Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/project/resource/index.aspx?aid=17&t=isc-west-2024-news-and-product-updates
INSIGHTS

2015 Access control: Mobile access picks up steam

2015 Access control: Mobile access picks up steam
Using the mobile phone to authenticate has become increasingly popular, and this trend is set to continue down the road. One major advantage is that using the phone carries a “care” factor.

Using the mobile phone to authenticate has become increasingly popular, and this trend is set to continue down the road. One major advantage is that using the phone carries a “care” factor. “The average person is more aware of their phone and its location than any other article they carry with them, including their wallet or key ring,” Brad Aikin, Business Leader of Electronic Locks, Allegion said. “Consumers take better care of their mobile device than any other article they carry with them.”

The home remains a sector with high growth potential for mobile access, for no other reason than the technology being able to create an automated environment in addition to providing access. Using the mobile device to turn lights or PCs on and off, for example, can now be done at the home, and this trend is set to continue.

Right now, there are two competing mobile authentication technologies, namely near-field communication (NFC) and Bluetooth low energy (BLE). Each has its unique characteristics and is expected to drive the market.

NFC: More and More Ubiquitous
NFC is now featured on the iPhone 6 as well as a variety of brands including Alcatel, Asus, BlackBerry, Nexus, HTC, Kyocera, and LG. “With an increasing majority of phones on the market today including NFC functionality within them, it is only a matter of time before the usage increases for access control as well,” Aikin said.

However, applications are limited and mostly center around mobile payment, in particular Apple Pay. “Overall, NFC-enabled devices are only one part of the equation. Administering the new services and creating new policies will also need to be addressed,” Blake Kozak, Senior Analyst, IHS said.

BLE: Not to Be Ignored
Another area to be looked at is Bluetooth low energy, also known as Bluetooth Smart, which many say offers advantages over NFC. “For NFC, you've got to be within a few centimeters of the reader, so it works very much like your traditional plastic card,” Jason Ouellette, Product Line Director for Access Control at Tyco Security Products said.

That's different with BLE, which can detect multiple objects with 30, 40, or even up to 50 feet of range, not to mention the availability of Bluetooth-enabled phones. “You are talking about 3 billion devices that are out there today, that are Bluetooth Smart-enabled, without the use of any special chips. So all we're doing is leveraging an enormous network of devices that are already out there,” Ouellette said.

Applications include controls in smart homes, where lighting and air conditioning can all be adjusted with the mobile device. Medical applications are available as well, allowing users to check their various bodily functions on their phones. NFC or BLE, a major issue that needs to be addressed is security, in particular the interception of data. “I think ‘eavesdropping' is the most important issue to be dealt with,” said Norana Johar, COO, FingerTec. “People can ‘listen' to whatever data you are sending.” “When the mobile device is used in a security solution, there needs to be further levels of encryption,” said Rene von Franquemont, EMEA Product Marketing Manager at Honeywell Security. “The way the mobile credential is securely enrolled to the mobile device and how the activation process is set up in both the mobile device and the access control system requires more work.”

Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: