Dell and HID: Convergence?

Author: Brian Rhodes, Published on Mar 18, 2012

Convergence typically describes political or process integration. Beyond buzzword, it very seldom takes shape beyond in hardware. In this note, we detail a rare example of 'true' hardware convergence, examining a partnership between credential provider HID and computer manufacturer Dell.

Embedded iClass Reader

For several years, Dell and HID have furnished card readers as an embedded option in business class laptops (such as Latitude and Precision). The readers are designed to operate with HID Crescendo and iClass cards for contact credentials, and iClass for Contactless operation in the 13.56 MHz formats. The image below is an example of the embedded reader:

HID provides a stand alone credential management application named 'naviGO' to provision credential access on computers. Dual authentication security is possible when this form of credential is configured to be used with fingerprint scanners or PIN entry.

Dell has designed this application to run at a pre-OS level, requiring valid credentials for the computer to completely boot for use (termed 'PBA', or 'Pre Boot Authentication'). This provides an additional measure of security because many methods of data exploit require the computer to be fully booted and resident for success.

The additional cost of embedded readers vary by platform, typically cost less than $50 USD per computer. This is provided when configuring a laptop on Dell's website but may not be able for all configurations, depending on other product options selected.

This functionality is available for other computer manufacturers using an external USB reader. These mutli-format readers must be plugged into a fully booted computer in order to register, but can be purchased online for around $50 per device. The most commonly cited is Omnikey and a picture of it is provided below:

Application

With this, previously issued credentials for Electronic Access Control (EAC) Systems can now be used to provide logical access. This streamlines authentication and results in less passwords to remember and manage. Taking advantage of a previously issued credential lowers the overhead and administration costs of new credentials.

Convergence occurs through reuse of the credential rather than integration of the systems. The physical access and logical access control systems remain separate. However, the same credential used in the existing EAC system can now be used in the logical one. The administrator will need to take the badge number of the credential used in the EAC system and enter in to the logical system.

Conclusion

Unfortuantely, as important as 'convergence' sounds to be, many vendors struggle to adopt any tangible examples. This is a example of convergence beyond concept. Two industry players have collaborated in a smart way, and the end result is an integrated security method useful to end users.

Comments : PRO Members only. Login. or Join.

Most Recent Industry Reports

Casino Security Consultant Carl Lindgren Interview on Mar 26, 2019
For more than 20 years, Carl Lindgren worked as a casino surveillance pro, while being active (and sometimes outspoken) on various online video...
Lenel Favorability Results 2019 on Mar 26, 2019
The positive news for Lenel is that integrators do not dislike them as much as they used to.  The negative news for Lenel is that integrators...
9 UK MPs Call Out Hikvision Over Human Rights Violations on Mar 26, 2019
A group of nine MPs in the UK has released a letter calling out Hikvision for its surveillance deals in Xinjiang and Tibet, alleging Hikvision...
Access Control Course Spring 2019 on Mar 26, 2019
The member's price is normally $299, but register early for a $50 discount, for a price of $249. The price covers classes, personal help and...
UTC Interlogix Series 6 Tested on Mar 25, 2019
UTC Interlogix has long been deceptively OEMing Hikvision as our 2017 results show. Now, Interlogix is back with their newest IP camera series,...
Outdoor Camera Installation Guide on Mar 25, 2019
Outdoor camera installation can be fraught with problems. Creating a sturdy and weather tight mount is key for camera performance and longevity,...
Favorite Video Storage / Server Manufacturers 2019 on Mar 25, 2019
189 integrators answered this question: "What is your favorite storage device / server manufacturer for recording video? Why?" In general...
IBM / Genetec Surveillance System Investigated Over Philippines Human Rights Abuses on Mar 22, 2019
A lengthy investigation into an IBM video surveillance project in the Philippines, raising concerns IBM helped local police conduct a bloody...
Eagle Eye Favorability Results 2019 on Mar 21, 2019
Eagle Eye has been the biggest spender in the cloud VMS market including (via their owner) acquiring Brivo for $50 million and CameraManager from...
Large Hospital Security End User Interview on Mar 21, 2019
This large single-state healthcare system consists of many hospitals, and hundreds of health parks, private practices, urgent care facilities, and...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact