HID Acquires Nectar Smart Card .NET Technology

HID Global recently announced that it has acquired Nectar smart card .NET technology, based on Microsoft .NET, from StepNexus and Hive Minded.

Nectar is a commercial and licensable reference implementation of a .NET virtual machine for embedded systems with a smart card dedicated operating system. The acquisition is consistent with HID Global’s offering of a full range of smart cards and embedded products with high security and leading edge operating systems, supporting the company’s development initiatives in a number of ways:

  • In fast-moving vertical markets such as transportation, financial transactions and physical access control, there is an increasing need to have the ability to define and program custom applications in HID Global’s extensive range of high security embedded systems. The ability to provide a .NET environment and development tool chain will reduce time-to-market and support costs while meeting the market’s requirement for flexible, extendable and programmable systems.
  • New HID Global software platforms associated with the issuance of secure identity are being implemented on the Microsoft .NET platform. These include naviGO, Asure ID 6.0, and iDIRECTOR.
  • Multi-technology smart cards support HID’s installed base of physical access control cards while reinforcing the global move to a single cross-platform card used for multiple applications.
  • HID supplies and supports multiple smart card platforms and operating systems which are highly optimized to customer needs as well as the intended market application. This diversity and flexibility will be further enhanced and strengthened with the .NET platform.

“As a leading supplier in the delivery of secure identity, this acquisition reflects yet another positive step in HID’s growth in the support of multiple platforms and languages for smart cards,” said Denis Hébert, president and CEO of HID Global. “The ability to license the .NET reference implementation to third-parties supports our objective of expanding the HID offering into a variety of vertical markets that rely on secure identity to achieve compliance, security and convenience.”

The Nectar virtual machine is a Microsoft .NET-compatible implementation of the standardized ECMA335/ISO 23271 Common Language Infrastructure. Nectar enables smart cards to integrate seamlessly with .NET execution environments through its use of standard Microsoft tools and Windows communication protocols. Nectar integration is performed using Microsoft’s Visual Studio tools to provide seamless support for multiple programming languages (including Visual Basic, C#, J#, and C++), allowing developers and solution providers to capitalize on existing skills and code as well as reducing time-to-market and support costs.

Featured

  • Enhancing Security and Business Intelligence

    From border security to parking lots, ALPR has gained traction across multiple use cases as the technology becomes more accurate and affordable than ever. I spoke with Jason Cook, business development director at Vaxtor, a leader in ALPR AI-based analytics, and Rui Barbosa, category manager, Surveillance Products at i-PRO, a maker of AI-enabled security cameras, to delve into the latest advancements and applications of ALPR technology. Automated License Plate Recognition (ALPR) has transformed significantly over the years, evolving from a niche technology into a powerful tool for a wide range of applications, particularly in border security. Read Now

  • Leveraging Smart Sensors

    The integration of smart sensors with data-driven video technology provides schools with a comprehensive solution to enhance safety and security. This combination offers advanced capabilities such as environmental monitoring, audio analytics, vape detection and unified data management, empowering schools to create a secure and healthy learning environment for students and staff. Read Now

  • Unlocking the End-user Perception

    An observation as a creator of identity verification solutions is that while industry leaders are often excited by the opportunity to leverage biometrics, there are often concerns raised about the end-user mindset during the conversation. Primarily, what are end-users’ expectations of biometric technology? What concerns might they have about its usage to authenticate and protect their access? Read Now

  • 4 Killed, 9 Injured at Georgia High School Shooting

    Four people were killed and nine were hospitalized after a shooting at Apalachee High School in Winder, Georgia on Wednesday. That’s according to CNN. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3