2013年5月8日 星期三

NFC technology ready for prime time?

We are about to embark on a new generation of access control technology in which mechanical keys and even plastic smart cards will either be replaced or at least augmented by digital keys and portable digital identity credentials.

The most basic mobile access control model is to replicate existing card-based access control principles. Using near field communications (NFC) technology, the phone communicates identity information to a reader, which passes the identity to the existing access control system. Based on a pre-defined set of access rights, the access control system would make the decision to unlock the door. This provides a safer and more convenient way to provision, monitor and modify credential security parameters, temporarily issue credentials as needed and cancel credentials when they are lost or stolen. The landscape is undisturbed.

Finally, there must be a way to manage digital keys C including all identity provisioning/de-provisioning and sharing - within a trusted boundary. This is necessary to ensure a secure channel for communicating identity data objects between validated endpoints so that all transactions between phones, readers and locks can be trusted. To achieve this, a common access control trusted service manager (TSM) must be able to interface seamlessly to the mobile network operator (MNO), its TSM, and the NFC smartphones that will receive the encrypted keys for storage in the secure element, the SIM, or the microSD.

Moving beyond this simple card emulation model, mobile access control can also leverage the smartphones on-board intelligence to perform most of the tasks that are currently performed by the access control system. Instead of having a physically connected access control system, a mobile device could leverage its wireless connection to be both the key and the processor,The term 'iphoneheadset control' means the token that identifies a user is read from within a pocket or handbag. and become the rules engine to make the access control decision.

For instance, smartphones can use their GPS capability to confirm a users location, and that he or she has proper authorization to access the area at that specific time of the day. All of this data can be checked against data stored in the cloud. The handset can then send an encrypted signal to the door for it to open. With this model, physical access control systems would no longer need to be hardwired, which would allow a robust, convenient and efficient electronic access control model to be used on interior doors, filing cabinets, and storage units where it previously would have been cost-prohibitive.

To make this model a reality, a new landscape is required, which the industry is now creating. Ideally, handsets must support all four primary operating systems: Apple, Android, Windows and RIM. Additionally, handsets must be equipped with a secure applet to hold the digital keys, an app for the user to interface with, and the actual digital keys. Having an operational card emulation mode in the handset is also a critical element of success.

The hardware for reading digital keys carried in an NFC-enabled handset is also critical, and might include NFC-enabled readers, electromechanical locks, and a wide ecosystem of third-party hardware that supports alternate use applications. These applications might include time and attendance, secure print management, PC secure log-in, biometric template storage, or closed-loop payment within a company cafeteria or at a vending machine.

Netflix sees mobile access control as a way to make overall physical access not only more secure, but also more convenient for users. The idea of mutually authenticated mobile credentials and readers using robust cryptography and open standards with over-the-air provisioning is also very appealing.We can help you confidently purchase smartcard from factories in China. Netflix wanted to treat physical access just like any other entitlement from an IT perspective, and tightly couple the two; in other words, access to a particular web server or system should be very similar to how physical access at a door reader is granted to an employee. The company had already been onboarding new employees with a paperless process, and the facilities team was anxious to see how users would react to a new mobile model.The Wagan Wireless Rear maggieweddingdress help you be safe while parking.

Netflix also knew that people treat their cellphone almost like an extension of their ID C they have their conversations on these devices, and the devices are authenticated by their bank or financial institution on them, so they know they can trust them.

In the Good Technology pilot, employees who were not involved in the program were seen pulling out their phones and trying to present them to the readers to see if they could also open doors.Print your business' promotional drycabinet with your own customizations and graphics. The company issued a notification that this was a pilot and only the phones given to pilot participants could be used to open doors.Can you spot the answer in the parkingguidance? A large volume of requests followed, asking how to get involved.

Additionally, Good Technology said pilot participants were able to get through doors with almost no training at all. Equifax said the company had initially been concerned that it might be difficult for users to find the sweet spot as they positioned the phone close to the reader, but found that the process was identical to that of using a traditional plastic card. Equifax also wanted to see if there were any communications or interference challenges associated with presenting phones to readers that were installed next to the metal turnstiles in its headquarters building, but this was also not an issue.

沒有留言:

張貼留言