Апрель 2012

jyang's picture

Taiwan is a relatively small market, yet it is characterized by fierce competition with numerous low-end access control solutions available.

However, the product lifecycle of these solutions also tends to be shorter as they cannot scale to meet the various changing customer requirements. Being faced with the cost of a "rip and replace" approach to upgrading access control systems, many Taiwanese enterprises have started to realize that flexible, future-proof access control systems provide better value with a lower overall total cost of ownership.

One of the biggest advantages of a scalable access control system can be easily illustrated through a recent HID Global deployment in Taiwan, where one of the tallest skyscrapers in Taipei installed HID readers at every entry point to the building. By seamlessly integrating with system software and controllers, the updated access control system can now perform multiple functions, including elevator control, parking lot management, fire alarm configuration and visitor management. For improved security, the visitor management system requires visitors to be assigned a temporary badge to access controlled areas, and the system can track visitor entry and exit activity in real-time at the control center.

Many Taiwanese companies have strong software development capabilities, and this local talent has enabled HID system integrators to leverage our open architecture and versatile VertX network access control solutions to customize enhanced applications that suit customers' needs. For example, we are currently working with customers and integrators to develop alert configuration functionality for very specific applications using HID's VertX access controllers.

Case in point is at local schools, where elementary students enter or leave school by presenting a card to a reader, which triggers a record to be sent to the central server via the controller that in turn activates the delivery of SMS messages to the parents. The alert notifies them that their child has arrived or left the school. This application may also be used in senior citizen facilities, where an the access control system will alert the staff when a senior citizen enters the rest room or other parts of the facility and does not exit within certain period of time. The alert can also indicate the location of the room entered so the staff can quickly follow up as needed.

I am excited by the strength and versatility of HID solutions, and I look forward to the new and innovative applications we continue to develop to address the local needs in Taiwan.

sselvaratnam's picture

Last week, we talked about the focus and interest around mobile access we saw at ISC West 2012 as the technology is indeed a hot topic among customers and partners.

Now we are also starting to see a growing interest in the industry's desire for more details around the core elements needed to actually move forward with implementing successful mobile access control systems. This is where HID Global and our parent company ASSA ABLOY come in. With our expertise in secure identity and innovation in mobile access, we've have identified five important areas of consideration for organizations that are adopting mobile access within their physical access control infrastructure:

Creating a Secure Access Control Environment: HID Global's Trusted Identity Platform (TIP) framework creates a secure boundary to deliver access control solutions on NFC-enabled smartphones. TIP ensures that all endpoints, including smartphones with NFC technology, can be validated, and the transactions between phones, readers and locks can be trusted.

Deploying Mobile Keys and Credentials: Mobile keys and credentials can be created using HID Global's Secure Identity Object (SIO), where the SIO data is passed on to the access control system that opens the door using an NFC mobile phone. In fact, Research in Motion (RIM) now offers NFC-enabled BlackBerry phones that can be provisioned with iCLASS credentials, and we're working with other handset manufacturers to bring the same functionality to their NFC-enabled mobile phones.

Using Secure Tokens for Logical Access Control: With the advent of the Bring Your Own Device (BYOD) business mobility deployment model, IT departments know they must protect data that is accessed by devices owned by employees and brought into the enterprise. HID Global technology enables smartphones to generate a One Time Password (OTP) soft token that can be used to securely log on to a mobile device and access the network.

Choosing Readers and Locks: For applications that require compliance, enhanced privacy and protection for high-value, mission-critical assets, HID on-line readers and locks, including our next-generation iCLASS SE readers that support the SIO data structure for mobile access are available. HID and ASSA ABLOY also offer a variety of readers and locks across a continuum of security options.

Using Over-the-Air Credential Provisioning: Our patented technology enables over-the-air provisioning and de-provisioning of credentials on NFC-equipped mobile phones for use in secure access networks. This enables employees to receive digital keys wirelessly so they can use their smartphones to enter the building on their first day of work. It will also allow credential issuers to monitor and modify security parameters, eliminate credential copying, issue temporary credentials and revoke lost or stolen credentials.

It really does take an ecosystem to address all of the pieces needed for successful mobile access control that delivers the convenience and security of digital credentials on NFC-enabled smartphones.

To help guide you through the key considerations for implementing this technology, we've created a Mobile Access Ecosystem Solution Brief that provides more information on the core system components I've outlined above.


ISC West is always a busy time for HID Global...

...and between this year's mounting anticipation around our live demonstrations on creating, using and managing secure identities, up-to-the-minute mobile access developments and our launch of the new pivCLASS solutions that allow U.S. government facilities to PIV-enable their existing physical access control systems, the level of excitement was at an all-time high. And not long into the event, pivCLASS received an honorable mention at the ISC West Security Industry Association New Product Showcase awards, and we were thrilled and honored that our iCLASS SE next generation access control platform won the Best Access Control Product - Hardware and & Software award for innovation!

This award for iCLASS SE and ISC West 2012 marked the industry's overwhelming validation that the new wave of mobile access technology is poised to be the next major evolution in access control. The show amplified the fact that the technology is showing great potential for following the path of wide adoption similarly to what we've seen in the past with plastic access cards.

In fact, from Day One of ISC West, the buzz of anticipation around HID Global's "Access Control Goes Mobile" strategy briefing was loud and clear. Sure enough, the event hosted by HID Global and our parent company ASSA ABLOY packed in a record number of customers, partners, analysts and media - - all of whom were eager to hear the latest developments in mobile access. And early-on during the briefing, our president and CEO Denis Hébert so aptly summed up the conversations I had been hearing around mobile access during the show when he said, "Now a quantum leap in access control is upon us as we usher in a new era of digital keys and portable digital identity credentials that can be securely provisioned and safely embedded into smartphones."

This statement set the stage for an engaging session that covered the market opportunity for mobile access; the core elements or "ecosystem" necessary to deploy successful mobile access control systems; and live demonstrations that brought to life our entire mobile access ecosystem, from opening doors and accessing computers with NFC-enabled smartphones, to over-the-air-provisioning of credentials on mobile phones.

Strategy briefing with mobile access demonstrations available via webcast
If you were not able to attend the strategy briefing and/or would like to see HID's s iCLASS SE® next-generation platform in action, be sure to check out the event via webcast on-demand and also stay tuned as next week HID's chief technology officer will dive deeper into what it takes to develop a successful mobile access ecosystem.

Now that the dust has settled from an extremely busy ISC West this year, I'd like thank everyone who visited our booth and joined us for the strategy briefing to learn more about HID Global's products, solutions and services.

I look forward to seeing you at ASIS later this year!