Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

Rumah> Blog> Access Control Recognition New Development NFC Technology Contribution

Access Control Recognition New Development NFC Technology Contribution

November 18, 2022
New Developments in Access Control Recognition A UK company that specializes in access control R&D and system integration has issued a report that indicates the key development direction of the global access control access market in 2013. Among them, NFC technology derived from RFID has become one of the focuses of attention. Today, smart mobile devices have been interconnected with security products that support face recognition. In the area of ​​access control, NFC has contributed.

45% of application developers will adopt NFC technology in the coming year

Although the Apple iPhone 5 did not join the NFC function, companies such as BlackBerry and Samsung have already joined the ranks of NFC. Thirty-one percent of application developers have now added this technology to their products, and 45% of new participants will join in the coming year.

In fact, Evans data research shows that developers are more interested in NFC technology than voice recognition and device matching technology. Security and access are two well-known NFC applications, such as key cards and boarding passes. Social media and business are also important factors in promoting NFC development.

Evans Garvin, CEO of Evans, said: "NFC is a revolutionary step in the development of mobile computing technology. It is clear that it will change our daily lives, such as unlocking, boarding or shopping, etc." "But developers also plan to apply these technologies Game, measurement, and connectivity applications, vehicles, or other devices. It can be said how big a developer's heart is and how big the NFC stage is."

Access control into the era of NFC

After more than 20 years of development, the access control system has surpassed the simple doorway and key management of the past and developed into a complete access management system. Through the computer system, when and where to release certain people, when and where to reject certain people, when to send out alarm signals and save access records, the access control system can achieve the purpose of security prevention and timely alarm linkage, and it is safe in the working environment. To play an important role in improving corporate management efficiency. In the future course of development, access control system applications will become more popular.

Access control systems are moving toward virtualization and mobility. Near Field Communication (NFC) is a technology suitable for access control systems. This standard for short-range wireless communication enables data exchange between devices within a few centimeters. NFC also fully complies with the ISO standard for managing contactless smart cards, which is a significant feature of its ability to become an ideal platform. By using a mobile phone equipped with an NFC technology to carry a portable ID card and then reading it wirelessly by a card reader, the user can show the phone in front of the card reader to open the door. According to research firm IHSiSuppli, in 2015, manufacturers will ship around 550 million NFC-enabled mobile phones.

The simplest mode of NFC virtual credential card is to copy the access control principle in the current card. The mobile phone passes the identity information to the reader, which in turn sends it to the existing access control system and finally opens the door. In this way, without using a key or smart card, a safer, more portable way to configure, monitor, and modify credential security parameters is eliminated, eliminating the risk of the credential being copied and temporarily distributing the credential if necessary. If lost or stolen, you can cancel the card. HIDGlobal's iCLASSSIO technology-enabled (SE) platform is the first to provide and manage security certifications through the introduction of a technology-independent SecureIdentityObject (SIO) virtual credential card. Virtual credentials cards containing identity information can be embedded in a variety of portable devices, including NFC smartphones, microprocessor-based SmartMX cards, enabling access control technology applications beyond the traditional card and reader modes, with virtual credentials The card uses the phone as an access card. As a result, the access control technology used in the past decades can now be embedded in mobile devices such as mobile phones. When we open the door, we no longer need keys and cards. We only need to read mobile phones with NFC capabilities and built-in virtual credentials cards. Before the card reader, you can open the access control.

Access NFC Future Development

Making full use of the powerful features of smartphones can significantly reduce the opportunities for deploying access control applications. Modern smartphones have embedded smart chip features comparable to today's typical access control systems and can be used to perform most tasks that would otherwise be performed by a reader and server or control panel.

Card readers and locks manufactured without the need for important intelligence or connectivity features. NFC mobile phones can verify personally identifiable information and any other relevant rules (such as whether an access request is within the allowable time period, or whether the visitor is allowed to stand in the doorway using the mobile phone GPS function) and then use encrypted secure communication to send a trusted message to the corresponding door , to achieve access control. Reader for encryption do is interpreted command door - or a card reader is not connected to the lock to become cost encrypted door control panel switch or server, thereby significantly reducing or lock reader.

In addition, NFC smartphones can also store necessary access rules and processing functions and send trusted commands to lower-cost, connectionless NFC readers to unlock the door. We believe that the future can be applied to interior doors, filing cabinets, and storage cabinets storing valuable or controlled items (such as painkillers, etc.) to deploy affordable but equally powerful access systems.

In addition to lowering the cost of access control and creating new market opportunities, virtual credentials cards have also become more secure. Compared to losing the access card, users will lose less mobile phones with a virtual credential card. In addition, using an NFC mobile phone with an embedded credential card, security parameters can also be modified more easily and efficiently.

In traditional applications, to enter the US government building, you need to use two-factor authentication to verify identity. The same is true for Bank ATMs, where the card is the first certificate and the PIN code is the second certificate. With NFC phones, dual-factor authentication can be enabled when necessary (if the threat level increases). With an NFC phone that carries a virtual credential card, it is easy to send a request to the phone (such as requesting the user to enter a 4-digit PIN code on the phone before sending an open message), making multi-factor authentication a real-time managed service.
Hubungi Kami

Author:

Ms. Yanjun Chen

Phone/WhatsApp:

+8613602572892

Produk popular
You may also like
Related Categories

E-mel kepada pembekal ini

Subjek:
E-mel:
Mesej:

Your message must be betwwen 20-8000 characters

Rumah

Product

Phone

Tentang kita

Siasatan

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Menghantar