Access control readers - Expert commentary

The growth of the mobile access card market in 2020
The growth of the mobile access card market in 2020

The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.

Entrance control vs access control: similarities and differences
Entrance control vs access control: similarities and differences

Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorised personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognising the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorised person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorised users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.

Making the shift from manufacturer to service provider
Making the shift from manufacturer to service provider

The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be  highly functional, flexible, and convenient for organisations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The role of the cloud The cloud has proven to be a highly functional, flexible, and convenient method for organisations to leverage as part of their strategies to protect and modernise their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalising on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.

Latest Hanwha Techwin Europe news

Hanwha Techwin introduces Face Mask Detection application to support the businesses reopening during COVID-19
Hanwha Techwin introduces Face Mask Detection application to support the businesses reopening during COVID-19

Coinciding with the recent launch of the Occupancy Monitoring application designed to help implement social distancing rules, Hanwha Techwin has also introduced a Face Mask Detection application which will further help businesses operate in a COVID-19 affected world. Wearing a mask is believed to prevent the spread of COVID-19 and has already been adopted as a safety measure in many workplaces. However, the availability of the Face Mask Detection application could not come at a better time with the World Health Organisation (WHO) now recommending the use of face masks wherever social distancing is difficult. The UK government is also making it compulsory to wear a face covering when visiting or working within healthcare facilities and when using public transport. Innovative video analytics An Alarm Out feature can also be used to turn on a device such as a warning beacon The UK is not alone in introducing regulations to ensure the wearing of face coverings. In Germany, for example, it is necessary to do so when on public transport and while shopping, and in Spain everyone older than six, has to wear masks in indoor public spaces and outdoors when it is not easy for people to keep more than two metres apart. The Face Mask Detection application developed by Hanwha Techwin’s technology partner, a2 Technology, runs on open-platform Wisenet X Series cameras and uses innovative video analytics to detect if a person entering an area is not wearing a mask. This will trigger the playing of a customisable audio message such as ‘please wear a face mask’. Fixed lens cameras The audio message is generated via an audio support feature built into Wisenet X cameras, negating the need for a PC or a separate audio storage device to be installed nearby. A short cable is all that is required to connect a speaker to the camera. An Alarm Out feature can also be used to turn on a device such as a warning beacon. The application, which simultaneously detects and analyses up to 4 people and can detect people at a distance up to 5 metres from a camera, is not affected by glasses, hats or scarfs, is also able to detect if a mask is not being correctly worn. A digital zoom-in function, which is designed to be used with fixed lens cameras, assists installers to configure the application so that it focuses on a specific region of a camera’s field of view if it is considered to be too wide. Edge-based solution The Face Mask Detection application can be ordered pre-loaded on selected Wisenet X models as an out-of-the-box solution. These are: XNB-6000/MSK Network box camera XNO-6080/MSK Network IR bullet camera XND-6010/MSK Network dome camera XNV-6011/MSK Vandal-resistant network dome camera As is the case with all Wisenet X Series cameras, these models are equipped with SD/SDHC/SDXC memory slots, enabling images associated with incidents of people not wearing masks or not wearing them correctly, to be stored locally. There is also the option for the images to be stored on an FTP server. Video Management Software We fully understand our responsibilities in terms of offering solutions which are fit for purpose" A web-based interface enables users to receive alerts via a desktop PC. The application has also been integrated with the Wisenet WAVE 4.0 Video Management Software (VMS) platform which, with its ‘Layout-as-an-Action’ feature, enables a predefined screen layout to be automatically opened when an event occurs. This makes it even easier for operators to verify there has been an infringement of mask wearing rules. “The Face Mask Detection application is an excellent example of how video surveillance technology is able to help people safely go about their every-day business,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. Occupancy Monitoring applications “With lives sadly at stake, we fully understand our responsibilities in terms of offering solutions which are fit for purpose, such as the Face Mask Detection and Occupancy Monitoring applications." "Over the coming weeks we will therefore continue to work in-house and with hand-picked technology partners to develop additional practical solutions which will robustly assist offices, factories, hospitals, art galleries and museums, places of worship, transport facilities and many other types of businesses and organisations, to safely open their doors to the public.”

Hanwha Techwin unveils Wisenet P Series AI cameras-compatible, edge-based Occupancy Monitoring application solution
Hanwha Techwin unveils Wisenet P Series AI cameras-compatible, edge-based Occupancy Monitoring application solution

Help is immediately on hand for businesses who are urgently seeking to safely re-open their doors following the easing of COVID-19 related restrictions. Hanwha Techwin’s licence-free Occupancy Monitoring application provides retailers, places of worship and museums, as well as leisure facilities, pubs, clubs and restaurants, with highly accurate data on the number of customers on their premises at any particular time. Edge-based Occupancy Monitoring Compatible with the recently introduced Wisenet P Series AI cameras, the edge-based Occupancy Monitoring application simultaneously counts the number of people entering or leaving a building. When the maximum permitted number of people has been reached, the application generates alarm outputs to control automatic doors or a traffic beacon, as well as ‘wait’ or ‘enter’ messages that can be displayed on a monitor. Serverless solution The Occupancy Monitoring application has the power to aggregate and process data from multiple cameras The Occupancy Monitoring application has the power to aggregate and process data from multiple cameras and is therefore, ideal for buildings with multiple entrances and exits. As a serverless solution, it negates the need for system integrators to spend time configuring complicated server-side software. It also significantly reduces the capital cost of a project as the end-user does not need to incur the cost of buying a server. Deep Learning AI built into cameras With the support of Deep Learning AI built into the cameras, the Occupancy Monitoring application offers the additional benefit of being able to accurately count people even when a camera is wall mounted. Unlike less accurate people counting solutions which use conventional video analytics, the camera does not have to be mounted on a ceiling to provide an overhead field of view. This means, the camera can be simultaneously used for security purposes and people counting, and users are also able to take advantage of a host of additional video analytics applications which can be run onboard the camera, including heat map and intrusion, loitering and people/object detection. The new Wisenet Occupancy Monitoring application is compatible with the following cameras: PNB-A9001 - 4K AI box camera PNO-A9081R - 4K AI bullet camera PNV-A9081R - 4K AI vandal-resistant dome camera with built-in IR illumination PND-A9081RF - 4K AI flush-mount dome camera with built-in IR illumination PND-A9081RV - 4K AI dome camera with built-in IR illumination Time and cost savings The dome cameras have a four-part magnetic modular design, which makes them extremely easy to install The dome cameras have a four-part magnetic modular design, which makes them extremely easy to install. The ability to prefigure IP network settings without the need to remove the camera modules from their packaging also reduces the time an engineer has to spend on site, thereby enabling companies with multiple sites to rapidly roll-out the application with minimal disruption to their business. Wisenet P Series AI cameras The high-performance and feature-rich Wisenet P Series AI cameras will continue to deliver significant benefits beyond the immediate requirement to support the Occupancy Monitoring application during COVID-19. In addition to being used to detect and monitor any criminal activity, they can easily be redeployed to capture valuable business intelligence and help companies improve productivity. Retailers, in particular, can analyse the impact of any marketing activities on footfall and by identifying a store’s busiest times, better manage the peaks and troughs of customer flow at checkouts. Integrated with Wisenet Retail Insight (v2.0) In this respect, the cameras are supported by Wisenet Retail Insight (v2.0), a business intelligence solution, which utilises people counting, heat mapping and queue management applications to display statistical analytics on a centralised dashboard, along with other practical information such as weather reports. With the help of AI algorithms onboard the Wisenet P Series AI cameras, Retail Insight is also able to display an estimated age and gender of store visitors. Hanwha Techwin has always been able to rapidly respond to changing market demands" Licence-free solution “At this most challenging of times for our communities and the economy, we are proud to have the opportunity to contribute to the efforts being made to recover from the effects of COVID-19 by offering the Occupancy Monitoring application as a licence-free solution,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. Uri adds, “With the security budgets of many businesses being stretched, we have felt a social responsibility to offer the application licence-free and in doing so, help maximise the number of end-users who are able benefit from it.” He further said, “Hanwha Techwin has always been able to rapidly respond to changing market demands and with countless businesses extremely eager to re-open, we have yet again been able to rise to the challenge. This rapidly deployable, innovative and highly effective solution can offer peace of mind by assisting the implementation of social distancing rules at any building open to the public.”

Security and Safety Things GmbH reshapes video analytics and computer vision with IP cameras
Security and Safety Things GmbH reshapes video analytics and computer vision with IP cameras

Security & Safety Things GmbH (S&ST) is set to reshape innovation in video analytics and computer vision with the commercial availability of a number of new smart IP security cameras, from a variety of vendors, that leverage the Security & Safety Things open and secure IoT platform. This new generation of security cameras will operate using the free S&ST camera operating system, which enables the cameras to run multiple AI-enabled applications in parallel. The apps automate the analysis of video data to produce valuable operational intelligence for business optimisation as well as provide easy to deploy tools that can aid in re-opening measures from the COVID-19 pandemic. Pandemic health and safety mandates “Organisations of all sizes around the world need flexible, easy to deploy solutions that enable compliance with constantly changing pandemic health and safety mandates and provide future value to ramp up and optimise their ongoing business operations,” says Hartmut Schaper, chief executive officer, Security & Safety Things. Companies can now deploy cameras, running the S&ST OS and using a selection of apps" “Companies can now deploy cameras, running the S&ST OS and using a selection of apps from our Application Store, to detect the absence of facial coverings in a retail environment. Tomorrow, the same camera can help that same retailer to optimise merchandise placement based on store foot traffic, in one store or throughout the enterprise, along with further optimisations.” IP-based surveillance footage Qisda/Topview will be the first camera manufacturer to launch a camera running the S&ST OS in May, followed in quick succession by AndroVideo, who will also start shipping their S&ST enabled cameras in Q2. Bosch is making their INTEOX camera line available as of July followed by camera firms Vivotek and BSTsecurity who plan to ship a bit later in Q3. The first devices from Hanwha Techwin that run the S&ST OS are expected to be commercially available in Q4. Security & Safety Things, Hanwha, Vivotek, Bosch, Qisda/Topview, and AndroVideo are also all proud members of the OpenSecurity and Safety Alliance (OSSA). The free Security & Safety Things OS is built on the Android Open Source Project (AOSP). It leverages the expanding processing and analytic power of modern IP cameras to exponentially increase the amount of operational intelligence that can be mined from traditional IP-based surveillance footage. Drone threat detection It already features more than 50 applications from more than 35 developer partners The applications that can be installed on these cameras, both in an on-premise as well as a remote setting, are created by highly specialised third-party developers and are available through the platform’s open Application Store. It already features more than 50 applications from more than 35 developer partners, with more than 30 additional apps expected to hit the store soon. In addition to pandemic applications, use cases include detection of weapons, behavioural analysis, payment systems for parking garages, drone threat detection and even identifying objects presented for purchase in a cash register transaction for cashier-free retail environments. Security & Safety Things, together with some of its camera and system integration partners are already running projects in a live setting. These projects use, for example, heat mapping and queue analysis in retail stores and automated payment processing and license plate recognition for barrier free traffic. These types of applications are running in pilots with the parking management solutions provider Peter Park as well as with the mobility provider SIXT.

Related white papers

RFID and smartphone readers in physical access control

3 reasons to migrate to a new access control system

5 steps to finding the right access control system for you