SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Arizona State University pilots HID Global smartphone mobile access solution

Arizona State University pilots HID Global smartphone mobile access solution
Contact company
Contact HID
icon Add as a preferred source Download PDF version

Arizona State University (ASU) is committed to the ongoing use and management of advanced technology, including solutions that optimise security and convenience for students, faculty and staff.

In August 2011, the university launched a ground-breaking project to evaluate the benefits of moving its student housing keys onto NFC smartphones. Pilot participants accessed a campus residence hall and selected resident rooms using HID Global’s iCLASS® Secure Identity Object (SIO™) Enabled (iCLASS SE) credentials that were embedded into a variety of popular smartphones connected to all major networks.

Extending physical access control capabilities

HID Global’s iCLASS SE platform is based on a new, standards-based, technology-independent and flexible data structure that significantly improves security, portability and performance. It also extends physical access control beyond traditional physical cards and readers to enable the deployment of digital keys and secure identity credentials on smartphones and other devices.

Initial feedback from the ASU pilot project has been very positive. Participants report that, while they have often left their rooms without their keys and Sun Card campus IDs, they never forget their phones. Carrying their Sun Card credentials inside their NFC smartphones gives them confidence that they can always get back into their residence hall or room.

Focus on student safety and security

A leading innovator and long-time user of iCLASS access control credentials, ASU organises on-campus housing for approximately 13,000 students living in residence halls across four campuses. The university first adopted iCLASS technology for its Sun Cards in 2004 as part of a major safety and security initiative that was initially focused on ASU’s labs and other sensitive spaces. The initiative was extended over the years to include residential areas with a focus on student safety and security.

Today, students, faculty and staff carry a Sun Card for secure access to a variety of facilities. The university also was familiar with NFC technology and could envision providing services similar to its Sun Cards in smartphones. “When I first saw this technology used in other applications, I recognised the benefits it could bring to a university campus,” says Laura Ploughe, Director of Business Applications and Fiscal Control, University Business Services, at Arizona State University.

Making the most of mobile phones

As with any campus housing program, assigning rooms and distributing keys is traditionally a significant endeavour that takes many days and involves a large number of campus staff members and volunteers. Throughout the school year, residential life and facility management also must handle room re-assignments and the tasks of retrieving old keys and issuing new ones. There also is the matter of lost keys and associated costs. Although Sun Cards make the administrative tasks of key management easier, Sun Card management, too, is onerous. Moving access credentials to the phone seemed easier.

"Mobile phones are at the heart of campus life and play
a major role in facilitating the students’ social connections"

ASU was also keenly aware of the role cell phones play in students’ lives. “Mobile phones are at the heart of campus life and play a major role in facilitating the students’ social connections,” Ploughe says. “We are always looking for ways to help students succeed, and to engage with and deliver services to them in the same manner they engage with each other using their phones and social networks.”

ASU felt the cell phone was an ideal platform for carrying digital residence hall and room keys alongside the device’s other voice, data, memo, music, navigation, camera and game functionality. The university wanted to gain student feedback about the convenience and perceived security of using their smartphones for physical access control. It also wanted to determine the viability of transferring identity to a ubiquitous device that provides secure identity and can also be used for all functions associated with student life around campus.

HID Global iCLASS SE access control platform

HID Global deployed iCLASS SE readers and HES® electric strikes from ASSA ABLOY on secured doors to ASU’s Palo Verde Main hall. The readers communicate with a Lenel OnGuard® system installed by Kratos®. HID technology-enabled Sargent Profile Series electromechanical locks from ASSA ABLOY were deployed on selected resident room doors in the hall.

The 27 students and five staff members participating in the pilot were given NFC smartphones carrying next-generation iCLASS SE technology. To open door locks, pilot participants presented the phones to a door reader just like they do with their existing iCLASS-based Sun Cards. The embedded NFC short-range wireless communications technology in each of the phones enabled them to exchange access control data between the phones and door locks.

Significant improvements to security, portability and performance

All participants used their phones for residence hall access, and some also used them with a unique additional digital key and PIN to open individual room doors. The technology also supports over-the-air provisioning and management of digital keys, which simplifies access control administration. The underlying technology that makes this all possible is HID Global’s next-generation iCLASS SE access control platform and its SIO data structure.

Arizona State University student Sun Card
55% of students reported that the mobile access transactions were at least as fast as using traditional Sun Cards

SIOs on the credential side and SIO interpreters on the reader side perform similar functions to traditional cards and readers, with significantly improved security, portability and performance. SIO technology operates within HID Global’s Trusted Identity Platform® (TIP™) framework, which is designed to support a secure and trusted boundary for cryptographic key delivery.

The TIP framework ensures that SIO digital credentials can be securely provisioned on a variety of credential platforms, including smartphones and other mobile devices, no matter where users are located or how they are connected.

Results of pilot project

According to Ploughe, the pilot project has proven that a ubiquitous device can converge secure identity credentials and physical access control, and has endorsed the promise that NFC technology holds within the campus environment. The results from a participant survey included the following highlights:

  • Almost 79% of respondents reported that using a smartphone to unlock a door is at least as convenient or more convenient than using their existing Sun Card.
  • 55% reported that the mobile access transactions were at least as fast as using traditional Sun Cards.
  • Almost 90% of respondents said they would want to use a smartphone to open all doors on the ASU campus.
  • 85% of respondents said they were approached by others who saw them using their smartphones to unlock doors and had questions or comments about the technology. The majority of questions were how and where to get a similar smartphone for themselves, and the majority of comments were about the “coolness” of the technology.
  • Nearly all respondents expressed an interest to use their smartphone for other applications including meal, ticket and merchandise purchases, student recreation centre access, transit, and other typical Sun Card applications.

Remote credential management

Mobile access control delivers benefits to both administrators and the cell phone owner. Lost phones carrying digital keys are more likely to be noticed and reported than physical keys or ID cards. The mobile access control model also streamlines credential distribution and retrieval by enabling remote credential management throughout its lifecycle. It is also easier to modify applications and security parameters via software downloads and firmware updates, which eliminates the risk of key and/or card copying and simplifies the task of temporarily issuing new keys and cancelling them when lost or stolen.

“We were very impressed with the convenience of putting Sun Card credentials on NFC smartphones, as well as the enhanced security that is delivered by this next-generation of advanced access control system,” Ploughe says.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Electronic security systems
  • Campus security systems
  • Physical security
  • Security management
  • Security access systems
  • Electronic door locks
  • Electronic access control
  • Identity management
  • Facility security
  • Wireless security
  • Door security
  • Door access control
  • Security software
  • Data Security
  • Related links
  • ABLOY Access control systems & kits
  • ABLOY Access control controllers
  • ABLOY Mechanical digital locks
  • ASSA ABLOY Access control systems & kits
  • ASSA ABLOY Access control controllers
  • ASSA ABLOY Access control software
  • ASSA ABLOY Mechanical digital locks
  • HID Access control controllers
  • HID Access control software
  • Lenel Access control software
  • Lenel Access control controllers
  • Lenel Access control systems & kits
  • Trimec Mechanical digital locks
  • Trimec Access control controllers
  • ABLOY Electronic locking devices
  • Adams Rite / ASSA ABLOY Electronic locking devices
  • ASSA ABLOY Electronic locking devices
  • ASSA ABLOY Access control readers
  • HID Access control readers
  • Lenel Access control readers
  • Trimec Electronic locking devices
  • Trimec Access control readers
  • ASSA ABLOY Access control cards/ tags/ fobs
  • HID Access control cards/ tags/ fobs
  • Card Access control cards/ tags/ fobs
  • Card Swipe Access control systems & kits
  • Card Swipe Access control readers
  • Proximity Access control systems & kits
  • Smart Card Access control cards/ tags/ fobs
  • Smart Card Access control systems & kits
  • Proximity Access control readers
  • Smart Card Access control readers
  • Related categories
  • Mechanical digital locks
  • Access control software
  • Access control controllers
  • Access control systems & kits
  • Electronic locking devices
  • Access control readers
  • Access control cards/ tags/ fobs
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology acquires Sonitrol Ft. Lauderdale

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Education
About this page

"HID advanced access control tested at Arizona State University" is one of 9201 in-depth security application and installation case studies featured in this section. Visit regularly for the latest updates on use cases, installations and deployments of security products from HID, LenelS2, ASSA ABLOY, Kratos Public Safety & Security Solutions.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec