HID Global Launches First University Pilot of NFC Smartphones Carrying Digital Keys

HID Global announced a pilot project that showcases the benefits of using NFC smartphones for opening doors at universities and other campus environments. The trial is underway at Arizona State University (ASU),where a group of students and staff are accessing a campus residence hall and selected resident’s rooms using HID Global’s iCLASS SE credentials embedded into a variety of popular smartphones connected to all major mobile networks.

ASU manages on-campus housing for about 13,000 students living in 34 residence halls. To implement the pilot, HID Global deployed iCLASS SE readers on secured doors to ASU’s Palo Verde Main hall, and HID technology-enabled Sargent Profile Series electromechanical locks from ASSA ABLOY on selected resident room doors. Participants were given NFC smartphones carrying next-generation iCLASS SE technology that enables new levels of security, convenience, portability and performance. To open door locks, participants present the phones to a door reader just like they do with their existing Sun Cards, which are iCLASS-based campus credentials. All participants are using their phones for residence hall access, and some are also using them with a unique additional digital key and PIN to open individual room doors. The technology also supports over-the-air provisioning and management of digital keys, which simplifies administration of the access control system.

“This project highlights the promise of taking NFC technology beyond cashless payment into new, complementary physical access control applications,” said Denis Hébert, HID Global president and CEO. “ASU is a leading innovator and long-time iCLASS user, and now the university is helping us validate how bringing mobility to access control improves security while enhancing the user experience by making it easier to deploy and manage keys and more convenient to carry them. With this technology, any door that’s opened with a key or Sun Card has the potential to now be opened with a phone.”

In initial feedback, about 80 percent of ASU participants reported that using a smartphone to unlock a door is just as convenient as using their campus ID card. Nearly 90 percent said they would like to use their smartphone to open all doors on campus. While the pilot was focused on physical access, nearly all participants also expressed an interest in using their smartphone for other campus applications including access to the student recreation center, as well as transit fare payment and meal, ticket and merchandise purchases.

“When I first saw this technology used in other applications, I recognized the benefits it could bring to a university campus,” said Laura Ploughe, director of business applications and fiscal control, University Business Services, at Arizona State University. “Mobile phones are at the heart of campus life and play a major role in facilitating the students’ social connections. This project with HID Global has proven that a ubiquitous device can converge secure identity credentials and physical access control, and endorsed the promise that NFC technology holds within the campus environment. We were very impressed with the convenience of putting Sun Card credentials on NFC smartphones, as well as the enhanced security that is delivered by this next-generation of advanced access control system.”

“We are pleased to be working on this project with ASU,” said Debra Spitler, HID Global's vice president of HID Connect, which provides third-party developers with the ability to use existing HID technology-enabled cards for new applications. “Participants are excited about using these NFC smartphones. Many have said they often leave their room without their Sun Card, but never forget their phones; by carrying their Sun Card credentials inside their phone, they know they can always get back into their residence hall or room.”

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3