Near Field Communication

PRYME RADIO credits IEEE for contributing to its lasting communications achievements

For over a century, IEEE's mission has been to advance technology for the benefit of humanity. As the world’s largest technical professional organisation, IEEE’s global community includes over 420,000 members in engineering, computing and technology, collaborating on communications, consumer electronics, robotics, sustainable energy, aerospace, life sciences, and many other critical initiatives. Dave George felicitated with IEEE Life Membership Dave George has been an active IEEE me...

Nortech’s technical director Amer Hafiz highlights evolution and importance of identity credentials in access control

Amer Hafiz, technical director at Nortech Control Systems, reviews the evolution of identity credentials in access control. Access control is defined as ‘the selective restriction of access to a place or other resource’. For an automatic access control system to function, it requires a means of identifying individuals to determine their access rights. The form of identification can be anything from a memorised password or PIN (personal identification number) to biometrics (measuremen...

iLOQ hosted a seminar event in Finland to celebrate 15 years in digital access management

On 5 October, iLOQ celebrated its 15th anniversary by hosting a unique business seminar and customer event in Helsinki, Finland. As a part of the celebrations, iLOQ CEO, Heikki Hiltunen, revealed the company’s new brand identity to staff, partners and key customers from Finland and abroad. “Anniversaries are a time to be proud of what we’ve achieved so far; but they also give us the chance to focus on the next stage in our journey, and to a future that’s full of potentia...

Nortech offers smart people identification using mobile access technology for MACE platform

People and vehicle access control specialist Nortech is now offering smart people identification using mobile access technology. The Nedap MACE platform allows any access control system to use smartphones as access credentials. The platform consists of a cloud-based service, readers and the MACE app. The MACE app can receive and store multiple virtual identity credentials. The credentials can be presented to MACE readers using NFC, Bluetooth Low Energy or QR codes. The process of issuing these...

HID Global combats counterfeiting with its IoT-based brand protection solution

Protecting major brands against counterfeiting and grey market activities is a global challenge, which yields the same result regardless of the industry: lost sales and a poor customer experience that are damaging to the brand. HID Global, a worldwide provider of trusted identity solutions, has responded to this escalating issue by increasing its investments in HID’s IoT-based brand protection services and expanding its community of partners who develop and deliver seamless front-end expe...

What are the obstacles to adoption of mobile credentials for access control?

Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Exper...