Going Mobile

Industry Vertical

Going Mobile

Security threats are growing at the same time that users are demanding the ability to confidently connect to and use more applications, on the go, than ever before, with a single, trusted ID that can be carried on a smart device. They want a seamless and consistent experience across a growing range of access control, authentication and Internet of Trusted Things (IoT) applications.

Meanwhile, the IoT is transforming consumer applications like personal fitness, home automation and the connected car, and spurring significant changes throughout the modern facility as offices, hospitals, manufacturing plants and college campuses all get smarter, and the workforce inside these facilities is becoming more mobile and connected than ever before, and embracing this mobile revolution and the IoT will deliver valuable benefits, while simultaneously posing challenges as organizations face potential threats to their security, facility processes, and operational integrity.

A Shift in the Use of Trusted Identities

With growing adoption of mobility and the IoT, there is a shift underway in the use of identity technology. This shift will lead to increased adoption of mobile devices and the latest smart card technology, a greater emphasis and reliance on the cloud, and a radical new way of thinking of trust in smart environments and the IoT. This shift will precipitate the move from legacy systems to NFC, Bluetooth Low Energy (BLE) and advanced smart card technologies to meet the evolving needs of organizations worldwide. Ultimately, there will be a transformation in the way trusted identities are used, particularly in industries focused on regulatory compliance such as government, finance and healthcare markets.

A number of trends are emerging. As organizations seek to use the broadest range of smart devices possible, it directly impacts how customers view and use trusted identities, across more activities in more connected environments. Users will want to open doors, login to cloud resources, access print jobs and conduct other daily activities using trusted IDs on their phone, wearable or smart card.

The industry will look toward complete identity relationship management that considers the need to grant access based on context and circumstances across the trusted identities assigned to people, devices and things in smart offices, buildings and other environments that are becoming more connected. There will be a greater emphasis on the cloud to create common management platforms for digital IDs, and organizations will recognize the interdependencies of technologies and platforms required to provide a better user experience.

As multi-factor authentication for physical and IT access control merges into integrated systems that provide a more convenient and secure user experience, this model will also make it easier for administrators to deploy and maintain an integrated system throughout the complete identity lifecycle. Credential issuance for physical ID cards will also experience a digital transformation, as the use of cloud technologies will enable managed service models for badge printing and encoding.

Finally, emerging IoT uses cases will increase the need to ensure the security of an Internet of Trusted Things (IoTT). Trusted identities will help secure, customize and enhance the user experience across a growing range of industry segments that are embracing the power of the IoT. Organizations are looking to streamline processes and operations using real-time location systems, presence- and proximity- based location functionality, condition monitoring solutions, beacons and cloudbased models leveraging emerging solutions that secure IoT use cases. Emerging solutions will also advance existing secure proof of presence capabilities to include the predictive analytics and functionality based on location-based technologies.

In parallel with these activities, there will be a growing awareness that new identity challenges have arisen in applications where mobile access control meets the IoTT.

New Identity Challenges at Intersection Between Access Control and the IoT

A major concern among facility managers is that the links between systems and assets will be compromised in the IoT. The industry has already alleviated these fears in access control applications with the advent of trusted identities that are communicated over protected channels using the latest cryptographic algorithms. Readers and credentials are now essentially trusted devices that are connected to the facility’s access control system. More recently, smartphones have similarly become trusted credentials that can be connected to these systems through the cloud.

Early Successes

An early example of how access control and the IoT are merging is the use of mobile access technology to help facility managers efficiently control HVAC systems based on a person entering or exiting a suite or common area using a mobile ID. The HVAC and energy management systems will automatically adjust the settings, for example, turning off lights when the last person leaves the area. This is what integrator Datawatch Systems is doing for its customers with a combination of its Datawatch Direct Access System and HID Mobile Access. In the future, Datawatch is exploring further mobile access control integration with more building utility systems.

The same trusted identities used for access control can be extended to other IoT applications for numerous additional smart building activities. A prime example is automating maintenance management systems that are physically linked to fire and safety equipment, heating and cooling systems and other critical, high-value assets. For decades, RFID transponders have connected these physical assets to business applications, enabling organizations to manage and track inventory levels and improve operational process efficiency. Now, mobile devices can be combined with trusted tags and cloud authentication to secure cloud maintenance management software (CMMS) applications.

Users tag equipment to connect it to the Internet, enabling technicians to then use their mobile devices to simply tap the tag in order to access these cloud-based CMMS applications. This model also makes it possible to track the service start time, duration and status of completion to improve billing accuracy. From the initial tap to initiate service to the final tap that closes the ticket, the previously manual process is now fully automated, improving workflow while minimizing any disruption of equipment productivity.

Marrying access control with IoT applications using trusted identities promises to make systems and applications much easier to use. The ability to secure CMMS and other IoT applications will make entire processes much more seamless and easier to manage from initiation to followup, resulting in a more responsive and productive mobile workforce.

A key requirement moving forward will be the ability to implement identity-proofing with an unbroken chain of trust for all access control transactions in both the physical and digital worlds, and to base this chain of trust on an ability to verify claims of true identity, rather than simply verifying ownership of a digital identity that someone might be using fraudulently. With this foundation in place, trusted ID solutions will be poised to make daily life easier and more productive in the physical and digital worlds and the IoTT, for today’s increasingly mobile users who continue to be the most important elements in any security strategy.

This article originally appeared in the April 2017 issue of Security Today.

Featured

  • Allegion, Comfort Technologies Implement Mobile Credentials at the Artisan Apartment Homes in Florida

    Artisan Apartment Homes, a luxury apartment complex in Dunedin, Florida, recently transitioned from mechanical keys to electronic locks and centralized system software with support from Allegion US, a leading provider of security solutions, technology and services, and Florida-based Comfort Technologies, which specializes in deploying multifamily access control, IoT devices and software management solutions. Read Now

  • Mall of America Deploys AI-Powered Analytics to Enhance Parking Intelligence

    Mall of America®, the largest shopping and entertainment complex in North America, announced an expansion of its ongoing partnership with Axis Communications to deploy cutting-edge car-counting video analytics across more than a dozen locations. With this expansion, Mall of America (MOA) has boosted operational efficiency, improved safety and security, and enabled more informed decision-making around employee scheduling and streamlining transportation for large events. Read Now

  • Security Industry Association Launches New “askSIA” AI Tool

    The Security Industry Association (SIA) has unveiled a brand-new SIA member benefit – askSIA, a conversational AI agent designed to help users get the most out of their SIA membership, easily access SIA resources and find the latest information on SIA’s training and courses, reports and publications, events, certification offerings and more. SIA members can easily find askSIA by visiting the SIA homepage or looking for the askSIA icon in the top left of webpages. Read Now

    • Industry Events
  • Industry Embraces Mobile Access, Biometrics and AI

    A combination of evolving workplace dynamics, technology innovation and new user expectations is changing how people enter and interact with physical spaces. Access control is at the heart of these changes. Combined with biometrics and AI, mobile access control has become increasingly crucial for deploying entry solutions that are seamless, secure and adaptive to user needs. Read Now

  • Sustainable Video Solution Delivered for Landmark City of London Office Development

    An advanced, end-to-end video solution from IDIS, with a focus on reducing waste and costs, has helped a major office development in the City of London align its security with sustainability objectives. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.