As the times evolve, access control systems are moving toward virtualization and mobility. Near Field Communication (NFC) is a technology suitable for access control systems. This standard for short-range wireless communication enables data exchange between devices within a few centimeters. The application of NFC in access control technology shows the arrival of mobile access control.
NFC development status According to the research report of research firm Market Research and Markets in 2012, NFC chips in North America and Europe accounted for more than 60% of the total market, and Asia Pacific region has the fastest growth, especially Japan, China and South Korea. With the growth of the market, NFC applications will attract more and more people's participation. The report also stated that the market revenue generated by NFC applications is expected to grow from US$7.686 billion in 2011 to US$345.1 billion in 2016 with a compound annual growth rate of 35%, of which the major revenue comes from electronic payments, followed by ticketing. And access control business.
Despite the promising future of the NFC application market, there are several conditions that must be met to develop mobile access control and other applications that support Near Field Communication (NFC):
First, you need an NFC-enabled mobile device. To achieve higher market usage, these mobile devices must support four major operating systems: iOS, Android, Windows, and RIM (BlackBerry). In addition, we must also be able to communicate wirelessly with mobile devices. We need to provide three configurations for mobile devices: (1) a secure applet to hold a virtual credential card, (2) a data interaction application, and (3) a virtual credential card. Configuring a runnable virtual credential card mode on a mobile device is also one of the key elements of success.
Second, you also need to configure Hardware that can read a virtual credential card from an NFC-enabled mobile device. Such hardware may include NFC-enabled card readers, electromechanical locks, and third-party hardware ecosystems that each provide support for different applications, such as attendance, secure print management, PC security logins, stored biometric templates, or corporate restaurants. Or electronic payment for vending machines.
Finally, it is also necessary to develop an ecosystem that includes mobile network operators, trusted service managers, and other operators that provide and manage mobile credential cards.
At present, the market has begun to develop in the above areas and promote the application of NFC. On the hardware, major mobile operating systems, including iOS, Android, Windows, and RIM (BlackBerry) are advancing the widespread use of NFC technology, and have begun to launch NFC-enabled mobile phones. At the same time, the industry through extensive cooperation, the virtual credential card technology into the NFC chip, speed up the application of NFC technology. HIDGlobal and NXP Semiconductors jointly launched a universal mobile access control solution for NFC mobile phones. HID stores the virtual credential card in the NXP Embedded Secure Element (eSE) component in the handset, which is compatible with the currently widely used access control readers and systems. NXP's technology supports multiple application management, such as payment, e-government, access control and ticketing, and all application management is done through a microcontroller.
At the application level, major telecommunications operators in China have implemented projects that use NFC or NFC-like technologies in some large cities, such as RF-SIM or MicroSD technology, enabling users to pay via mobile phones, purchase food and beverages, and use public transportation. Major telecom operators, UnionPay, and terminal vendors also began to compete for the NFC market this year. China Unicom released the first NFC handset in November 2012, and China Mobile plans to launch NFC services in 12 provinces in February 2013. The participation of operators will accelerate the formation of an ecosystem of NFC technology applications, extending NFC handsets to mobile access control, electronic payment, ticketing, and network login applications.
Application: Mobile Access Control System NFC mobile phone with mobile access control. Mobile phones with built-in NFC chips require a secure element to store sensitive identity information and the applet program running inside the secure element configures the identity information. There is also an application program that interacts with the user, a virtual credential card that uses a mobile device to register a new identity, and a standardized middleware API that displays the ID credential function of the application.
An ecosystem of interoperable devices. In addition to mobile phones, readers, locks, and other hardware that read and respond to the virtual credential cards stored in NFC mobile phones must be within the trusted framework of the access control management network to ensure the identity of the interoperable products in the security ecosystem.
Security identity management mechanism. There must be a way to manage digital credential cards and key cycles, including the distribution, cancellation, and sharing of all identities within the "trusted" framework. This means that there must be a secure channel for the exchange of identity data between authenticated terminals so that all transactions between mobile phones, readers and locks take place within a secure, trusted communication framework.
Service provider (SP) ecosystem. There must also be an ecosystem of mobile network operators (MNOs), trusted service managers (TSMs), and other service providers who can provide and manage mobile credential cards. There are multiple perspectives on what types of organizations the mobile ecosystem will include and how the ecosystem will evolve in the future. The development of this ecosystem will have an impact on the adoption speed of NFC in applications such as mobile payment, traffic ticketing, and access control.
Future applications combined with NFC technology and virtual credential cards will provide an ideal platform for emerging applications such as Electric Vehicle charging stations. The driver can park the car in front of the charging meter and use an NFC phone to access and pay for the service. Access to personal health records is also possible with NFC phones. Patients can present their mobile phones at the hospital to provide personal information without completing a form. During emergency medical care, visit the credential card to provide the nursing staff with the same information. Another emerging application is the use of smart posters for micromarketing. Consumers can use NFC phones to read tags on posters, and the phone will then navigate to a specific page that contains more information.
At the same time, virtual credential card technology can achieve the integration of access control and computer desktop login. Our technology enables smartphones to receive virtual cards and information from service providers over the Internet or over the air, and read smartphones with virtual credential cards in front of the iCLASS SE reader. These phones can also generate one-time, one-time passwords (OTPs) to securely log in to another mobile device or desktop and access the network. In addition, the progress of background fusion technology will provide powerful verification and card management functions for computer and network login, ensuring that both the plastic cards and the smart phones can manage the identity information.
As users increasingly want to eliminate the need for a One-time Password Token or key fob, only a single credential card can open doors, log on to the network, access applications and other systems, and securely access the network remotely. Using a single credential card is more convenient, and it can perform strong authentication across key systems and applications throughout the IT infrastructure, thus greatly improving security. This approach enables companies to leverage existing voucher investment, increase desktop computer network logins, and establish a fully interoperable and multi-layered security solution in enterprise networks, systems, and facilities, reducing deployment and operating expenses. Consolidation and resolution can also help companies meet regulatory requirements, enforce consistent policies, achieve consistent audit records within the company, and reduce costs through consolidation tasks.
About NFC technology NFC is an abbreviation for NearFieldCommunication, which is short-range wireless communication technology. Developed jointly by Philips and Sony, NFC is a contactless identification and interconnection technology that enables near-field wireless communication between mobile devices, consumer electronics, PCs, and smart control tools. NFC offers a simple, touch-based solution that allows consumers to simply and intuitively exchange information, access content and services.
NFC development status According to the research report of research firm Market Research and Markets in 2012, NFC chips in North America and Europe accounted for more than 60% of the total market, and Asia Pacific region has the fastest growth, especially Japan, China and South Korea. With the growth of the market, NFC applications will attract more and more people's participation. The report also stated that the market revenue generated by NFC applications is expected to grow from US$7.686 billion in 2011 to US$345.1 billion in 2016 with a compound annual growth rate of 35%, of which the major revenue comes from electronic payments, followed by ticketing. And access control business.
Despite the promising future of the NFC application market, there are several conditions that must be met to develop mobile access control and other applications that support Near Field Communication (NFC):
First, you need an NFC-enabled mobile device. To achieve higher market usage, these mobile devices must support four major operating systems: iOS, Android, Windows, and RIM (BlackBerry). In addition, we must also be able to communicate wirelessly with mobile devices. We need to provide three configurations for mobile devices: (1) a secure applet to hold a virtual credential card, (2) a data interaction application, and (3) a virtual credential card. Configuring a runnable virtual credential card mode on a mobile device is also one of the key elements of success.
Second, you also need to configure Hardware that can read a virtual credential card from an NFC-enabled mobile device. Such hardware may include NFC-enabled card readers, electromechanical locks, and third-party hardware ecosystems that each provide support for different applications, such as attendance, secure print management, PC security logins, stored biometric templates, or corporate restaurants. Or electronic payment for vending machines.
Finally, it is also necessary to develop an ecosystem that includes mobile network operators, trusted service managers, and other operators that provide and manage mobile credential cards.
At present, the market has begun to develop in the above areas and promote the application of NFC. On the hardware, major mobile operating systems, including iOS, Android, Windows, and RIM (BlackBerry) are advancing the widespread use of NFC technology, and have begun to launch NFC-enabled mobile phones. At the same time, the industry through extensive cooperation, the virtual credential card technology into the NFC chip, speed up the application of NFC technology. HIDGlobal and NXP Semiconductors jointly launched a universal mobile access control solution for NFC mobile phones. HID stores the virtual credential card in the NXP Embedded Secure Element (eSE) component in the handset, which is compatible with the currently widely used access control readers and systems. NXP's technology supports multiple application management, such as payment, e-government, access control and ticketing, and all application management is done through a microcontroller.
At the application level, major telecommunications operators in China have implemented projects that use NFC or NFC-like technologies in some large cities, such as RF-SIM or MicroSD technology, enabling users to pay via mobile phones, purchase food and beverages, and use public transportation. Major telecom operators, UnionPay, and terminal vendors also began to compete for the NFC market this year. China Unicom released the first NFC handset in November 2012, and China Mobile plans to launch NFC services in 12 provinces in February 2013. The participation of operators will accelerate the formation of an ecosystem of NFC technology applications, extending NFC handsets to mobile access control, electronic payment, ticketing, and network login applications.
Application: Mobile Access Control System NFC mobile phone with mobile access control. Mobile phones with built-in NFC chips require a secure element to store sensitive identity information and the applet program running inside the secure element configures the identity information. There is also an application program that interacts with the user, a virtual credential card that uses a mobile device to register a new identity, and a standardized middleware API that displays the ID credential function of the application.
An ecosystem of interoperable devices. In addition to mobile phones, readers, locks, and other hardware that read and respond to the virtual credential cards stored in NFC mobile phones must be within the trusted framework of the access control management network to ensure the identity of the interoperable products in the security ecosystem.
Security identity management mechanism. There must be a way to manage digital credential cards and key cycles, including the distribution, cancellation, and sharing of all identities within the "trusted" framework. This means that there must be a secure channel for the exchange of identity data between authenticated terminals so that all transactions between mobile phones, readers and locks take place within a secure, trusted communication framework.
Service provider (SP) ecosystem. There must also be an ecosystem of mobile network operators (MNOs), trusted service managers (TSMs), and other service providers who can provide and manage mobile credential cards. There are multiple perspectives on what types of organizations the mobile ecosystem will include and how the ecosystem will evolve in the future. The development of this ecosystem will have an impact on the adoption speed of NFC in applications such as mobile payment, traffic ticketing, and access control.
Future applications combined with NFC technology and virtual credential cards will provide an ideal platform for emerging applications such as Electric Vehicle charging stations. The driver can park the car in front of the charging meter and use an NFC phone to access and pay for the service. Access to personal health records is also possible with NFC phones. Patients can present their mobile phones at the hospital to provide personal information without completing a form. During emergency medical care, visit the credential card to provide the nursing staff with the same information. Another emerging application is the use of smart posters for micromarketing. Consumers can use NFC phones to read tags on posters, and the phone will then navigate to a specific page that contains more information.
At the same time, virtual credential card technology can achieve the integration of access control and computer desktop login. Our technology enables smartphones to receive virtual cards and information from service providers over the Internet or over the air, and read smartphones with virtual credential cards in front of the iCLASS SE reader. These phones can also generate one-time, one-time passwords (OTPs) to securely log in to another mobile device or desktop and access the network. In addition, the progress of background fusion technology will provide powerful verification and card management functions for computer and network login, ensuring that both the plastic cards and the smart phones can manage the identity information.
As users increasingly want to eliminate the need for a One-time Password Token or key fob, only a single credential card can open doors, log on to the network, access applications and other systems, and securely access the network remotely. Using a single credential card is more convenient, and it can perform strong authentication across key systems and applications throughout the IT infrastructure, thus greatly improving security. This approach enables companies to leverage existing voucher investment, increase desktop computer network logins, and establish a fully interoperable and multi-layered security solution in enterprise networks, systems, and facilities, reducing deployment and operating expenses. Consolidation and resolution can also help companies meet regulatory requirements, enforce consistent policies, achieve consistent audit records within the company, and reduce costs through consolidation tasks.
About NFC technology NFC is an abbreviation for NearFieldCommunication, which is short-range wireless communication technology. Developed jointly by Philips and Sony, NFC is a contactless identification and interconnection technology that enables near-field wireless communication between mobile devices, consumer electronics, PCs, and smart control tools. NFC offers a simple, touch-based solution that allows consumers to simply and intuitively exchange information, access content and services.
All kinds of certificates; Low prices with high quality; Fast delivery date; Different levels face to different country.
Safety Products, Industrial Safety Products, Construction Safety Products, Security Safety Products
QINGDAO SANJET NEW POWER MACHINERY CO., LTD. , http://www.sanjet.net