Access Control

Distributed intelligence for secure access control

by Mark Rowe

As organisations move to electronic access control solutions for higher security the ability to integrate multiple systems is increasingly important, says Volker Kunz, pictured, Sales Director, EMEA with HID Global.

This trend will continue to rise as the market adopts IP-based access control systems and also embraces convenient new wireless solutions. These networked access control solutions include system-to-reader and system-to-credential configurations, microprocessor cards and/or mobile phones that act not only as trusted credentials but as complete elements of the system architecture.

Firstly, we are seeing that access control continues to move to IP-based architectures that are easier to deploy and maintain. IP architecture facilitates the inter-operability of physical access control systems (PACS) with other systems that can share the same network. The major benefit of this approach, for example, is the ability to move intelligence to the door, which streamlines system monitoring, management and reporting via standard web browsers. By migrating to hardware platforms that are not tied to proprietary protocols and software, organisations are able to add flexibility and scalability, simplifying infrastructure enhancements and modifications that they have invested in. As a result it has provided user access to become more efficient than ever, optimising value by enhancing performance with a single interface to all associated applications. Organisations can also benefit from a simplified system operation, expansion and customisation.

Another major shift for the access control industry has been the move to open standards, which brings adaptability, interoperability, secured communications, more sophisticated credentials, new credential devices including smartphones allowing for access control to evolve beyond current capabilities and adapt to continuously changing threats. End customers are increasingly deploying different types of readers and systems from a range of manufacturers based on their specific requirements. OSDP with SCP is a standardisation of the popular RS485 bi-directional communication that allows long distance simple cabling with multi drop. The incorporation of Secure Communication Protocol (SCP) into OSDP increases the security of reader communications. The integrated system to direct reader mode also enables users to change configurations as well as poll and query readers from a central system, reducing costs and improving the ability to service readers. Finally, the use of transparent mode enables a direct connection between the system and microprocessor based devices like smart cards or smartphones without any action required from the reader. From an organisation’s perspective it reduces manpower cost while speeding, simplifying and improving the ability to service readers easily.

HID Global’s iCLASS SE platform readers also supports the industry-standard Open Supervised Device Protocol (OSDP). iCLASS SE readers support HID Global’s iCLASS Seos credentials on both cards, smartphones (Bluetooth Smart/NFC) and other smart devices. It manages all types of identities as well as their provisioning and revoking over the air. The iCLASS SE platform, powered by Seos, delivers improved security, privacy and portability, and supports multiple technologies as well as future technologies for maximum interoperability.

Further, smartphone intelligence is paving the way for new access control modes. Beyond the simple card emulation model the smartphone will also become a reader. The smartphone’s onboard intelligence and network connectivity could complete most of the tasks now performed by the traditional access control system’s card readers and servers or panels. The mobile device will use its wireless/over the air connection, be the key, processor and rules engine for making access control decisions. This will initiate a paradigm reversal, sometimes referred to as duality, in which mobile devices carrying credentials become the access decision makers, rather than an access control system and doors become the ID ‘badges’, rather than the cards. This duality concept could reduce the need for deploying readers with any significant intelligence or connections to back-end servers through physical cabling. Using mobile devices as trusted credentials will dramatically reduce access control deployment costs and labour costs for configuration of access control systems.

The advent of mobile access control with phones and other smart devices can act as trusted credentials. Traditional cards will co-exist with digital credentials on smart devices and will work together and with other applications in the IP network. By using interoperable, open architecture IP-based intelligent controllers, users will have a broad range of both basic and wireless intelligent readers to choose from that provide access to multiple credential technologies.
The availability of an array of intelligent access control from IP networking to wireless is driving organisations to require more centralised management capabilities to handle a range of constantly changing credentials, readers in multiple configurations to access multiple applications for uses beyond access control. This is available, thanks to the use of digital credentials structuring the credential and reader delivering process.

Electronic access control is moving to online management of all elements using a variety of communication methods with smarter devices that could offer higher levels of security. Adopting IP-based access systems and implementing convenient new wireless solutions is building the foundation for interconnected systems. The ultimate aim is to be able to provide trusted credentials on any type of device as well as the elements that constitute a flexible and future- proof system that will transform security managers from hardware experts to communication and application architects.

Related News

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing