Today, there are three major initiatives for cards and credentials. Every security



Similar documents
Student ID card and campus security solutions. Colleges and universities

AD-Series. Selection Guide

Guard All Security Symposium. Identity and Access Management

Readers and Credentials. from Security Technologies

NACCU Migrating to Contactless:

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control

An Effective Approach to Open Payment Systems

Introducing the Schlage NDE series wireless lock with ENGAGE technology

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement"

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.

Security under your Control

Mobile Near-Field Communications (NFC) Payments

Using Contactless Smart Cards for Secure Applications

Tailored integration to suit you

EMV FAQs. Contact us at: Visit us online: VancoPayments.com

Security and Convenience A Paradox on Campus

A Secure and Open Solution for Seamless Transit Systems

Smart Cards and Biometrics in Physical Access Control Systems

Contactless Solutions

Moving to Multi-factor Authentication. Kevin Unthank

Executive Summary P 1. ActivIdentity

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

A Guide to EMV. Version 1.0 May Copyright 2011 EMVCo, LLC. All rights reserved.

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Guide to Evaluating Multi-Factor Authentication Solutions

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Edge Metrics Data Center User Manual

Inside the Mobile Wallet: What It Means for Merchants and Card Issuers

bright blue Intelligent Access Management

Biometrics in Physical Access Control Issues, Status and Trends White Paper

CONTACTLESS INTEROPERABILITY IN TRANSIT

MasterCard Contactless Reader v3.0. INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0

CITGO CHIP & MOBILE TM. Quick-Start Guide YOUR CUSTOMERS. are

Integrated Identity Management Whitepaper

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Security Management System Wiring Diagram Portfolio

The Benefits of an Industry Standard Platform for Enterprise Sign-On

toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard

L-1 Fingerprint Reader Solutions. V-Flex 4G

Security Management System

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO BASED TECHNOLOGY FOR PAYMENT 4

REVOLUTIONIZING PROPERTY MANAGEMENT

Securing your school. Door hardware solutions for primary education

Enhancing the Contactless Cards UAT. Enabling faster and efficient transactions.

Open Architecture Lets Teachers Credit Union Easily Transition to Upgraded Security

Entrust IdentityGuard

The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group

American Express Contactless Payments

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

What Merchants Need to Know About EMV

Required changes to Table 6 2 in FIPS 201

The Blurring of CP and CNP: Remaining Secure & Scalable in a Technology and Regulation Driven Landscape

Android pay. Frequently asked questions

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

More Power and Performance With Each Printed Card

E M V I M P L E M E N TAT I O N T O O L S F O R S U C C E S S, P C I & S E C U R I T Y. February 2014

The Canadian Migration to EMV. Prepared By:

Payments Transformation - EMV comes to the US

EMV and Restaurants: What you need to know. Mike English. October Executive Director, Product Development Heartland Payment Systems

SYMMETRY PRODUCT OVERVIEW


Everything you need to know!

MOBILE NEAR-FIELD COMMUNICATIONS (NFC) PAYMENTS

SYMMETRY. DATASHEET ACCESS CONTROL Product Overview

Two Factor Authentication for VPN Access

Access Control Manager

John Beckwith Loyola Marymount. Access Control - Where are we and where are we going?

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

TimeClock Plus OnDemand

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Mobile MasterCard PayPass Testing and Approval Guide. December Version 2.0

OpenEdge Research & Development Group April 2015

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

SummitStack in the Data Center

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

Functional Specification Document

WHITE PAPER Usher Mobile Identity Platform

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

A Brand New Checkout Experience

A Brand New Checkout Experience

Comprehensive security to meet the demands of the modern world. Safety Security Certainty

Introduction. Introducing ChipNet3 ID

Audio: This overview module contains an introduction, five lessons, and a conclusion.

WHITE PAPER. Let s do BI (Biometric Identification)

A RE T HE U.S. CHIP RULES ENOUGH?

Less is More: Streamlining Commerce for the Campus Advantage

EMV EMV TABLE OF CONTENTS

Longmai Mobile PKI Solution

advant advanced contactless smart card system

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Card Technology Choices for U.S. Issuers An EMV White Paper

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

Attestation and Authentication Protocols Using the TPM

Sell Allegion. Reap rewards.

Transcription:

What s the Near Future Hold for ID Cards & Credentials? Jeremy Earles, Ingersoll Rand Security Technologies Portfolio Marketing Manager-Credentials & Readers Today, there are three major initiatives for cards and credentials. Every security professional, integrator and user, needs to be aware of them. They include Smart cards are becoming the credential of choice. If you presently use magnetic stripe or proximity cards, start planning for the switchover now. It s going to be a hybrid world. Although smart cards may be the credential of choice, multiple types of credentials, such as key systems, PINs, various types of cards and biometrics, will still be necessary for certain operations. Adding special credentials to such areas is possible. And, even though you may be using multiple credentials, you still will want one system to manage all of them. Get ready for new technologies such as NFC (near field communications). With NFCenabled smart phones, you will be able to employ your employees /customers own smart phones as access credentials, just like they would use smart cards. Start preparing now. Let s Get into More Detail Starting with Smart Cards While125 khz proximity technology and magnetic stripe cards are the common technology in today s access systems, 13.56 MHz smart card technology is the technology of tomorrow. Bottom line it provides more security and storage for access control systems plus the cost of a smart card is comparable to that of the standard, traditional proximity card. Not only does a smart card provide much higher security than a proximity card, it handles a wide variety of applications from holding biometric templates to being used for cashless vending. It is very important that all facilities be prepared for smart credential deployment, even if that facility only wants to install proximity at present. Besides making access control more convenient, smart cards can be used for time and attendance, logical access, cashless vending and cafeteria payments, and checking out scrubs and medical equipment just to name a few. Right now, it s likely that

a different credential type is being used with each system. And different departments are managing those credentials. Smart cards make it possible to consolidate all of those functions onto one credential, creating an efficient environment where staff would have only one credential to use throughout their day. Issuing one smart credential also impacts administrative costs. Not only is the cost of a single credential lower than purchasing multiple forms of ID, but the reduced management and distribution time for one credential will have a significant impact on productivity. Smart credentials also increase the security of information kept on the card and stored in the facility. In comparison to door keys, magnetic stripe cards or proximity cards, the encrypted security of smart credentials ensures that they are far harder to counterfeit. It is not possible to put a dollar amount on the potential damage that an organization could suffer by unauthorized individuals gaining access to restricted areas of the facility. By issuing your staff credentials with strong authentication mechanisms, you are effectively investing in their well being and demonstrating that you take security seriously. IT-approved. When presenting a smart card solution, be prepared for representatives from the IT department to take notice. More and more security system decisions are being made with input from the IT department. And we re seeing increased desire for the convergence of physical and logical security access control. IT professionals want strong authentication credentials, the level of security provided by smart cards. Contrary to proximity and magnetic stripe cards and their readers, smart cards go through a challenge and response sequence to initiate conversations with the network. Communications are encrypted using industry standard encryption techniques. By welcoming their involvement and showing ability to speak their language and answer their questions, you will gain additional layers of approval within the IT organization. Multi-credential readers are perfect for these locales. Besides aiding

implementation, multi-technology readers are available to create flexibility in the transition while allowing your users to leverage the benefits of smart cards now or in the near future. Installing a multi-credential reader at every new door means you are able to flexibly plan for the future. Since multi-technology readers work on both the proximity frequency and the smart card frequency, they can still use your current proximity credentials while migrating to smart credentials at their own pace. Likewise, multitechnology readers can read both magnetic stripe and smart cards. During the transition, you can use both your old credential and the new smart credential. You can upgrade on your preferred timelines, not due to the whim of technology that forces a "now or never" alternative. When you switch to smart cards, you will not have to tear out and re-install all of your facilities readers. The multi-technology readers are ready to go. Lastly, choosing the right smart card credential can make all the difference when trying to use them with applications other than access control. Look for platforms that are open format rather than those designed for proprietary systems. Open formats allow easy integration into other applications with minimal programming, speeding up the time of deployment, reducing the cost of implementation, and giving you more freedom to get the most out of your investment. In Many Cases, There will be Other Credentials For higher-security applications that require multiple forms of verification, the smart card also has an advantage as it securely stores other credential types such as biometric templates, PIN codes and photos right on the smart card. This provides an extra level of security at the access point, protecting the information behind closed doors or on the secure network without added inconvenience to the user. For instance, more and more data rooms, laboratories and other high asset value rooms are protected with biometrics to assure that the person attempting entry is the person who is authorized to enter, not a person carrying the card of who is

authorized to enter. Of course, not all access points such as the broom closet are high security locales. For these doors, keys may remain in service for some time. So might some of the other credentials, including the PIN. With multiple types of credentials, it is imperative that you select an open architecture for more flexibility, scalability and a growth path. Remember, security applications frequently are installed in stages. Too often, over the years, different brands with various operating mechanisms can get installed. The products operate independently, without integration into one system. Oftentimes, the hardware and software systems are proprietary and not compatible with other components. Security directors today need to choose access control systems that can be upgraded to create an enterprise security system. You need systems that can meet current safety and security issues, as well as accommodate emerging technologies that allow your system to expand and adapt as needed. Such solutions should be able to operate current technologies, as well as those under development, without compromising or risking investments in their present systems. For Many of Us, Our Smartphone will be our Credential NFC is one of the key technologies on the horizon. Near Field Communications (NFC) technology is now being added to a growing number of mobile handsets to enable access control as well as many other applications. Over 285 million NFC-enabled smart phones are expected to be sold in 2013 and over half the phones sold in 2015 will be NFC-capable. Existing aptiq 13.56 MHz smart card/multi-technology readers are already compatible with the new NFC technology which allows your users to deploy their own smartphones as their credentials to enable secure access into their facilities. When NFC-enabled phones are available, you won t have to replace your present smartcard/ multi-technology readers. When transitioning and planning for future expansion, spanning the various technologies of the past, present and future with a multi-technology reader only makes sense.

-30- ABOUT THE AUTHOR: Jeremy Earles is Allegion s Portfolio Manager for Credentials and Readers. He can be contacted at Jeremy.Earles@allegion.com.