2021 is a big year for Mobile Credentials
Modern
electronic access control systems, whether on-premise or
cloud-hosted, offer a variety of ways to authenticate users and grant them
access to a space. Credentials are typically classified into a few categories,
something you have, something you know, something you are, or any combination
of these categories (multi-factor).
Keep
reading to learn about four of the most common types of access control
credentials and how they can help you manage your space more effectively.
In
access control and identity management, authentication is done via three
factors, namely what you have (keyfobs and access control cards), what you know
(passwords) and what you are (biometrics).
Needless
to say, more and more people are now using their smartphones to open
doors. And 2020-21 is likely to be a big year for mobile credentials,
whose market size and deployment are expected to reach a new height.
In terms
of the “what you have” factor, regular and smart cards have been in use for a
long time, whereby the user either taps the card on the reader or
bring the card close to it. Yet more and more, mobile credentials, or user
credentials stored in the user’s mobile phone which can then interact with the
reader, have become a more popular concept and are increasingly deployed in
certain end user entities such as offices, college dorms and hotels.
1. RFID
Historically,
the most common credential is RFID technology using some sort of card or fob
(something you have). These RFID options can range from basic proximity cards
and fobs to more advanced and secure smart cards that use integrated circuit
chips embedded into the card itself to provide encrypted communication with the
access control readers. Not all access control cards are secure as some can be
easily sniffed and cloned. Access control cards can also easily be lost or stolen,
which can create a vulnerability.
2. PIN Codes
PIN
codes are also a popular method where a PIN code (something you know) is
assigned to a user and then used as their credential to access a space. With
PIN codes, a user walks up to the keypad on a door and types in a numerical
code assigned to them to authenticate and gain access to a space. PIN codes do
have some drawbacks as well. PIN codes are often shared, creating a security
risk. In addition, PIN codes can be cumbersome to administer and maintain.
3. Biometric
Biometric
credentials have grown in popularity over the past several years and can
include multiple biometric features (something you are). There are biometric
devices that can scan fingerprints, retinas, or the palms of your hand to
authenticate you and grant or deny access. Another biometric option is facial
scanning where a device can scan a face to determine facial features that can
be turned into a hash that can then be used as a credential. Biometric readers
have come a long way and can offer a high level of security, but in order for
biometric readers to work effectively and efficiently, they need to be
installed in the right location and in the right environmental conditions.
4. Mobile Credentials
Perhaps one of the fastest-growing credentials lately is
mobile credentials. Mobile credentials allow users to have a credential stored
on their mobile devices, usually in the form of a mobile app, that they can use
to gain access to spaces providing those spaces have compatible hardware. As a user
approaches a reader, they can make an unlock request using a button on their
phone or even a gesture, to gain access. Mobile credentials also have the
advantage of providing multi-factor authentication easily by leveraging the
built-in PIN code functionality or biometric readers of the mobile device for
additional security. A system administrator can require that in addition to the
mobile credential a user needs to provide either a PIN code and/or a
fingerprint/facial recognition, whichever method the mobile device supports.
Mobile credentials have grown in popularity so much because just about everyone
has a mobile device with them at all times, and they are easy to administer
compared to managing RFID cards or PIN codes.
In fact, 2020 is set to be a big year for mobile
credentials as suggested by various stats and figures. Gartner, for example,
has predicted that in 2020, 20 percent of organizations will use smartphones in
place of traditional physical access cards, compared to just 5 percent back in
2016.
Growth drivers
That
the mobile credential trend is picking up is quite understandable due to their
various benefits, among them the convenience factor. Whereas the user may
forget to bring their keycard, they are less likely to forget to bring their
smart device. Further, compared to keycards, smartphones are less likely to be
lost as users attach greater importance to them. On a related note, since
chances are the user already has a mobile device, the end user entity does not
have to spend extra cost to make cards for their staff.
Besides
those benefits, wider technology availability will drive growth as well. “When
they first appeared about 10 years ago, mobile credentials used near-field
communication (NFC). Since Apple never provided API access to its NFC
capabilities, adoption was limited, because the technology was only available
to Android users. Today’s mobile credentials use Bluetooth, which is supported
by all smartphone manufacturers and many wearables, such as smartwatches, and
is therefore available to virtually everyone with a smart device. Bluetooth
also ups the convenience factor since Bluetooth readers allow users to open
doors without even taking their phones out of their pockets. If your customer
uses a cloud-based access control system, mobile devices can communicate
directly with the cloud via Wi-Fi or cellular.
Meanwhile, compared to cards, which can be duplicated or cloned, the mobile
device has more security features. The biometric function that unlocks the
phone in and of itself is a security feature that prevents misuse by others in
the even the phone is lost. Meanwhile, the latest technologies also enable
communications to be safer between the phone and the reader.
Finally,
mobile credentials have the “wow” factor. “Everyone loves new gadgets,
especially ones that make their lives easier. Mobile credentials are no
exception. Our salespeople tell stories of closing deals as soon as they show
prospective customers that they can unlock their doors with their smartphone. Property
managers have begun listing mobile credentials as one of their high-tech
amenities to attract new residents. Users of mobile credential apps write glowing
reviews about convenience.
Still not sure which
access control credential solution is right for you? We’re here to help.
The
goal is no longer just limiting access to a particular space but rather
managing that space effectively.
Modern
electronic access control systems offer a wide variety of features to allow you
to better manage business spaces and to protect your business and your brand.
Working
with a qualified security sales consultant will ensure you are not installing
old technology into a new installation. There is an access control
solution available that is convenient, secure, and works for your user’s
technology level. You can touch with SSA Integrate to get proper way, what
actual is required for your premises. They are solution service provider for
SUPREMA, Magnetic FAAC & certified for Honeywell Winpak Access Control.
It’s nice to be here. I have gone through the entire article and it’s very helpful.
ReplyDeleteThe desire for mobile access control is only growing, and manufacturers are working hard to create innovative, robust solutions. While there are a few challenges that exist with the transition to mobile access control, the benefits outweigh the challenges. Typically, mobile access control is recognized as a safer, more convenient, and more reliable option when compared to normal card-reader-managed access control solutions. So, what's the problem? When an organisation decides to transition to a mobile access system, the problem often occurs when attempting to force the old system to integrate with the new without making the proper updates. Select a mobile access control system that is fully designed to be a mobile access system. Access control ultimately authenticates the users by recognizing a card or tag, a PIN, or utilises biometrics. A smartphone already houses these options, and the users often already have a 2-factor verification set in place.
ReplyDeleteMany mobile access credential solutions require the use of back-end portals. For hackers, portals can be rich targets, often containing sensitive end-user data. These types of mobile solutions so often force the users to register themselves, and sometimes their integrators, for every application. Each registration requires the disclosure of sensitive personal information. Bookkeeping alone can be confusing. Farpointe's Conekt distributes credentials with features that allow the user to register their handset only once and need no portal accounts, activation features, or renewal fees. Secondly, OSDP Verified equipment ensures that security equipment such as card and biometric readers from one company interface easily with control panels and equipment from another manufacturer, fostering interoperability among security devices. Customers’ new equipment will provide bi-directional communications between the access control panel and the reader. It will also make standard the option for powerful encryption in support of advanced security applications.
ReplyDeleteScott Lindley
Farpointe Data
They will be able to help you find the right property to suit your needs.Your Agent should be able to understand the specific needs of you and your family. Get more interesting details about estate agent in docklands check this site.
ReplyDelete
ReplyDeleteISR4331-SEC/K9
ReplyDeleteisr4331/k9