What Does the Near Future Hold for ID Cards and Credentials

What Does the Near Future Hold for ID Cards and Credentials

Every security professional, integrator and user needs to be aware of the three major initiatives for cards and credentials:What Does the Near Future Hold for ID Cards and Credentials

  1. Smart cards are becoming the credential of choice. Now is the time to start planning for the switch from magnetic stripe and proximity cards to smart cards.
  2. It’s going to be a hybrid world. Although smart cards may be the credential of choice, multiple types of credentials such as key systems, PINs, various types of cards and biometrics will still be necessary for certain operations. Adding special credentials to such areas is possible; and, if using multiple credentials, one system to manage them all will probably be important.
  3. Get ready for new technologies, such as NFC (near field communications). With NFC-enabled smart phones, employees and customers can use their own smart phones as access credentials, just like using smart cards.

The Technology behind Smart Cards

While 125 kHz proximity technology and magnetic stripe cards are the common technology in today’s access systems, 13.56 MHz smart card technology is the technology of tomorrow. Bottom line – it provides more security and storage for access control systems, not to mention the cost of a smart card is comparable to that of the standard, traditional proximity card.

Not only does a smart card provide much higher security than a proximity card, it handles a wide variety of applications from holding biometric templates to being used for cashless vending. It is very important that all facilities be prepared for smart credential deployment, even if that facility only wants to install proximity technology at present.

A Single Smart Credential

Besides making access control more convenient, smart cards can be used for time and attendance, logical access, cashless vending, cafeteria payments, and checking out scrubs and medical equipment, just to name a few. All of those functions can be consolidated onto a smart card, creating an efficient environment where staff would have only one credential to use throughout their day.

Administrative costs and productivity. Not only is the cost of a single credential lower than purchasing multiple forms of ID, but the reduced management and distribution time for one credential will have a significant impact on productivity.

Increased security. Smart credentials increase the security of the information kept on the card and stored in the facility. In comparison to door keys, magnetic stripe cards or proximity cards, the encrypted security of smart credentials ensure that they are more difficult to counterfeit.

IT-approved. When presenting a smart card solution, be prepared for representatives from the IT department to take notice, as more and more security system decisions are being made with input from the IT department. Because of this, there is an increased desire for the convergence of physical and logical security access control.

IT professionals want strong authentication credentials, the level of security provided by smart cards. Contrary to proximity cards, magnetic stripe cards and their readers, smart cards go through a challenge and response sequence to initiate conversations with the network, and these communications are encrypted using industry-standard, encryption techniques.

By welcoming the involvement of the IT department, and showing the ability to speak their language and answer their questions, you will gain additional layers of approval within the organization.

Multi-credential readers. Besides aiding implementation, multi-technology readers are available to create flexibility during the transition while allowing you to leverage the benefits of smart cards now or in the near future.

Installing a multi-credential reader at every new door means you are able to flexibly plan for the future. Since multi-technology readers work on both the proximity and smart card frequency, they can still use current proximity credentials, while migrating to smart credentials at their own pace. Likewise, multi-technology readers can read both magnetic stripe and smart cards.

The transition. You can use your old credential and new smart credential, while upgrading on your preferred timeline, not on the whim of technology that forces a "now-or-never" alternative. And, when you switch to smart cards, you will not have to tear out and re-install all of your facilities’ readers, because the multi-card readers are ready to go.

Applications other than access control. Be sure to choose the right smart card credential by looking for platforms that are open format rather than those designed for proprietary systems. Open formats allow easy integration into other applications with minimal programming while speeding up the time of deployment, reducing the cost of implementation and giving more freedom to get the most out of your investment.

Our Smartphone as our Credential

Over 285 million NFC-enabled smart phones are expected to be sold in 2013, and over half the phones sold in 2015 will be NFC-capable.

Existing aptiQ 13.56 MHz smart cards/multi-technology readers are already compatible with the new NFC technology, allowing users to deploy their own smartphones as their credentials to enable secure access into their facilities. When NFC-enabled phones are available, it won’t be necessary to replace your present smartcard/multi-technology readers. When transitioning and planning for future expansion, spanning the various technologies of the past, present and future with a multi-technology reader only makes sense.

Other Credentials

For higher-security applications that require multiple forms of verification, the smart card has an advantage, because it securely stores other credential types such as biometric templates, PIN codes and photos right onto the smart card. This provides an extra level of security at the access point, protecting the information behind closed doors or on the secure network, without added inconvenience to the user. For instance, more and more data rooms, laboratories and other “high asset value” rooms are being protected with biometrics to ensure that the person attempting to enter is the person who is authorized to have access. Of course, not all access points – such as the broom closet – are high security locales, so for these doors, keys may remain in service for some time.

With multiple types of credentials, it is imperative that an open architecture is selected for more flexibility and scalability, and a growth path. Remember, security applications are frequently installed in stages. Too often, over the years, different brands with various operating mechanisms can get installed, and the products operate independently, without integration into one system. This is usually due to the hardware and software systems being proprietary and not compatible with other components.

Security directors today need to choose access control systems that can be upgraded to create an enterprise security system: a system that can meet current safety and security issues, as well as accommodate emerging technologies that allow the system to expand and adapt as needed. Such solutions should be able to operate current technologies, as well as those under development, without compromising or risking investments in present systems.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.