Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/rankings/survey.aspx
INSIGHTS

Edge AI in access control: industry leaders weigh in

Edge AI in access control: industry leaders weigh in
In a world increasingly reliant on seamless connectivity, access control systems must function effectively even in offline or low-connectivity environments.
In a world increasingly reliant on seamless connectivity, access control systems must function effectively even in offline or low-connectivity environments.
 
Ensuring reliability has become paramount as businesses and critical infrastructure adopt these technologies.
 
Meeting the demands of modern security environments requires innovative approaches. Experts provide insights into how these systems tackle challenges associated with low connectivity, ensuring robust and uninterrupted functionality.

The role of edge computing: Suprema’s approach

For Suprema, a leading name in access control, the solution lies in harnessing the power of edge computing. Hanchul Kim, CEO of Suprema, emphasized the advantages of local data processing.
 
“Edge computing enables local data processing near the source of data generation, reducing latency and reliance on centralized data centers,” Kim explained.
 
Kim highlighted that Suprema’s edge devices are equipped to handle authentication and authorization locally, ensuring uninterrupted access even if connectivity to a central server is lost. “By storing necessary authentication data locally on edge devices, Suprema ensures that users can gain access seamlessly, regardless of network availability,” Kim said.
 
Suprema’s flagship products, such as the BioStation 2a and BioStation 3, exemplify this approach. These AI-driven devices utilize Neural Processing Units (NPUs) for efficient on-device AI processing.
 
“A standout feature of Suprema's edge AI technology is its ability to develop AI algorithms independently and create lightweight AI engines optimized for its own edge devices,” Kim explained.
 
This innovation ensures that the devices manage vast datasets efficiently without overheating or slowing down.
 
In addition to functioning autonomously, Suprema’s devices can act as master controllers, managing other connected devices.
 
“They independently collect and process data, making intelligent decisions without relying on a central server,” Kim added, underscoring their resilience in adverse conditions.
 
This emphasis on AI-driven solutions aligns with broader industry trends. As organizations face mounting concerns about data breaches and connectivity disruptions, edge computing—coupled with AI—has emerged as a vital component of modern access control systems. Suprema’s ability to create proprietary AI engines demonstrates a commitment to innovation that ensures high performance and reliability.

Gallagher Security’s approach: mobile-centric solutions

Steve Bell, Chief Technology Officer at Gallagher Security, highlighted the importance of designing systems that enable offline functionality through mobile devices.
 
Bell explained, “In most cases, a mobile device needs to be online to issue a credential. Authentication at a door should only require communication between the mobile device and the reader.”
 
Gallagher’s approach prioritizes decentralized systems where mobile devices act as intermediaries. Bell pointed to the CSA Aliro specification as a breakthrough in offline access.
 
“This allows the phone to have information about which offline doors the person has access to and the ability to upload the outcome of transactions to the credential issuer when the phone is next online,” Bell said.
 
By focusing on the interaction between mobile devices and readers, Gallagher Security addresses a critical need for flexibility in environments where constant connectivity cannot be guaranteed. For businesses operating in remote locations or areas with unreliable networks, this mobile-centric design ensures that access control remains robust and functional.
 
Additionally, Bell’s comments reflect an industry-wide shift toward user-centric solutions. Mobile devices, already integral to daily life, are increasingly becoming central to access control systems. By enabling offline functionality and simplifying the credentialing process, Gallagher’s systems cater to both organizational needs and user convenience.

HID’s multifaceted strategy

HID, a global leader in mobile access control solutions, adopts a layered approach to ensure reliability. Sanjit Bardhan, Vice President and Head of Mobile at HID, outlined several strategies that their systems employ.
 
“Mobile-based access control systems incorporate several strategies to ensure reliable functionality in offline or low-connectivity environments. These measures balance security and usability, enabling continuous operation even when network access is unavailable,” Bardhan said.
 
One key strategy involves secure local credential storage.
 
“Mobile credentials are securely stored on the device using mechanisms such as Trusted Execution Environments (TEE) or Secure Enclave to ensure access remains available without a network,” Bardhan explained.
 
These advanced security mechanisms safeguard credentials, allowing uninterrupted access while maintaining high security standards.
 
HID also leverages edge computing capabilities in its access devices.
“Access control readers or controllers are equipped with local processing capabilities to validate credentials without relying on centralized servers,” Bardhan added, highlighting the use of encrypted databases for local authentication.
 
Another innovation is the use of Peer-to-Peer (P2P) communication. “Some advanced systems leverage Bluetooth Low Energy (BLE) or Near-Field Communication (NFC) for peer-to-peer communication between the mobile device and the access control hardware. This direct communication bypasses the need for internet connectivity,” Bardhan noted.
 
Lastly, Bardhan emphasized the role of fail-safe and fail-secure modes. “Fail-safe allows doors to unlock automatically during an outage, while fail-secure keeps doors locked, preserving security while allowing manual overrides in critical scenarios,” he said, underlining the adaptability of HID’s solutions.

Industry trends and challenges

The access control industry’s move toward edge computing and offline functionality reflects broader shifts in technology and user expectations. Businesses increasingly demand systems that can operate independently of centralized infrastructure, reducing vulnerabilities and ensuring continuous operation in critical environments.
 
Suprema’s focus on proprietary AI engines and NPUs exemplifies a trend toward specialized hardware and software designed for edge applications. The integration of high-performance processors in devices like the BioStation 3 demonstrates how innovation can address specific challenges such as data processing efficiency and heat management.
 
Meanwhile, Gallagher Security’s emphasis on mobile-first solutions aligns with the growing ubiquity of smartphones. By simplifying the user experience and minimizing reliance on network connectivity, Gallagher’s approach ensures that systems remain accessible and functional, even in challenging conditions.
 
HID’s multifaceted strategy—which combines secure credential storage, edge processing, and P2P communication—highlights the importance of redundancy in access control systems. These layered solutions provide multiple safeguards, ensuring that users can continue to access facilities securely, regardless of network conditions.

The broader implications

Offline functionality in access control systems has implications beyond business operations. In critical infrastructure sectors such as healthcare, transportation, and utilities, the ability to maintain secure access during connectivity disruptions can be a matter of life and death.
 
For instance, hospitals rely on access control to secure sensitive areas like operating rooms and pharmaceutical storage. In such cases, even brief outages can have severe consequences.
 
Moreover, as the adoption of smart buildings accelerates, the demand for resilient access control systems will only grow. Smart buildings often integrate access control with other systems, such as HVAC and lighting, creating a complex network of interdependencies.
 
Ensuring offline functionality in these environments requires advanced solutions like those offered by Suprema, Gallagher, and HID.

Looking ahead

As the industry evolves, the focus on edge AI and offline capabilities will likely intensify. Advances in processing power, AI algorithms, and secure communication technologies will drive innovation, enabling even greater reliability and efficiency.
 
Suprema’s Hanchul Kim summed up the importance of these advancements: “Suprema offers the most reliable embedded AI technology, delivering high efficiency and performance in AI-based access control solutions.” This sentiment reflects a shared commitment among industry leaders to addressing the challenges of offline functionality head-on.
 
Ultimately, the success of access control systems in low-connectivity environments will depend on the industry’s ability to balance security, usability, and technological sophistication. The future of access control looks promising—and resilient.
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: