Pages

Monday, November 1, 2021

2021 is a big year for Mobile Credentials

2021 is a big year for Mobile Credentials 

Modern electronic access control systems, whether on-premise or cloud-hosted, offer a variety of ways to authenticate users and grant them access to a space. Credentials are typically classified into a few categories, something you have, something you know, something you are, or any combination of these categories (multi-factor).

Keep reading to learn about four of the most common types of access control credentials and how they can help you manage your space more effectively.

In access control and identity management, authentication is done via three factors, namely what you have (keyfobs and access control cards), what you know (passwords) and what you are (biometrics).

Needless to say, more and more people are now using their smartphones to open doors. And 2020-21 is likely to be a big year for mobile credentials, whose market size and deployment are expected to reach a new height.

In terms of the “what you have” factor, regular and smart cards have been in use for a long time, whereby the user either taps the card on the reader or bring the card close to it. Yet more and more, mobile credentials, or user credentials stored in the user’s mobile phone which can then interact with the reader, have become a more popular concept and are increasingly deployed in certain end user entities such as offices, college dorms and hotels.

1. RFID

Historically, the most common credential is RFID technology using some sort of card or fob (something you have). These RFID options can range from basic proximity cards and fobs to more advanced and secure smart cards that use integrated circuit chips embedded into the card itself to provide encrypted communication with the access control readers. Not all access control cards are secure as some can be easily sniffed and cloned. Access control cards can also easily be lost or stolen, which can create a vulnerability.

2. PIN Codes

PIN codes are also a popular method where a PIN code (something you know) is assigned to a user and then used as their credential to access a space. With PIN codes, a user walks up to the keypad on a door and types in a numerical code assigned to them to authenticate and gain access to a space. PIN codes do have some drawbacks as well. PIN codes are often shared, creating a security risk. In addition, PIN codes can be cumbersome to administer and maintain.

3. Biometric

Biometric credentials have grown in popularity over the past several years and can include multiple biometric features (something you are). There are biometric devices that can scan fingerprints, retinas, or the palms of your hand to authenticate you and grant or deny access. Another biometric option is facial scanning where a device can scan a face to determine facial features that can be turned into a hash that can then be used as a credential. Biometric readers have come a long way and can offer a high level of security, but in order for biometric readers to work effectively and efficiently, they need to be installed in the right location and in the right environmental conditions.

4. Mobile Credentials

Perhaps one of the fastest-growing credentials lately is mobile credentials. Mobile credentials allow users to have a credential stored on their mobile devices, usually in the form of a mobile app, that they can use to gain access to spaces providing those spaces have compatible hardware. As a user approaches a reader, they can make an unlock request using a button on their phone or even a gesture, to gain access. Mobile credentials also have the advantage of providing multi-factor authentication easily by leveraging the built-in PIN code functionality or biometric readers of the mobile device for additional security. A system administrator can require that in addition to the mobile credential a user needs to provide either a PIN code and/or a fingerprint/facial recognition, whichever method the mobile device supports. Mobile credentials have grown in popularity so much because just about everyone has a mobile device with them at all times, and they are easy to administer compared to managing RFID cards or PIN codes.

In fact, 2020 is set to be a big year for mobile credentials as suggested by various stats and figures. Gartner, for example, has predicted that in 2020, 20 percent of organizations will use smartphones in place of traditional physical access cards, compared to just 5 percent back in 2016.


Growth drivers

That the mobile credential trend is picking up is quite understandable due to their various benefits, among them the convenience factor. Whereas the user may forget to bring their keycard, they are less likely to forget to bring their smart device. Further, compared to keycards, smartphones are less likely to be lost as users attach greater importance to them. On a related note, since chances are the user already has a mobile device, the end user entity does not have to spend extra cost to make cards for their staff.

Besides those benefits, wider technology availability will drive growth as well. “When they first appeared about 10 years ago, mobile credentials used near-field communication (NFC). Since Apple never provided API access to its NFC capabilities, adoption was limited, because the technology was only available to Android users. Today’s mobile credentials use Bluetooth, which is supported by all smartphone manufacturers and many wearables, such as smartwatches, and is therefore available to virtually everyone with a smart device. Bluetooth also ups the convenience factor since Bluetooth readers allow users to open doors without even taking their phones out of their pockets. If your customer uses a cloud-based access control system, mobile devices can communicate directly with the cloud via Wi-Fi or cellular.
 
Meanwhile, compared to cards, which can be duplicated or cloned, the mobile device has more security features. The biometric function that unlocks the phone in and of itself is a security feature that prevents misuse by others in the even the phone is lost. Meanwhile, the latest technologies also enable communications to be safer between the phone and the reader.
 
Finally, mobile credentials have the “wow” factor. “Everyone loves new gadgets, especially ones that make their lives easier. Mobile credentials are no exception. Our salespeople tell stories of closing deals as soon as they show prospective customers that they can unlock their doors with their smartphone. Property managers have begun listing mobile credentials as one of their high-tech amenities to attract new residents. Users of mobile credential apps write glowing reviews about convenience.

Still not sure which access control credential solution is right for you? We’re here to help.

The goal is no longer just limiting access to a particular space but rather managing that space effectively.

Modern electronic access control systems offer a wide variety of features to allow you to better manage business spaces and to protect your business and your brand.

Working with a qualified security sales consultant will ensure you are not installing old technology into a new installation. There is an access control solution available that is convenient, secure, and works for your user’s technology level. You can touch with SSA Integrate to get proper way, what actual is required for your premises. They are solution service provider for SUPREMA, Magnetic FAAC & certified for Honeywell Winpak Access Control.


6 comments:

  1. It’s nice to be here. I have gone through the entire article and it’s very helpful.

    ReplyDelete
  2. The desire for mobile access control is only growing, and manufacturers are working hard to create innovative, robust solutions. While there are a few challenges that exist with the transition to mobile access control, the benefits outweigh the challenges. Typically, mobile access control is recognized as a safer, more convenient, and more reliable option when compared to normal card-reader-managed access control solutions. So, what's the problem? When an organisation decides to transition to a mobile access system, the problem often occurs when attempting to force the old system to integrate with the new without making the proper updates. Select a mobile access control system that is fully designed to be a mobile access system. Access control ultimately authenticates the users by recognizing a card or tag, a PIN, or utilises biometrics. A smartphone already houses these options, and the users often already have a 2-factor verification set in place.

    ReplyDelete
  3. Many mobile access credential solutions require the use of back-end portals. For hackers, portals can be rich targets, often containing sensitive end-user data. These types of mobile solutions so often force the users to register themselves, and sometimes their integrators, for every application. Each registration requires the disclosure of sensitive personal information. Bookkeeping alone can be confusing. Farpointe's Conekt distributes credentials with features that allow the user to register their handset only once and need no portal accounts, activation features, or renewal fees. Secondly, OSDP Verified equipment ensures that security equipment such as card and biometric readers from one company interface easily with control panels and equipment from another manufacturer, fostering interoperability among security devices. Customers’ new equipment will provide bi-directional communications between the access control panel and the reader. It will also make standard the option for powerful encryption in support of advanced security applications.

    Scott Lindley
    Farpointe Data

    ReplyDelete
  4. They will be able to help you find the right property to suit your needs.Your Agent should be able to understand the specific needs of you and your family. Get more interesting details about estate agent in docklands check this site.

    ReplyDelete