The prospect and application of NFC technology in access control system

Introduction : In the past few years, we have seen the rapid rise of the security industry, also as a kind of security field-will the development of the access control field be a bit different? About NFC standards, biometrics, wireless, etc. will become the focus of our attention. Although the current application of NFC technology is focused on electronic payment, in the future NFC technology will be further integrated into access control solutions, thereby bringing new development opportunities to the security market.

Over the past few decades, we have used plastic cards to verify identity and other one-card applications, but with the popularity of smart phones, users expect to complete these applications in a more convenient way. The emergence of NFC technology just responds to this demand. NFC technology can realize data exchange within a few centimeters, so as to realize a variety of contactless applications and transactions for NFC-enabled mobile phones, including payment and bus tickets, keys (Access control card), data transmission (including e-commerce card) and browsing network information.

At present, the application of NFC technology is concentrated on electronic payment, but in the future, NFC technology will be further integrated into access control solutions, thereby bringing new development opportunities to the security market. Users only need to configure the virtual credential card into the NFC mobile phone, and they can open the door. This not only saves users the trouble of carrying other access control credential cards, but also the security manager can easily monitor the entry and exit of entrance and exit personnel. At the same time, the NFC-based access control system will create a more convenient and secure trading platform. Not only can the security manager remotely send, change and cancel the virtual credential card, but this platform is built on a standards-based authentication system that can support various authentication nodes (including card readers, cards, NFC-equipped mobile phones, etc.) to register as "Trusted nodes" ensure that they can be safely configured anywhere in the world.

The prospect and application of NFC technology in access control system

Global application and development of NFC technology in the field of access control

With users' increasing mobility, NFC technology is being widely used in many fields including mobile payment and transactions, transportation payment, customer loyalty programs, and network information access. More and more mobile device manufacturers such as Nokia, Samsung (Google), Research in MoTIon (RIM), LG and ZTE are successively launching NFC-enabled mobile phones, which will further promote the application and development of NFC technology in the field of mobile access control .

The Clarion Hotel in Stockholm, Sweden, tried NFC technology for the first time, replacing the hotel room card with an NFC-enabled mobile phone. Clarion Hotel cooperated with HSA Global ’s parent company ASSA ABLOY, Choice Hotels Scandinavia, TeliaSonera, VingCard Elsafe and Giesecke & Devrient, selected some Clarion hotel guests as participants, and provided them with Samsung mobile phones with NFC function and related software. You can use your mobile phone to check in before arriving at the hotel, and the digital room card will be sent to your mobile phone. After arrival, guests can directly check in without queuing up for registration, and hold the mobile phone close to the door lock to open the door. When you leave the room, the door will be automatically locked, and guests can check out directly through their mobile phones.

In addition, HID Global successfully conducted mobile access control trials in enterprises, verifying that employees can open doors with NFC-enabled smartphones without affecting the security of the enterprise. The mobile access control experiment conducted at Netflix's US headquarters proves that there are many advantages of using a smartphone to open the door, and it also improves security. Double verification of the card reader and the credential card reduces the threat of the theft of credential card data and repeated theft, because only the user knows that the mobile phone can be used as a key, and has the password to enter the mobile phone, and knows how to activate the mobile phone Virtual keys, and most people will not lend their mobile phones, which can prevent the virtual credential card from being abused.

At present, the application of NFC technology at home and abroad is still to be developed. To make the technology popular, it must be through extensive cooperation in the industry. HID Global has actively cooperated with NFC device manufacturers, for example, jointly launched a contactless smart card reader platform that supports NFC with Sony in Japan, which is specifically applied to notebook computers and mobile devices, and stores keys through secure components on the platform , To protect the reliability and integrity of identity information storage, by embedding access control functions and near-field wireless communication (NFC) functions in notebook computers and other mobile devices, to achieve mobile device-based access control, computer security login, and air tickets Fee payment, point-of-sale charging and loyalty programs.

HID Global and NXP Semiconductors have jointly launched a universal NFC mobile access control solution for mobile phones. The function of contactless smart cards used by employees to enter company buildings and garages can now be applied to mobile phones that support NFC and store virtual access control credential cards. These virtual credential cards are stored in NXP Embedded Secure Element (eSE) components in mobile phones and are compatible with currently widely used access control card readers and systems. The combination of HID Global's iCLASS SE card reader and NXP's MIFARE DESFire and NFC technology can ensure that the access control management achieves higher interoperability and enables enterprises to accelerate the application of NFC technology.

Identity verification ecosystem guarantees the security of NFC technology applications

In order to ensure the security of NFC technology application, the only way is to provide a complete chain of custody to ensure the secure exchange of identity information between terminals, and to verify all endpoints in the system or network.

HID's Trusted IdenTIty Platform (TIP), as an identity verification system, can provide an identity transmission framework to achieve the delivery of security products and services. It can convert other products such as card readers, laptops, mobile phones equipped with NFC functions into trusted authentication nodes, and they can safely exchange information regardless of their location or connection method. In simple terms, the infrastructure is a central security library that is connected to a secure network and is based on public encryption key management security policies to deliver services to known endpoints such as credential cards, card readers and printers.

Only after the implementation of the TIP node protocol, the endpoint will be enabled, and then recognized by the "security library" and registered as a reliable network member. The endpoint can then communicate with the "security library". Endpoints such as credential cards, card readers and printers communicate with the "security library" through software workflows, and their access and processing rules are strictly controlled by HID Global's "key management policy and specifications"-only certified devices Only then can join the network (unlike any computer can access any website on the Internet), thus forming a hidden and strict authentication mechanism.

TIP messages between endpoints are encrypted using industry-standard encryption methods to facilitate the transmission of secure information in compliance with open security policies. These TIP information packets are protected by two nested symmetric keys, which contain "Secure Identity Object" (SIO) information. Multiple SIOs can be nested into a TIP message to provide various instructions to various devices (such as access cards, smart phones, and computers). If necessary, each device can have different access control characteristics. For example, the simplest SIO is to simulate the voucher program data on the iCLASS card.

After the authentication between the "security library" and the endpoint device is passed, the device is considered "trusted" on the network. Trusted devices no longer need to communicate with the security library and can work independently. In this way, the information transmission between the endpoints (such as credential cards and card readers) is "trusted", and the resulting information transmission (such as opening a door or logging in to the computer) is also considered Because it is "credible".

NFC mobile devices can be supported as TIP endpoints, so they can be programmed with different SIOs to implement analog cards or more complex applications. Not only can they be authorized to pass through the access control system, but also implement complex interpretations by themselves Access control rules.

FTTH Fiber Optic Socket Terminal Box, fiber termination box provides a mini density wall-mounted solution for next generation networks, which aims to provide and manage minimum numbers of fibers in a limited space.

It is normally installed in the way of wall-mounted. Widely used in FTTH access network, telecommunication networks, CATV networks, data communications network, local area networks, indoor and outdoor application.

Mini FTTH terminal box is designed specially for FTTx application, which suits for jointing fibers pigtail and it protects fiber optic splices and helps to share out the connectivity to individual customers. Optical Termination Box is designed to connect raiser/distribution cables to subscriber`s drop cable in FTTx networks. It has 1 input port and 1 output ports on the bottom and it is easy to install on the wall.

Fiber Optic Termination BoxOptic Cable Terminal BoxIndoor Optical Terminal Box


FTTH Fiber Optic Socket Terminal Box

Optical Fiber Terminal Box,Fiber Access Termination Box,Fiber Optic Terminal Box,Fiber Optic Junction Box,Fiber Optic Cable Junction Box

Sijee Optical Communication Technology Co.,Ltd , https://www.sijee-optical.com