SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

LEGIC To Unveil New Service Trusted Service Management (TSM) At Security Essen 2012

icon Add as a preferred source Download PDF version
TSM will offer increased convenience and an immense process optimisation in administering access rights
LEGIC will demonstrate the use of TSM in loading access applications onto NFC telephones

At Security Essen, along with Kaba, LEGIC Identsystems AG, the Swiss expert in core elements for contactless people identification, will demonstrate how access applications and rights can be loaded over a mobile network onto NFC telephones using a TSM.

NFC innovations are currently appearing in the specialized press every day, announcing how mobile telephones can be used as contactless chip cards. What was still an utopian ideal only a few years ago is now leading to increasing numbers of specific projects. Most of these announcements are for payment and electronic ticket applications. At Security Essen, Kaba and LEGIC will show how this new technology can also be used in the field of people identification.

Loading keys, applications and rights onto smartphones

In this context, LEGIC is presenting a new service, so-called Trusted Service Management (TSM). This new LEGIC service will enable end customers and the more than 250 LEGIC partners to load their applications on NFC-enabled mobile telephones. This allows access rights, for example for hotel room authorisations, and/or payment applications, changed or deleted over a mobile network. The new service supports – like the innovative LEGIC advant reader chip family – also third party RF technologies.

LEGIC: an ideal platform for NFC services

Particularly worth highlighting is that LEGIC reader components, and thus a large proportion of the reader infrastructure in the field, have been NFC-enabled for the last five years. The demonstrated LEGIC NFC solution virtualises a card and places all the usual card functions on a secure chip in the telephone. Thus LEGIC technology users will be able, for example, to combine their employee ID cards for several locations on a single handset. For example, using the well-known, user friendly LEGIC plug & play applications, little by little city cards can be expanded to include new NFC services without significant investments. Using NFC telephones doesn’t only make it possible to provide new services, but also to change the data content of individual applications.

Thus LEGIC technology users will be able, for example, to combine their employee ID cards for several locations on a single handset.

Huge increases in administrative efficiency

“Just imagine, a technician is standing at a warehouse entrance and has to get in for an unplanned repair. With just two clicks in the administrative center his smartphone is transformed into a temporary key”, Oliver Burke, LEGIC Vice President Corporate Projects, explained the potential of NFC technology. The result is not only increased convenience but also an immense process optimisation in administering access rights. Burke said: “Major companies presently spend large sums on temporary company ID cards. NFC can reduce this cost to a fraction.” A NFC-based system also increases security: “If a person loses the right to enter a building or specific room, his virtual access card can be withdrawn.”

Close cooperation with MNOs (Mobile Network Operators)

LEGIC is already working with a range of mobile network operators on people identification over NFC. “We are pleased by how positive mobile network operators have been. They see NFC-enabled LEGIC infrastructure as an opportunity to perform access control and other personal identification applications using NFC smartphones in the future,” said Burke.

 Virtual cards increase flexibility

Unlike other solutions, the LEGIC NFC solution doesn’t need any hardware emulation and thus makes it possible for applications and rights to be stored not only on SECURE ELEMENTS (SE) and SD cards, but also to work on any preferred USIM, regardless of the manufacturer. “MNOs are pleased about this and it makes their life far easier,” explains Burke.

Demand for NFC

LEGIC has 150 million cards in over 100,000 installations in operation around the world and the demand from customers and partners to use smartphones as an alternative to cards is growing all the time. In many cases cards and NFC telephones will be used in parallel. On this topic Burke said: “We see it as our purpose to create an ecosystem for our partners and customers, which enables these plans. This ecosystem will continue to grow with the goal that any smartphone be used anywhere as a card or reader. There is still a great deal to do to achieve this goal, but the first steps in this direction and the positive experience we have had with MNOs make us very optimistic.”

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Biometrics
  • Electronic security systems
  • Security access systems
  • Electronic access control
  • Identity management
  • Related links
  • Security Essen 2012
  • Kaba Access control systems & kits
  • LEGIC Access control systems & kits
  • Kaba Access control readers
  • LEGIC Access control readers
  • LEGIC Access control cards/ tags/ fobs
  • Related categories
  • Access control systems & kits
  • Access control readers
  • Access control cards/ tags/ fobs
Related white papers
One System, One Card

One System, One Card

Download
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Modernizing Access Control

Modernizing Access Control

Download
Related articles
TDSi Becomes TDSi By Hirsch In 2026

TDSi Becomes TDSi By Hirsch In 2026

AI-Driven Security: HiveWatch's New Leadership

AI-Driven Security: HiveWatch's New Leadership

Securitas Acquires Sonitrol Ft. Lauderdale & Level 5

Securitas Acquires Sonitrol Ft. Lauderdale & Level 5

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Events news

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec