HID Global Extends Partnership To Turn NFC Mobile Phones Into Secure ID, Access Devices

HID Global recently announced it has extended a long standing partnership to bring market-leading iCLASS access control and identity credentials to near-field communications (NFC) mobile phones. 

Embedding iCLASS virtual credentials into NFC mobile phones will enable potential substitution of numerous plastic cards for a variety of commercial and consumer identity applications, including not only physical access control, but also secure PC log on, time and attendance monitoring, equipment and material checkout, authorized access to office equipment and manufacturing machinery, private label retail payments, prepaid transit passes, and customer loyalty and membership programs.

“The ability to support iCLASS virtual credentials within a mobile phone opens the door to a new universe of exciting applications, and this unprecedented capability will be available with the microread NFC controller from INSIDE Contactless,” said Charles Walton, executive vice president of payments for INSIDE Contactless.  “iCLASS has become a universal identity credential with many applications beyond physical access control, and microread’s unique iCLASS capabilities are a powerful differentiator which we will be able to offer to our mobile handset customers.”

According to Walton, INSIDE is in the process of updating its microread NFC controller to implement the command set and protocol that will allow it to communicate with HID iCLASS readers, and iCLASS support will be a feature of all the company’s future NFC products.  Any mobile phone using INSIDE’s iCLASS-enabled microread NFC controller with an associated secure element will be able to support the use of iCLASS virtual credentials.  The iCLASS virtual credentials themselves, as well as the credential management and crypto functions, can be activated and provisioned by HID Global, and will reside in a secure element. 

“We’re pleased to be able to extend our partnership with INSIDE because we both realize there is a tremendous opportunity for NFC and iCLASS virtual credentials to transform the corporate mobile phone, one that could even spill over into adjacent markets as the use of iCLASS credentials moves into more consumer-oriented applications,” said Dr Tam Hulusi, senior vice president at HID Global.  “iCLASS-enabled mobile phones can be used just like traditional iCLASS contactless credentials with an HID iCLASS reader, adding new levels of convenience and flexibility, and with added new application features.”

According to Hulusi, the iCLASS virtual credentials for NFC mobile phones will be securely delivered via HID Global’s Trusted Identity Platform secure delivery system.

INSIDE has been HID’s exclusive supplier of semiconductor chips for iCLASS credentials since the establishment of their partnership in 2001, elevating INSIDE to the number one global provider of 13.56-MHz contactless chips for physical access control.  In 2007, INSIDE and HID extended their partnership to enable the use of iCLASS technology in the emerging virtual credential market.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3