What Does Apple

What Does Apple's NFC-enabled iPhone 6 Really Mean for Access Control and Identity Management?

Not very much it would seem, as the NFC chip inside the new iPhone 6 smartphones is for now restricted to ApplePay only.

What Does Apple's NFC-enabled iPhone 6 Really Mean for Access Control and Identity Management?Both the new Apple Watch and iPhone 6 will have NFC capability and enable payments. However, the documentation for iOS 8 seems to confirm that there is no open access for developers to the NFC controller in the phone, and there are currently no NFC APIs in the iOS 8 SDK. So, currently, it's bad news for users and manufacturers of NFC-enabled accessories, like access control readers. Apple’s primary motivation for including NFC at this point seems to be keeping other payment wallets, like Google Wallet, off the iPhone.

Apple has some history in limiting developer access to new technology features. Access to the fingerprint scanner on the iPhone 5s was initially limited, but now they have opened up APIs so other apps can take advantage of it. Expect them to open up NFC access at some point in the near future.

Apple also gave a use case where their watch was used to enter a hotel room using the NFC chip. So, it would seem the watch will have some developer access when it launches next year, even if it is only to selected partners.

But really, what difference does this all make to the physical access control industry? NFC is just another communications option for manufacturers, and the reality is that other technologies provide the same security and convenience.

“Happily, Bluetooth Low-energy is actually a great technology for accomplishing the same tasks,” commented Steve Van Till, president & CEO of Brivo. “By the same token, QR codes are a lowest-common-denominator fallback across most mobile platforms when Bluetooth Low-energy is not available.”

(Brivo has developed their own API platform for social access management.)

Van Till continued, “So, in my view, the question isn't so much about NFC as it is about mobile credentials, and, yes, those are going to change access control considerably. Perhaps even more significant than the credential itself, and the possibility of 'frictionless' access, is the fact that system providers can now have an ‘app relationship’ with users as opposed to merely a ‘card relationship’. That's a game changer.”

With or without NFC, mobile credentials are inherently more secure for users than a smart card or fob. Users have an existing ‘close’ relationship with their smartphones; they are carried everywhere and used almost constantly.

“NFC technology and use of Mobile Phones as an Access Credential will continue to grow…, observed Mike Sussman, operations director at access control manufacturer, TDSi. “The key element in this will be the logistics and ease-of-use for the user, along with the end customer in terms of registering the users’ phone onto the access control system.

“The next 12 months will give us a better indication of where this technology is going, and the take up in the market place.”

About the Author

Jim McHale BSc is the founder of Memoori, a consultancy company that provides market research, business intelligence and financial deal tracking services to clients across several industries.

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3

  • SAFR® from RealNetworks

    SAFR® from RealNetworks

    A unique feature in SAFR version 3.4 is its ability to automate alerts to security personnel when a spoofing attempt or a fraudulent attempt to gain access is detected. 3

  • Dahua 2-Wire IP Video Intercom System

    Dahua 2-Wire IP Video Intercom System

    Dahua Technology is introducing a new line of expandable 2-wire IP video intercom solutions for the North America market. The New 2-wire IP video intercom is more advanced, cost effective, and designed to help businesses increase their security. 3