Tapping into Touch-free Digital

Tapping into Touch-free Digital

Experiences with trusted-Identity technologies

As the world glimpses a return to more “normal” life, one change seems likely to endure: the preference for touch-free digital experiences. The global pandemic both accelerated the world’s digital transformation and re-oriented it to a model that reduces or eliminates physical touch-points and in-person contact.

Now, the same touch-free trusted-identity technologies that are being used to help re-open the workplace are proliferating across a wide variety of use cases that benefit from the safety, security, convenience and efficiency of contact-free interactions with both the physical and digital worlds.

Touch-free identity technology is being adopted in an extensive variety of enterprise applications, from automating physical distancing and contact tracing protocols to simplifying how users enter secured areas and access print resources and other building services. They also are enabling employees to work securely from home and giving consumers greater confidence in financial transactions ranging from online banking to verifying the authenticity of high-value collectible items at the point of sale.

The New Hybrid Workplace Mobile solutions used for access control and building management are creating safer, more secure, and more convenient experiences in the modern workplace. They are also reinforcing the role of trusted identities as a linchpin for more efficient, touch-free and resilient building environments—especially during the COVID- 19 pandemic.

Mobile IDs carried on smartphones and other devices eliminate the need to physically touch cards, readers or keypads. Users present their smartphone to a reader to open doors, gates and elevators. They also provide touch-free access to time-and-attendance terminals, cashless vending machines, and printers, computers and workstations. Additionally, the ability to issue mobile ID credentials over the air removes the need for person-to-person ID card issuance or revocation of physical cards for both employees and visitors. And, ultra wide-band (UWB) and other technologies will take convenience even further in the future.

Visitor management has also been adapted to a more hands-off experience. Cloud-based solutions limit face-to-face interaction through self-service check-in. The badging process itself no longer requires visiting a crowded issuance center with cloud-based solutions that enable cards to be designed and printed from any office or satellite campus, on any device via a web interface.

The iconic Arcos Bosques Tower 1 in Mexico City offers one example of the appeal of the touch-free access experience. HID Global’s smart card readers and mobile access solution deliver integrated access control capabilities for approximately 3,500 tenants and visitors that pass through the tower’s 32 elevators and 16 turnstiles each day. Those who are using the mobile access capability say they prefer it to using physical cards.

“Accessing the building by simply presenting a mobile phone makes a lot of sense as we look for ways to eliminate touching things during the global pandemic,” said Santiago Morett, project manager with the company’s building management firm, Servicon. “HID Mobile Access has given us touch-less entry and safer building security, which is more important than ever for our tenants.”

Other touch-less workplace experiences are enabled through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zerotrust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touch-less authentication.

Organizations that want these touch-free access experiences in both the physical and digital workplaces are increasingly taking a cloud-based approach to how they issue and manage the associated identity credentials. This unifies, automates, and simplifies identity issuance and management at a single facility or across any number of distributed office or remote work locations. While reducing the need for in-person interactions to issue and manage identities, this approach also improves the visitor experience through reduced wait times and the ability to use self-service badging kiosks.

Safe and Healthy Campuses University campuses have their own unique requirements. According to Mark Brown, director of Business Services Technology at Vanderbilt University, student safety is the number one priority. “We need to make sure that students are in a safe environment.” The university is using HID’s mobile access credential technology so the university’s credential holders to use their smartphone, tablet or wearable device to unlock doors.

In addition to delivering building security, management and utilization benefits, wireless technologies and Bluetooth beacons have been integral to implementing automated physical distancing and contact tracing policies during the global pandemic. Bay State College in Boston and Taunton, MA, safely brought its students back to its campuses using a digitized contact tracing solution that includes simple HID Bluetooth BEEKs Beacons in the form of badge holder to provide real-time location services. Jeffrey Myers, chief information officer with Bay State College, stated “HID BEEKS beacons are carried by each person on campus as part of our solution that enabled us to safely resume in-person classes and keep our campus operational should isolated parts of our community find themselves infected.”

Additionally, beacons and cloud-based solutions can provide rule-based physical distancing management for immediate insights and alerts that help keep employees compliant with safety and sanitation requirements to ease the burden of tracking new health and safety procedures.

Government Services Governments are tapping into the touch-free experience through digital versions of mandatory national identity documents. For example, the government of Argentina has accorded full legal equivalence to the smartphone version of its national identity credential, which it offers within a mobile app to its citizens. Citizens who download the app on their mobile devices can request appointments, receive health information and access credentials such as their driver license.

Mobile credential technology is also poised to support the arrival of vaccine passports in Europe. One government is seeking to use NFC technology and smart cards to validate immunization status. This offers a more secure and accurate way to validate vaccination status than easily forged paper cards.

Tapping the card to a mobile device establishes a secure connection to a health authority’s web service, which sends back a web page displaying real-time vaccination information. These types of solutions fully comply with General Data Protection Regulation (GDPR) privacy requirements, and each time the card is read, its authenticity can be validated using the advanced dynamic cryptographic features of the smart card’s embedded microprocessor.

Consumer Applications Among the biggest adopters of the touch-free experience is the banking segment. Consumers have embraced the convenience of online and mobile transactions at traditional banks and the latest all-digital financial institutions, especially during the global health crisis. The latest authentication solutions protect data and transactions while delivering a seamless experience for the consumer and maximum flexibility for banks. This includes the option of cloud-based authentication services that remove the complexity of providing multi-factor authentication to a growing and diverse user population while also offering the convenience and efficiency of centralized regulatory compliance audits. These authentication options include mobile apps that allow users to verify access requests and transactions in an intuitive and easy-to-use manner.

Authentication is also important to consumers purchasing rare collectible items, and this has become a touch-less experience, as well. Professional Coin Grading Service (PCGS), a division of Collectors Universe, embeds HID’s trusted NFC tags into its coins and the sonically sealed, tamper-evident holders into which they are encapsulated.

“We want collectors to be confident that when they have PCGS-authenticated, -graded, and -encapsulated coins and banknotes in their hands, they are holding an authentic and valuable collector’s item,” said Brett Charville, president of PCGS.

With a simple tap of a phone to the coin, the collector authenticates the coin through HID’s cloud authentication service, in real time. Each tap generates a unique cryptographic one-time URL that automatically launches Collectors Universe’s proprietary PCGS Cert Verification app or opens a web browser to display information about the coin’s or banknote’s authenticity. Since each tap generates a unique URL, the information cannot be cloned or manipulated by a counterfeiter.

A third example of today’s new touch-free experiences for consumers is the completely contact-free dining experiences offered by UK-based qiiosk Ltd. through its MenuTile offering. HID NFC Tags facilitate the end-user interactions with qiiosk’s placards. Restaurant goers simply scan the QR code or tap the embedded NFC tag with an NFC-enabled smartphone or tablet to securely access menus, ordering, and payment options. Customers can access up-to-the-minute menus and place orders for in-person, takeaway, or delivery dining.

Moving forward, biometrics are poised to become even more mainstream to further advance the security and convenience of these touch-free experiences. Whether it is opening doors, printing documents, interacting with connected buildings and digital consumer services, or implementing physical distancing and contact tracing protocols, touch-free trusted-identity technologies have proven that they are here to stay

This article originally appeared in the May June 2021 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3