to its best selling GEO (Global Electronic Opening) cylinder range. Already one of the most versatile electronic cylinders available on the market, the new models include Swiss profile cylinders, Scandinavian cylinders and cog wheel cam cylinders. These are joined by a new panic function cylinder specially designed to fit panic locks that need a fixed cam position, grips for use in DDA (Disability Discrimination Act) environments enabling anyone with a disability to be able to easily open doors fitted with GEO cylinders and finally a detachable, removable knob version. Modular, flexible and easy to fit, the IP66 rated SALTO GEO can be used in any type of door. Part of SALTO’s innovative 360° wire free locking solution, it is fully compatible with most RFID technologies meaning no more problems with master key management. So whether you want to control a standard door, glass door, aluminum door, steel door, a lift or elevator, a car park, entry to a data center, access to a server rack, the security of a container or anything else SALTO GEO is the answer. And thanks’ to SALTO’s Data-On-Card and wireless real-time on-line technology, users can manage access credentials and add, restrict or delete access privileges on the fly. And GEO’s open architecture means it can also be used to connect to an existing security system to create a fully integrated platform, delivering increased efficiency, cost savings and complete access control flexibility.Add to Compare
The XS4 electronic lock with keypad is a brand new product that provides increased levels of security and control. For doors where extra security may be required, it offers users a choice of multiple security authentication methods to control access including proximity card, combined use of a PIN code + proximity card or a separate keypad code. Designed for use in schools, colleges, universities, student dorms, airports, government buildings, military installations and for use on any doors where an extra layer of security is required, the electronic lock with keypad is the latest addition to the innovative XS4 range. Smart, secure and innovative, it needs no hard wiring and provides a totally wire free networked electronic locking solution with a great range of features. It is also available in a wireless version for online real-time control. The lock can be operated in 3 modes, proximity card only, Pin (Personal Identification Number) code + proximity card or keypad code only. With standard proximity card mode the lock is locked at all times until opened with the users proximity card that has access rights to the room. When using PIN code + card mode each user has their own personal code. Typically this might be used in student dorms, where extra security and dual authentication (presenting both a card and typing in the PIN code) are needed. Users can have up to an 8-digit PIN Code. In keypad code only mode, the lock itself has an access code that is used for user authentication.Every user that goes through that door knows the keypad code. When two users share the same office or room, they are the only ones that know the keypad code of their room. Several calendars can be programmed every day, giving the ability to use passage mode type opening during the day, and dual authentication only at night. The KEYPAD code can be composed of up to 8 digits. Available in European, Scandinavian and ANSI wide body versions in both Mifare/DESfire and HID iClass technologies, the new XS4 electronic lock with keypad can handle up to 64,000 doors and 4,000,000 users per system and store the last 1,000 events in its audit trail memory. And in addition, it can also be fitted with a wide range of handle styles, making it the perfect choice for those doors where additional security verification is needed.Add to Compare
Extensive range of compact sized electronic cylinders designed for doors where fitting an electronic escutcheon is not possible or required. Totally wire-free and networked through SALTO Virtual Network and SALTO Wireless network. Available for mortise and RIM standards, as well as heavy duty deadbolt, padlock, cam lock and server rack (swing handle) solutions.Add to Compare
CyberLock electronic cylinders are manufactured to the exact dimensions of the mechanical lock cylinders they replace. The absence of a conventional keyway means it is not vulnerable to traditional lock picking techniques. The cylinders are powered by CyberKey smart keys and require no power or wiring for installation. Electronic Cylinder Features Installs without power or wiring Contains a unique ID that cannot be changed or duplicated Has the ability to store over a thousand access events Key ID Date & Time Event Type Retains encrypted access codes that bind the lock to a specific system Contains a list of blocked keys Can be installed indoor or outdoorAdd to Compare
Browse Electronic Locks
- Solenoid Bolts
Electronic lock system products updated recently
Most consumers are enjoying the convenience brought by electronic locks. With the existence of electronic locks, people no longer need to be restricted by keys. There are a variety of unlocking methods and more convenient remote control unlocking options. Suppose, you are going on vacation, and with the presence of an electronic lock, you can easily enter your house with your babysitter, without a spare key. Of course, not only smart homes, but also some infrastructure and commercial buildings are enjoying the convenience, brought by electronic locks. Passive electronic lock access control system This article will introduce a smart electronic lock used in the infrastructure industry, named passive electronic lock access control system. In traditional manufacturing, mechanical locks are commonly used in all walks of life, to protect the safety of property and facilities. However, the mechanical lock has caused many practical problems in the long-term application. For example, the keys are duplicated randomly, the unlocking authority cannot be controlled, the user's operation records cannot be known, and the remote control is not possible. Imagine that if you are in a remote telecom base station, it happens that you have the wrong key in your hand and cannot open the front door. In such a situation, this lock, maybe the worst scenario. In some industries, with a wide scope and large working area, more attention must be paid to access control systems Therefore, in some industries, with a wide scope and large working area, more attention must be paid to access control systems. In some outdoor scenarios, such as base stations and electric power cabinets, the requirements for access control systems are quite strict. Due to the particularity of its environment, ordinary power-based access control systems will no longer be applicable. Therefore, the emergence of passive access control systems has solved these problems. Electronic locks offer intelligent management function Based on years of in-depth field research, Vanma has developed the Vanma passive electronic lock access control system, based on the current situation of the industry. This system is different from other electronic lock systems, as it integrates the advantages of both mechanical locks and electronic locks. It not only has the simplicity of mechanical locks, but also has the intelligent management function of electronic locks. The term ‘passive’ of passive electronic locks means that no power is needed. Passive electronic locks have the same appearance as ordinary mechanical locks, so they can be installed anywhere, just like common mechanical locks. They also have a variety of practical functions of electronic locks. Authorized remote access control The Vanma management software allows security managers to assign access rights to specific areas, for different technical personnel. In order to facilitate real-time access control, the electronic key can be used in conjunction with the mobile phone app, in order to send information about its access rights to the technicians, in real time. Vanma management software can provide access to all operations performed by technicians Vanma management software can provide access to all operations performed by technicians, including complete audit reports. Access attempts outside the specified time range or outside the specified area can be obtained through the report, so as to analyze any abnormal situations. Access control in extreme weather conditions In the access control system, the lock (lock cylinder) maintains an extremely high standard and its protection level is IP67, to ensure the greatest degree of protection. Infrared induction technology is used in the electronic key, even if the surface of the lock is wet, the electronic key can also transfer the access authority to the lock cylinder. Ensure stable exchange of information between the key and the lock cylinder. In other words, a poor connection cannot prevent the transmission of information between the key and the lock. At present, this kind of passive electronic lock is widely used in many fields, such as telecom, electric power, water utilities, public utilities, medical emergency and so on in Europe.
Household adoption of smart home systems currently sits at 12.1% and is set to grow to 21.4% by 2025, expanding the market from US$ 78.3 billion to US$ 135 billion, in the same period. Although closely linked to the growth of connectivity technologies, including 5G, tech-savvy consumers are also recognizing the benefits of next-generation security systems, to protect and secure their domestic lives. Biometric technologies are already commonplace in our smartphones, PCs and payment cards, enhancing security without compromising convenience. Consequently, manufacturers and developers are taking note of biometric solutions, as a way of leveling-up their smart home solutions. Biometrics offer enhanced security As with any home, security starts at the front door and the first opportunity for biometrics to make a smart home genius lies within the smart lock. Why? Relying on inconvenient unsecure PINs and codes takes the ‘smart’ out of smart locks. As the number of connected systems in our homes increase, we cannot expect consumers to create, remember and use an ever-expanding list of unique passwords and PINs. Indeed, 60% of consumers feel they have too many to remember and the number can be as high as 85 for all personal and private accounts. Biometric solutions strengthen home access control Biometric solutions have a real opportunity to strengthen the security and convenience of home access control Doing this risks consumers becoming apathetic with security, as 41% of consumers admit to re-using the same password or introducing simple minor variations, increasing the risk of hacks and breaches from weak or stolen passwords. Furthermore, continually updating and refreshing passwords, and PINs is unappealing and inconvenient. Consequently, biometric solutions have a real opportunity to strengthen the security and convenience of home access control. Positives of on-device biometric storage Biometric authentication, such as fingerprint recognition uses personally identifiable information, which is stored securely on-device. By using on-device biometric storage, manufacturers are supporting the 38% of consumers, who are worried about privacy and biometrics, and potentially winning over the 17% of people, who don’t use smart home devices for this very reason. Compared to conventional security, such as passwords, PINs or even keys, which can be spoofed, stolen, forgotten or lost, biometrics is difficult to hack and near impossible to spoof. Consequently, homes secured with biometric smart locks are made safer in a significantly more seamless and convenient way for the user. Biometric smart locks Physical access in our domestic lives doesn’t end at the front door with smart locks. Biometrics has endless opportunities to ease our daily lives, replacing passwords and PINs in all devices. Biometric smart locks provide personalized access control to sensitive and hazardous areas, such as medicine cabinets, kitchen drawers, safes, kitchen appliances and bike locks. They offer effective security with a touch or glance. Multi-tenanted sites, such as apartment blocks and student halls, can also become smarter and more secure. With hundreds of people occupying the same building, maintaining high levels of security is the responsibility for every individual occupant. Biometric smart locks limit entry to authorized tenants and eliminate the impact of lost or stolen keys, and passcodes. Furthermore, there’s no need for costly lock replacements and when people leave the building permanently, their data is easily removed from the device. Authorized building access Like biometric smart locks in general, the benefits extend beyond the front door Like biometric smart locks in general, the benefits extend beyond the front door, but also throughout the entire building, such as washing rooms, mail rooms, bike rooms and community spaces, such as gyms. Different people might have different levels of access to these areas, depending on their contracts, creating an access control headache. But, by having biometric smart locks, security teams can ensure that only authorized people have access to the right combination of rooms and areas. Convenience of biometric access cards Additionally, if building owners have options, the biometric sensors can be integrated into the doors themselves, thereby allowing users to touch the sensor, to unlock the door and enter. Furthermore, the latest technology allows biometric access cards to be used. This embeds the sensor into a contactless keycard, allowing the user to place their thumb on the sensor and tap the card to unlock the door. This may be preferable in circumstances where contactless keycards are already in use and can be upgraded. Smarter and seamless security In tandem with the growth of the smart home ecosystem, biometrics has real potential to enhance our daily lives, by delivering smarter, seamless and more convenient security. Significant innovation has made biometrics access control faster, more accurate and secure. Furthermore, today’s sensors are durable and energy efficient. With the capacity for over 10 million touches and ultra-low power consumption, smart home system developers no longer have to worry about added power demands. As consumers continue to invest in their homes and explore new ways to secure and access them, biometrics offers a golden opportunity for market players, to differentiate and make smart homes even smarter.
Access control and management of trusted identities are the building blocks of security, safety, and site management policies for many businesses and organizations. The current pandemic has compounded this with the introduction of new policies and regulations, particularly around social distancing and contact tracing. Most organizations will have some form of legacy access control in place, ranging from the most simplistic options, such as locks and keys, to technology-based systems. The issue with legacy systems of any type is that risks, just like technology, evolve. What was secure, convenient, and efficient a few years ago is often found wanting as the threat landscape changes. The standards governing the development and testing of physical access control systems (PACS) have also evolved to improve security and product interoperability. An example is the Open Supervised Device Protocol (OSDP), introduced 10 years ago as an alternative to the antiquated and vulnerable Clock-and-Data and Wiegand protocols. However, when it comes to planning infrastructure upgrades or implementing new tools, businesses must carry out due diligence to ensure the solutions are future-proof and deliver the expected level of security. Vulnerabilities and challenges In the early 1980s, Clock-and-Data and Wiegand protocols were widely adopted as the de-facto standard for interoperability between access control readers and physical access controllers. Those de-facto standards were later formalized and adopted into industry standards by the Security Industry Association in the 1990s. Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities There were weaknesses, though, Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities from the reader to the controller. Not only that, but Wiegand delivers limited range options and is operationally inefficient. It is also easy to target via its learnable language and a host of hacking devices available via online sources. Furthermore, the retrofitting installation alongside a legacy system is complicated for integrators and expensive for organizations, as most readers require dedicated home-run wiring. Extensive wiring on a large-scale project, such as a school or corporate campus, results in considerable — often prohibitive — costs for the installation of a PACS. Legacy access control protocol Despite the well-publicized vulnerabilities and weaknesses, Wiegand is still one of the most common protocols in legacy access control, with estimates indicating it is used in more than 90 percent of installed systems. This not only presents issues about physical security but also raises concerns relating to the protection of personal data. Access control systems not only contain information about who can and cannot use certain doors. OSDP is a communication standard Modern systems include a wide range of personal data, ranging from qualifications and certifications of individuals, home contact details, and even medical conditions or HR and employment information. With the potential fines associated with GDPR breaches, companies need to take this concern seriously. These weaknesses pushed the security industry to adopt a new protocol: Open Supervised Device Protocol (OSDP). This access control communications standard was developed by Mercury Security (now part of HID Global) and HID Global in 2008, and donated, free of intellectual property, to the Security Industry Association (SIA) to improve interoperability among access control and security products. Since then, it has been adopted as a standard by SIA, becoming the first secure, bidirectional reader/controller protocol to be governed by a major standards body in the security industry. In 2020 OSDP reached an additional milestone in becoming an International Electrotechnical Commission (IEC) standard. Why implement OSDP as a standard? OSDP is the only protocol that is secure and open for communication between readers and controllers The growth of networked devices, such as video and access control products, has led to an increased demand for converged solutions. Businesses and organizations recognize the value of implementing an integrated solution to enhance security and add value to technology investment. OSDP is the only protocol that is secure and open for communication between readers and controllers and is also being widely adopted by industry-leading reader and controller manufacturers. It is an evolving, ‘living standard,’ making it a safer, more robust, future-proof option for governing physical access control systems. OSDP offers important benefits: 1) Increased security Implementing OSDP standards can increase security, as OSDP with Secure Channel Protocol (SCP) supports AES-128 encryption that is required in U.S. federal government applications. Additionally, OSDP constantly monitors wiring to protect against tampering, removing the guesswork since the encryption and authentication are predefined. 2) Bidirectional communication Early on, communication protocols such as Wiegand were unidirectional, with external card readers sending information one way to a centralized access control platform. OSDP has transformed the ability for information to be collected, shared, and acted upon with the addition of bidirectional communication for configuration, status monitoring, tampering, and malfunction detection, and other valuable functions. In fact, OSDP is the only open, non-proprietary, bidirectional, secure protocol for communication between card reader and physical access controller. 3) Open and interoperable OSDP adds new technology that enhances its ability to protect incoming and outgoing data collection OSDP supports IP communications and point-to-point serial interfaces, enabling customers to flexibly enhance system functionality as needs change and new threats emerge. They also can proactively add new technology that enhances their ability to protect incoming and outgoing data collection through a physical access control system. 4) Reduced installation costs OSDP’s use of two wires (as compared to a potential of 11 wires with Wiegand) allows for multi-drop installation, supervised connections to indicate reader malfunctions, and scalability to connect more field devices. Daisy-chaining accommodates many readers connected to a single controller, eliminating the need to run home-run wiring for each reader, and the use of a four-conductor cable achieves up to 10x longer distances between reader and controller than Wiegand while also powering the reader and sending/receiving data. 5) User friendly OSDP gives credential holders greater ease of use, with audio and visual feedback such as colored lights, audible beeps, and the ability to display alerts on the reader. For security administrators, managing and servicing OSDP-enabled readers also becomes increasingly convenient, as OSDP-enabled readers can be remotely configured from network-connected locations. Users can poll and query readers from a central location, eliminating the cost and time to physically visit and diagnose malfunctioning devices. Unlimited application enhancements OSDP streamlines installations and upgrades while saving organizations the expense of replacing readers OSDP supports advanced smartcard technology applications, including PKI/FICAM and biometrics, and other enhanced authentication protocols used in applications that require Federal Information Processing Standards (FIPS) compliance and interactive terminal capabilities. Audio-visual user feedback mechanisms provide a rich, user-centric access control environment. OSDP offers advantages for users, administrators, and integrators, alike. It adds security and real-world efficiencies, and its interoperability ensures that organizations can use systems from numerous manufacturers as they invest in infrastructure that maximizes the protection of critical data. For our part, HID Global’s range of HID Signo readers is OSDP verified, ensuring they offer the intended interoperability and security for secure bidirectional communication and provide an easy migration from Wiegand devices. In a campus environment, OSDP streamlines installations and upgrades while saving organizations the expense of replacing readers if a new access control solution is implemented. There are also service and maintenance benefits as OSDP encourages continuous monitoring of system uptime and allows for remote configuration of -- or upgrades to -- a reader. Cost savings upon system upgrade Integrators can also capitalize on the introduction of OSDP by encouraging open standards, which can, in turn, help them build new customer relationships and win more projects. Although upgrading to access control systems that adhere to OSDP standards is a significant initiative, the range of benefits outweighs the cost of upgrading. Increased security coupled with business efficiencies adds value for those administering the system and a high level of interoperability ensures users can deploy systems from numerous third-party manufacturers. Integrators who understand the benefits of OSDP can also help their customers support both current and future technology requirements. When a site’s needs change, OSDP offers significant cost savings as the open functionality makes adding new devices easier and reduces the expense of requiring all readers to be replaced if a new solution is installed. Businesses and organizations transitioning to OSDP will also enhance value in terms of operational costs such as servicing and maintenance.
Related white papers
Top 5 Ways to Ensure Visitor Safety and Security
Moving to Mobile: A Guide for Businesses Switching to Mobile Access Control
School Security Moves to the Cloud
12 Questions To Ask Your Access Control ProviderDownload
Extending The Lifespan Of Physical Security Through UnificationDownload
Choosing the Right Storage Technology for Video SurveillanceDownload
exacqVision 21.09 WebinarDownload
- Triton Master Key System From ASSA ABLOY Helps Transform Access Management At Bath NHS Trust
- ASSA ABLOY Provides PULSE Locking Technology To Enhance Security At A Housing Block In Maunula
- Vincennes City Deploys Assa Abloy's Programmable Electronic Keys For Safer, Smarter Access Control Across Its Facilities
- Avolon Selects HID Mobile Access® To Upgrade Headquarter Security