OMNICARD 2013: NFC Beyond Payment & Ticketing

With the growing popularity of NFC smartphones, the managing director of LEGIC Identsystems AG, Klaus Klosa, explains both the possibilities and challenges of NFC technology in contactless people identification.

Today, it’s quite simple to store an electronic key on an NFC smartphone due to the existing LEGIC reader infrastructure, which has been available for years. In the near future, these electronic keys will be able to be allocated and removed over the mobile telephone network, regardless of time or place. LEGIC is already developing a web-based administration system for this.

With this technology, some questions are being asked. How can already established contactless card applications be transferred to NFC smartphones at a reasonable cost? Are they any stumbling blocks within the business model or the technology itself? Klaus Klosa, Managing Director of LEGIC, answered these questions during his speech at OMNICARD 2013 in Berlin.

The first pre-requisite for ID solutions via NFC is a new generation of SIM cards and essential back-end systems. Beginning in 2013, these will be put in place by mobile network operators (MNOs). Companies with the necessary know-how, such as LEGIC, are capable of connecting MNOs’ back-end systems with existing ID applications. With these new Trusted Services, established applications such as access control, parking or canteen applications can be easily used with new NFC mobile telephones.

There are also challenges to meet from an economical viewpoint. For example, there are over 100,000 ID systems supporting 150 million users in the LEGIC eco-system alone. In order to make solutions possible in the NFC field for every smartphone user, agreements with every single system operator and MNO are necessary. After having had very high price proposals in the beginning, some MNOs have and adapted their expectations.

To smooth the way for marketable ID solutions via NFC, someone has to maintain and manage the connection between the different infrastructures, markets and actors. “As a supplier of ID core elements, LEGIC will provide a Trusted Service to its partners,” explained Klosa.

Featured

  • Achieving Clear Communications

    Achieving Clear Communications

    Technology within the security industry has adapted to numerous changes through the years, from the early days of analog devices to today’s IP-based solutions, networked cameras, and access control solutions, in addition to analytics, cloud-based products, virtual security guards, and more. Read Now

  • Taking Flight

    Taking Flight

    Airport security is a complex system that incorporates multiple technologies to ensure the safety and security of travelers, employees and the facility itself. Sound-based technologies are integral pieces of this system, providing means of communication, notification and monitoring. Read Now

  • Live From ISC West 2023 Preview

    Live From ISC West 2023 Preview

    ISC West 2023 is right around the corner! This year’s trade show is scheduled from March 28–31 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Read Now

    • Industry Events
    • ISC West
  • A Break from Routine

    A Break from Routine

    It was three years ago right about now that COVID was bringing the world to its knees. In mid-March of 2020, the president put travel restrictions on all flights in and out of Europe, the NBA suspended its season, and Tom Hanks announced that he’d tested positive for the disease—all in the same night. It was officially a national emergency two days later. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

New Products

  • CyberAudit Introduced to Manage Systems, Intuitive Interface

    CyberAudit Web

    CyberLock, Inc. announces the release of CyberAudit Web 9.4! CyberAudit-Web (CAW), the software suite for managing CyberLock systems, provides an intuitive interface to assign keys, set expirations, monitor staff and configure access schedules. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3