As the times evolved, access cards became more advanced and intelligent. A typical example of today's 13.56 MHz contactless smart card. These cards include tamper-resistant RFID components that are connected to a multi-turn antenna and can be personalized to the cardholder, performing a mutual authentication process when the card reader reads the card. In addition, they can be used in a variety of applications, such as biometric authentication, microelectronic payment, computer desktop login, and more. Such access cards not only securely store our identity information, but also determine whether a particular person can open the door through a storage access rule, and decide whether to allow or deny access between the reader and the central control panel (or server).
Just like any other IT process, our identity information, as well as the encrypted communication and data processing event chain that occurs between the reader and the server or control panel, can be virtualized and migrated to include mobile phones. New platform. In other words, the information in today's smart cards and user identity information can be stored in any electronic device that takes appropriate security measures. For such a virtualized system to be seamlessly integrated into an existing access control system, two prerequisites must be met:
1. The method of transferring data to the access control card reader (equivalent to swiping the card);
2. The mechanism for identity and authentication information in the security management device (ie from configuration to the entire operational process).
Traditional access control technologies can be embedded into smartphones and other mobile devices as long as both of these prerequisites are met.
Entering the NFC era
Near Field Communication (NFC) is a technology for access control systems that enables data exchange between devices within a few centimeters. NFC is also fully compliant with the ISO standard for managing contactless smart cards, which is a significant feature of its ideal platform. By using a NFC-enabled mobile phone to carry a portable identity voucher and then wirelessly reading it from the card reader, the user simply opens the phone by presenting the phone in front of the card reader. According to research firm IHS iSuppli, in 2015, manufacturers will ship about 550 million NFC-enabled handsets.
The simplest mode of an NFC virtual credential is to copy the access control principles in the current card. The mobile phone passes the identity information to the card reader, which in turn transmits it to the existing access control system and finally opens the door. This provides a safer, more portable way to configure, monitor, and modify credential security parameters without the need for a key or smart card, eliminating the risk of voucher being copied, and temporarily distributing credential cards when necessary. If you lose or stolen, you can cancel the voucher card.
The Clarion Hotel Stockholm in Sweden participated in the initial test of the virtual access control application, which ended in June 2011. The hotel partnered with HID Global's parent company Assa Abloy, Choice Hotels Scandinavia, TeliaSonera, VingCard Elsafe and Giesecke & Devrient (G&D) to replace the room key with a digital key that can be sent to your NFC phone.
During the Clarion Hotel trial, guests can use their mobile phone to enter the room. The guests who participated in the test received a Samsung NFC phone with Assa Abloy Mobile Keys software. Before arriving at the hotel, the guest will receive a text message containing the link to the check-in location and the electronic room key. In this way, guests can save the queue waiting for the stay, go straight to the room, go to the door, just show the phone before the door lock to open the door. When you check out, you can simply touch the lobby kiosk with your mobile phone, which saves the manual processing time at the front desk.
A follow-up survey conducted at the Clarion Hotel showed that 60% of respondents said that they saved more than 10 minutes using the digital key solution, while 80% said they would use it if they are currently available. In addition to eliminating the cost of the card, the hotel has benefited from many other aspects, such as reducing the human resources for check-in and deploying more people to solve other customer service problems. In addition, the problem of replacing lost keys has become easier to resolve.
future development
There are many opportunities to take advantage of the power of smartphones to significantly reduce the cost of deploying access control applications. Modern smartphones have embedded smart chip features that rival today's typical access control systems and can be used to perform most of the tasks that would otherwise be performed by a card reader and a server or control panel.
Manufactured card readers and locks eliminate the need for important intelligence or connectivity. The NFC phone verifies the personally identifiable information and any other relevant rules (such as whether the access request is within the allowed time period, or whether the visitor is allowed to use the mobile phone GPS function at the door), and then sends the trusted message to the corresponding door using encrypted secure communication. To achieve control access. What the reader does is to interpret the cryptographic commands used to open the door—the reader or lock becomes an encrypted door switch that is not connected to the control panel or server, significantly reducing the cost of the reader or lock.
In addition, NFC smartphones can store the necessary access control rules and processing functions and send trusted commands to lower cost, connectionless NFC readers to unlock the door. We believe that in the future, it can be applied to interior doors, filing cabinets and storage cabinets that store valuable or managed items (such as painkillers) to deploy an affordable but equally powerful access system.
In addition to reducing access control costs and creating new market opportunities, virtual credential cards have become more secure. Compared to lost access cards, users will lose more mobile phones carrying virtual credential cards. In addition, with NFC phones carrying embedded credential cards, security parameters can be modified more easily and efficiently.
In traditional applications, to enter the US government building, two-factor authentication is needed to verify identity. The same is true for bank ATMs, where the card is the first certificate and the PIN code is the second certificate. With NFC phones, you can initiate two-factor authentication when necessary, such as when a threat level increases. With an NFC phone carrying a virtual credential, it is easy to send a request to the phone (such as asking the user to enter a 4-digit PIN on the phone before sending the door open message), making multi-factor authentication a real-time managed service.
Future application
NFC phones with embedded virtual credential cards are also widely used in the future. Although airlines still use QR barcode technology, passengers have shown great interest in using mobile phones as mobile boarding passes, which further confirms that the use of mobile phones for various purposes is now increasingly popular.
In Japan, NFC payment systems are installed in fast food restaurants, subways, taxis and vending machines. This technology is also ideal for university campuses where students can use NFC phones for a variety of applications, including access to buildings, parking fees, shopping, using the campus bus system, borrowing library materials, and identifying personally identifiable information before taking the exam. , as well as access to computer resources, etc.
Virtual credential cards will also provide an ideal platform for emerging applications, such as electric vehicle charging stations. The driver can park the car in front of the charging meter and use NFC phones for access and payment services. Personal health records are also accessible using NFC phones. Patients can present their mobile phone at the hospital to provide personal information without filling out a form, and during the emergency medical treatment, the same information can be provided to the caregiver by accessing the voucher card. Another emerging application is the use of smart posters for micro-marketing. Consumers can use the NFC phone to read the label on the poster, after which the phone navigates to a specific web page with more information.
In today's world, there is always a large amount of electronic data that is attracting our attention, and the concept of access screening becomes more and more important. In fact, access control technology can be reversed based on certain rules and authentication factors to block access to the user's personal phone.
Now, save access control decisions and records on NFC phones instead of every lock, you can easily protect places and items with connectionless locks, get new keys, remotely send keys to others, and for each available digital Key personnel and time of use change rules.
Ceramic Ionic Hair Straightener Brush has an impressive twelve temperature settings, giving you maximum customization for your hair straightening. It features an eight foot power cord with a swivel joiner that will allow you to rotate the brush 360-degrees. It also has a hanging hook that will allow you to store it out of the way, yet readily accessible at all times.
Straightening Brush,Best Straightening Brush,Ceramic Straightening Brush,Heated Straightening Brush
Ningbo Meirou Electric Appliance Co.,Ltd. , https://www.mrhaircurler.com