It takes an ecosystem...

sselvaratnam's picture

Last week, we talked about the focus and interest around mobile access we saw at ISC West 2012 as the technology is indeed a hot topic among customers and partners.

Now we are also starting to see a growing interest in the industry's desire for more details around the core elements needed to actually move forward with implementing successful mobile access control systems. This is where HID Global and our parent company ASSA ABLOY come in. With our expertise in secure identity and innovation in mobile access, we've have identified five important areas of consideration for organizations that are adopting mobile access within their physical access control infrastructure:

Creating a Secure Access Control Environment: HID Global's Trusted Identity Platform (TIP) framework creates a secure boundary to deliver access control solutions on NFC-enabled smartphones. TIP ensures that all endpoints, including smartphones with NFC technology, can be validated, and the transactions between phones, readers and locks can be trusted.

Deploying Mobile Keys and Credentials: Mobile keys and credentials can be created using HID Global's Secure Identity Object (SIO), where the SIO data is passed on to the access control system that opens the door using an NFC mobile phone. In fact, Research in Motion (RIM) now offers NFC-enabled BlackBerry phones that can be provisioned with iCLASS credentials, and we're working with other handset manufacturers to bring the same functionality to their NFC-enabled mobile phones.

Using Secure Tokens for Logical Access Control: With the advent of the Bring Your Own Device (BYOD) business mobility deployment model, IT departments know they must protect data that is accessed by devices owned by employees and brought into the enterprise. HID Global technology enables smartphones to generate a One Time Password (OTP) soft token that can be used to securely log on to a mobile device and access the network.

Choosing Readers and Locks: For applications that require compliance, enhanced privacy and protection for high-value, mission-critical assets, HID on-line readers and locks, including our next-generation iCLASS SE readers that support the SIO data structure for mobile access are available. HID and ASSA ABLOY also offer a variety of readers and locks across a continuum of security options.

Using Over-the-Air Credential Provisioning: Our patented technology enables over-the-air provisioning and de-provisioning of credentials on NFC-equipped mobile phones for use in secure access networks. This enables employees to receive digital keys wirelessly so they can use their smartphones to enter the building on their first day of work. It will also allow credential issuers to monitor and modify security parameters, eliminate credential copying, issue temporary credentials and revoke lost or stolen credentials.

It really does take an ecosystem to address all of the pieces needed for successful mobile access control that delivers the convenience and security of digital credentials on NFC-enabled smartphones.

To help guide you through the key considerations for implementing this technology, we've created a Mobile Access Ecosystem Solution Brief that provides more information on the core system components I've outlined above.