Development and future application trends of access control systems

Development of access control systems

Combined with the development of access control technology and the security of access control systems, the access control industry has experienced several important development stages , including low-frequency card technology and high-frequency card technology, as well as the latest virtual credential card technology.

Low frequency card technology access control system

In the past 15 or 20 years, low frequency cards have been the standard in the security industry, providing efficient and effective access control. This card structure is simple, and anyone who uses these cards can enter the building. Anyone holding a card issued by the company can enter the building; this person can be an employee who owns the card issued by the company or a perpetrator who uses the stolen or lost card to pass the door. In order to increase the security of low-frequency cards, companies add visual security information such as photos to their cards. Employees wear ID/ access cards with their own photos, and security personnel are trained to check who does not have the corresponding authentication information. To provide basic authentication methods. These low frequency cards, often referred to as proximity cards or ID cards, are now easily replicated. Since the criminals can make copies of the low-frequency card through some equipment, they can freely enter and exit the building. Unless there is a surveillance camera in the building or someone witnesses the person entering the building, it is impossible to know that unauthorized personnel have passed the access control, thus giving the access control system Security brings instability.

In the view of security managers, distributors, integrators and equipment manufacturers (OEMs) , HID 's 125 kHz RFID Proxy card and card reader are the industry standard for access control systems at this stage. The HID proximity card is reliable, affordable and seamlessly integrated with the access control system.

Today, HID Prox technology still offers great price/performance and convenience. However, the 125 kHz RFID card technology and card format are not as secure as contactless smart cards, which has led to the development of access control systems to contactless smart card technology.

Non-contact high frequency smart card technology access control system

At present, the networked access control system for non-contact high-frequency smart card technology is widely used in various sectors of society such as government departments, financial institutions, transportation, energy, intelligent communities, factories, hospitals and other fields. By embedding multiple layers of security components in the smart card chip, all the doors are managed by the computer, powerful access control functions and permissions are set, the door is in and out in real time, and the entry and exit records of all the doors are queried. The more doors, the more the settings are. Easy and easy to manage.

At the same time, the access control system can communicate with the computer, and the access control software installed on the computer can be used to set the permissions of the card and query the entry and exit records. Without using the computer, the system can also run normally offline. The software can run the permission and parameter settings, and can monitor the entry and exit of each door in real time, and make statistical attendance reports. Easy to set up, easy to manage, and more secure.

HID Global iCLASS® contactless card technology has become the industry standard for high frequency technology smart cards. In 2002 , HID Global introduced the first generation of iCLASS technology, extending the advantages of proximity cards to a more powerful and versatile platform, which is equally reliable, convenient and cost-effective. At the same time, the platform can be encrypted and verified by data. Provides greater security.

To make the access control system more powerful, HID iCLASS 13.56 MHz contactless smart card technology and read / write fields are interoperable and support a variety of applications, such as biometric authentication, microelectronic payment, and PC secure login. The iCLASS technology platform has been providing reliable service for nearly 10 years, and together with the multi-technology multiCLASS solutions used by HID Global , has become the standard for efficient, secure and efficient access control systems.

Entering the era of NFC

With the evolution of the times, the access control system is moving towards virtualization and mobility. Near
Field Communication (NFC) is a technology for access control systems that enables data exchange between devices within a few centimeters. NFC is also fully compliant with the ISO standard for managing contactless smart cards , which is a significant feature of its ideal platform. By using a NFC- enabled mobile phone to carry a portable identity voucher and then wirelessly reading it from the card reader, the user simply opens the door by presenting the phone in front of the card reader. According to research firm IHS iSuppli predicts that by 2015, manufacturers will support NFC mobile phone factory of about 550 million.

The simplest mode of NFC virtual credential is to copy the access control principle in the current card. The mobile phone passes the identity information to the card reader, which in turn transmits it to the existing access control system and finally opens the door. In this way, a smarter, more portable way to configure, monitor, and modify credential security parameters is eliminated without the use of a key or smart card, which not only eliminates the risk of the credential being copied, but also temporarily distributes the credential card if necessary. If you lose or stolen, you can cancel the voucher card. HID Global 's iCLASS SIO technology-enabled (SE) platform is the first to provide and manage security certifications by introducing technology-independent Secure Identity Object (SIO) virtual credentials. Virtual credentials containing identity information can be embedded in a variety of portable devices, including NFC smartphones, microprocessor-based SmartMX cards, enabling access control technology to break through traditional card and reader modes, with virtual credentials The card uses the mobile phone as an access card. As a result, the access control technology used in the past few decades can now be embedded in mobile devices such as mobile phones. When the door is opened, we no longer need keys and cards, just put the mobile phone with NFC function and built-in virtual credential card. The door can be opened before the card is used.

The advantage of iCLASS SE virtual credential card technology is its portability, which ensures the security of the system.

The SIO Virtual Credential Card provides additional diversified keying, authentication and encryption and encryption capabilities for data to prevent security breaches. This security feature of SIO binds data to specific devices based on the unique characteristics of the device, preventing SIO from being copied to another device, thus preventing copy card intrusion in various places. The SIO Virtual Credentials Card operates within HID Global 's Trusted Identity Platform® ( TIPTM ) framework, which establishes a secure and trusted boundary for secure key delivery in SIO- based access control applications. The TIP framework provides a convenient way to securely configure SIO virtual credentials on various platforms such as mobile devices . No matter where the user is or what network connection is used, there is no problem.

In addition, SIO technology supports remote configuration and management. For example, the SIO mode provides secure remote management. If the user's mobile phone is lost, these management functions can be used to securely and conveniently configure, monitor, and modify the security parameters of the virtual credential card, thereby eliminating the possibility of copying the virtual credential card and temporarily issuing new ones. Virtual credentials card and abolished lost or stolen virtual credentials.

The development status of mobile access control

According to a survey by market research firm Research and Markets in 2012 , North American and European NFC chips account for more than 60 % of the total market , while Asia Pacific has the fastest growth, especially in Japan, China and South Korea. NFC applications are attracting more and more people as the market grows. The report also said, NFC application brought by market revenue expected to grow from US $ 7.686 billion in 2011 increased to 3.4515 trillion US dollars in 2016, a CAGR of 35%, which is mainly revenue from electronic payment, followed by including ticketing And access control business.

Despite the promising prospects of the NFC application market, there are several conditions that must be met to develop mobile access control for Near Field Communication (NFC) and other applications:

l   First, you need a mobile device with NFC capabilities. For higher market usage, these mobile devices must support four main operating systems: iOS , Android , Windows, and RIM (Blackberry).   In addition, we must be able to communicate wirelessly with mobile devices.   We need to provide three configurations for mobile devices: (1) a secure applet to hold a virtual credential; (2) a data interaction application; and (3) a virtual credential.   Configuring a virtual certificate card model that can be run on a mobile device is also a key element of success.

l   Second, you need to configure the hardware that can read the virtual credential card from an NFC- enabled mobile device.   Such hardware can include NFC- enabled readers, electromechanical locks, and third-party hardware ecosystems that support different applications, such as attendance, secure print management, PC secure login, storage biometric templates, or corporate restaurants. Or electronic payment for vending machines.

l   Finally, an ecosystem must be developed that includes mobile network operators, trusted service managers, and other operators that provide and manage mobile credential cards.

At present, the market has begun to develop in the above aspects and promote the application of NFC . On the hardware, the main mobile operating systems, including iOS , Android , Windows and RIM (Blackberry) are advancing the widespread use of NFC technology, and began to launch NFC- enabled mobile phones. At the same time, the industry has extensively cooperated to embed virtual credential card technology into NFC chips to accelerate the application of NFC technology. HID Global and NXP Semiconductors jointly launched a global mobile NFC mobile access control solution. HID stores the virtual voucher card in the NXP Embedded Secure Element ( eSE ) component in the phone, which is compatible with the widely used access control readers and systems. NXP's technology supports multiple application management, such as payment, e-government, access control and ticketing, and all application management is done through a microcontroller.

At the application level, major domestic telecom operators have implemented projects using NFC or similar NFC technologies in some large cities , such as RF- SIM Or MicroSD technology, enabling users to pay by mobile phone, buy food and beverages, and take public transportation. Major telecom operators, terminal manufacturers CUP and also from the beginning of this year to compete for the full NFC market, China Unicom UnionPay jointly launched the first NFC phone in November 2012, China Mobile plans in February 2013 to launch NFC services in 12 provinces. The participation of operators will accelerate the formation of an ecosystem of NFC technology applications, and expand NFC mobile phones to mobile access control, electronic payment, ticketing, network login and other applications.

Future application

Combined with NFC technology and virtual credential cards, it will provide an ideal platform for emerging applications, such as electric vehicle charging stations. The driver can park the car in front of the charging meter and use NFC phones for access and payment services. Personal health records are also accessible using an NFC phone. Patients can present their mobile phone at the hospital to provide personal information without having to fill out a form, and during the emergency medical treatment, the same information can be provided to the caregiver by accessing the voucher card. Another emerging application is the use of smart posters for micro-marketing. Consumers can use the NFC phone to read the label on the poster, after which the phone navigates to a specific web page with more information.

At the same time, virtual credential card technology can achieve the integration of access control and computer desktop login. Our technology enables smartphones to receive virtual cards and information from service providers over the Internet or over the air, and to read smartphones with virtual credential cards in front of iCLASS SE readers. These phones also generate a one-time One Time Password ( OTP ) to securely log in to another mobile device or desktop computer and access the network. In addition, advances in back-end convergence technology will provide powerful authentication and card management capabilities for computer and network logins, ensuring identity information on both plastic cards and smartphones.

As users increasingly expect to use one -time password tokens or key fobs, they can open doors, log on to the network, access applications and other systems, and securely remotely access the network with a single credential. . The use of a single credential is more convenient and enables strong authentication of critical systems and applications across the entire IT infrastructure, thus greatly improving security. This approach enables organizations to leverage existing credential card investments, increase computer desktop network logins, and create a fully interoperable, multi-layered security solution for enterprise networks, systems and facilities, reducing deployment and operational expenses. Convergence resolutions also help companies meet regulatory requirements, enforce consistent policies, achieve consistent audit records across the enterprise, and reduce costs through consolidation tasks.

TRICALCIUM PHOPSHATE, Product Characteristics: White crystal or amorphous powder, slightly soluble in water, soluble in dilute hydrochloric acid and nitric acid, insoluble in ethanol and acetone. Coarse its products more applicable to the preparation hens, ducks feed, concentrate feed and premix.Other Name:Calcium Phosphate HYDROXIDE;CALCIUM PHOSPHATE TRIBASIC;CALCIUM HYDROXIDE PHOSPHATE;CALCIUM HYDROXYAPATITE;BONE ASH;BEEF BONE POWDER;APATITE HAP, MONOCLINIC;HA, BOVINE,BEEF BONE POWDER;BONE ASH;APATITE HAP, MONOCLINIC;CALCIUM PHOSPHATE TRIBASIC;CALCIUM HYDROXIDE PHOSPHATE;CALCIUM HYDROXYAPATITE;DURAPATITE;

Tri Calcium Phosphate (TCP)

Calcium Carbonate Powder,Tricalcium Phosphate Feed Addtives,Tcp White Powder,Tricalcium Phosphate 18%

MIDI FEED BIOTECH LIMITED , http://www.chinabromine.com