Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

Rumah> Blog> NFC access control prospects can be widely applied and still take time

NFC access control prospects can be widely applied and still take time

April 28, 2022
Xiaobian found that the recent "brushing mobile phone" has become very hot and very common. Supermarket checkout, bus, subway, and card recharge can be easily done with a mobile phone, so that you don't have to stand at the door and check the wallet before going out. With the belt, the bank card is not taken, the card is not brought, just bring a mobile phone and the key is ok, and the source of all this is a technology on the mobile phone, this technology is NFC. I used to talk about the NFC function in the mobile phone. Most people are confused. Because there is no use environment, they have been voted as one of the top ten chicken ribs of the smartphone. In the period when the concept of Internet of Things was widely promoted in 2013, NFC was once considered to be one of the most promising technologies that would quickly occupy the market. Although NFC never came out of sight, it did not enter the original forecast. It’s in full swing. Until the ApplePay business was launched in China last year, after the emergence of SamsungPay and Huawei Pay, NFC returned to the focus of people's attention and once again entered people's lives, trying to change people's lifestyle.
The security industry is faced with such an active technology. Of course, the first thing that should be done is to think about what kind of sparks it can make with the security industry. How does the spark develop into a flame? What are the conditions for success? How long does this process take? To explore these issues, of course, you must first understand the "lifetime" and characteristics of NFC.
NFC is a Bluetooth-like short-range wireless communication technology
NFC (NearField Communication) Chinese is a short-range wireless communication technology, which is a short-range high-frequency radio technology, which is transmitted through the electromagnetic induction coupling of the wireless frequency portion of the spectrum. It is evolved from the integration of non-contact radio frequency identification (RFID) and interoperability technologies, and is backward compatible with RFID. It was first developed by Sony and Philips, and is mainly used for M2M (MachinetoMachine) communication in handheld devices such as mobile phones. Inductive readers, inductive cards and point-to-point functions on a single chip enable identification and data exchange with compatible devices over short distances.
NFC has four main features:
First, the connection is fast. Faster than Bluetooth connectivity Using NFC instead of manual settings speeds up the creation of connections, and automatic connections between NFC devices eliminate the need for manual configuration. With a single click, you can quickly connect to trusted devices.
Second, low energy consumption. Less than one-tenth of a second, the power consumption is lower, and the powerless reading is supported, and the reading can be performed even when the mobile phone is not powered or turned off.
The third is security. Compared to the long-distance communication connection protocol such as Bluetooth or Wi-Fi, NFC is a short-distance (within ten centimeters) communication technology, and the equipment must be close enough to have natural security.
The fourth is privacy. Within the trusted authentication framework, NFC technology provides security for information exchange and data sharing between devices (peer-to-peer).
So, what role does this intimate, secure, and fast communication technology play in the security industry?
There can be a role called NFC access control
The basic applications of NFC technology can be divided into the following four categories:
Contact confirmation. For mobile payments, the user confirms the transaction by entering a password or simply accepting the transaction.
Contact connection. For example, two NFC-built devices are connected to perform point-to-point data transmission, such as downloading music, inter-picture transmission, and synchronous exchange of communication books.
Contact browsing. A built-in NFC device can seamlessly and conveniently browse information stored in another NFC-enabled device.
Contact passed. For access control, tickets and tickets, users only need to carry a mobile device with a ticket or a gated password to access the reading device.
The most closely related to the security industry is the access control system. NFC, which can exchange data between devices within a few centimeters, is a technology suitable for access control systems, fully in line with the ISO standard for managing contactless smart cards. It has become a significant feature of the ideal platform.
At present, the integration of NFC technology and access control system is mainly reflected in hardware and software. In terms of hardware, by upgrading the identification front end of the access control system (ie, the card reader), the NFC chip is required in the read/lock of the access control. When it senses the NFC mobile phone, the NFC chip will release a password to the front end of the access control system. The card device, along with the control of the electronic motor, allows the electronic motor to open or close the door lock; in terms of software, it should also consider making full use of the characteristics of the NFC handheld device, and write the NFC access control command into the mobile phone to realize the air authorization for the access control authority. Mobile phone dial-up door opening, appointment access, access control information query, mobile phone arming and disarming and other functions. The advantage of the NFC-based access control system is that the card holder is more convenient to carry and the information is more secure, and the NFC technology can realize more personalized functions through the mobile phone APP.
Moreover, the non-replicability of NFC access control also adds a lot to its implementation. The system sets each lock to correspond to a unique Hashkey value. Different motor locks have different unlock commands. This value is the initial unlock command. Whenever the user performs an unlock operation, the server and the Arduino development board use the same algorithm to process and transform the initial values, but the Hashkey corresponding to each unlock is also different. Even if an unlocking command is stolen by an illegal user, the illegal user cannot open the motor lock, which greatly improves the security of the system.
In this way, a smarter, more portable way to configure, monitor, and modify credential security parameters is eliminated without the use of a key or smart card, which not only eliminates the risk of the credential being copied, but also temporarily distributes the credential card if necessary. If you lose or stolen, you can cancel the voucher card. In this way, you only need to bring your mobile phone when you go out, and you can leave the key without it.
NFC access control prospects
Different types of access control are suitable for different scenes, and their functions are also different. For example, the access control card is suitable for the entrance control of the general office building; the fingerprint and vein identification access control is suitable for the access control or attendance of the small scene office; the face and iris recognition access control is applicable to the high-level security place, then, which scenes does NFC apply to? What?
Access to office space. In the past, the access control of the office building used cards, and the cards were easy to forget and damage. When the staff was late but was unable to find the card in the bag, life seemed to be “gloomy”; or when there were outsiders, such as applying When customers, customers, decorators, etc. need to enter, they used to collect access cards in the past, which not only wastes valuable time, but also if the cards are not recycled in time, it is likely to bring trouble to the security of the building. With NFC access control, it can not only make up for the inconvenience of access control card, but also solve the problem of foreign visitors. Just send a temporary digital certificate to the visitor when the visitor makes an appointment, set the effective time, and expire automatically. Easily solve the management problem of the visitor access card.
Wisdom community access control. At present, most of the communities in China are enclosed communities. Such communities give people a sense of security. However, some communities have weak awareness of property management services and inadequate security precautions, resulting in frequent cases and even hooded robberies. From this point of view, holding the entrance is the top priority of security, whether it is the community door or the unit door should play its due role. Existing access cards are easy to copy, and their security and privacy are challenged. NFC access control can be qualified for this "work" based on its close-range and privacy advantages.
Smart door lock. From last year to this year, the number of manufacturers and production of smart door locks has soared. The convenience, intelligence and safety are far superior to the mechanical locks. Xiao Bian believes that NFC can also be a kind of smart door lock. NFC is a good option for both home and hotel door locks. The current smart locks are mainly password locks and fingerprint locks, but each has its drawbacks.
Take a password lock, set a 6-digit password, unlocking it takes about three to four seconds, the password input process may be sneaked and leaked, in order to prevent voyeurism, you may need to enter a few more digits to ensure Security, this will take more time; not only the password locks need to install the battery, although the consumption is small, but it will inevitably encounter the embarrassment of forgetting to replace the battery and can not enter the house.
In addition to the fingerprint lock, in addition to the problem of facing the power supply like the password lock, the fingerprint lock still has requirements for the fingerprint, such as the integrity of the fingerprint, the dryness of the finger, and the non-negligible point is that the fingerprint is easy. Copying, its security needs to be improved.
The privacy of NFC without power supply and close-range transmission makes it an absolute advantage for door locks. It is more convenient and safer for use in home door locks. It can not only improve the efficiency of staying but also save costs by using the door locks of the hotel. Before arriving at the hotel, guests with NFC will receive a link with the check-in location and an electronic room key. In this way, guests can save the queue waiting for the stay, go straight to the room, go to the door, just show the phone in front of the door lock to open the door. When you check out, you only need to touch the lobby self-service terminal with your mobile phone, which can save a lot of manual processing time at the front desk, and also save the labor cost of recruiting the front desk and the material cost of making the access card.
From this point of view, NFC access control can basically cover the various fields that the access control can be involved in, and its own unique advantages have created a vast future worthy of its own. But why has it not been able to enter our real life in the face of such a vast world? Why do you often see the brush mobile phone on the bus, brush mobile phone payment does not really see the brush phone open?
It takes time to be widely used
"The ideal is very full, the reality is very skinny" This sentence is probably the current situation of the NFC access control, although Xiaobian mentioned the advantages of so many NFC access control in the above, portraying such a broad market blueprint, but Xiaobian wants to say after the very serious observation of the application status of NFC, the future is very good, but the implementation still takes some time.
For the NFC payment that has already penetrated people's lives, the process of its development has gone through a long time. Since July 2013, Beijing One Card has been able to swipe mobile phones to take the bus. From March 2014, it can be recharged through the built-in NFC-enabled mobile phone, but even after three or four years of development, most people still Use a card to ride, or recharge to the recharge point. Although ApplePay, SamsungPay and Huawei Pay based on NFC have already appeared on mobile phones, based on their strong investment in cost and QR code payment, there are very few people using shops.
The emergence and application of any new technology requires a chain of systems that are adequate to support its operation. NFC payment requires a good NFC chip, requires a hard-quality mobile phone, requires hardware that can be received with the mobile phone, and requires a series of industry standards and system solutions. Similarly, NFC access control needs to gain a foothold in the current development of the biological access control, contact access control, and more needs, such as the popularity of NFC-enabled and stable mobile phones, such as NFC chip companies and The technical docking of access control companies, such as the formulation of industry standards, requires more time to work together in the process of technology and industry integration.
Hubungi Kami

Author:

Ms. Yanjun Chen

Phone/WhatsApp:

+8613602572892

Produk popular
You may also like
Related Categories

E-mel kepada pembekal ini

Subjek:
E-mel:
Mesej:

Your message must be betwwen 20-8000 characters

Rumah

Product

Phone

Tentang kita

Siasatan

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Menghantar