Dell and HID: Convergence?

Author: Brian Rhodes, Published on Mar 18, 2012

Convergence typically describes political or process integration. Beyond buzzword, it very seldom takes shape beyond in hardware. In this note, we detail a rare example of 'true' hardware convergence, examining a partnership between credential provider HID and computer manufacturer Dell.

Embedded iClass Reader

For several years, Dell and HID have furnished card readers as an embedded option in business class laptops (such as Latitude and Precision). The readers are designed to operate with HID Crescendo and iClass cards for contact credentials, and iClass for Contactless operation in the 13.56 MHz formats. The image below is an example of the embedded reader:

HID provides a stand alone credential management application named 'naviGO' to provision credential access on computers. Dual authentication security is possible when this form of credential is configured to be used with fingerprint scanners or PIN entry.

Dell has designed this application to run at a pre-OS level, requiring valid credentials for the computer to completely boot for use (termed 'PBA', or 'Pre Boot Authentication'). This provides an additional measure of security because many methods of data exploit require the computer to be fully booted and resident for success.

The additional cost of embedded readers vary by platform, typically cost less than $50 USD per computer. This is provided when configuring a laptop on Dell's website but may not be able for all configurations, depending on other product options selected.

This functionality is available for other computer manufacturers using an external USB reader. These mutli-format readers must be plugged into a fully booted computer in order to register, but can be purchased online for around $50 per device. The most commonly cited is Omnikey and a picture of it is provided below:

Application

With this, previously issued credentials for Electronic Access Control (EAC) Systems can now be used to provide logical access. This streamlines authentication and results in less passwords to remember and manage. Taking advantage of a previously issued credential lowers the overhead and administration costs of new credentials.

Convergence occurs through reuse of the credential rather than integration of the systems. The physical access and logical access control systems remain separate. However, the same credential used in the existing EAC system can now be used in the logical one. The administrator will need to take the badge number of the credential used in the EAC system and enter in to the logical system.

Conclusion

Unfortuantely, as important as 'convergence' sounds to be, many vendors struggle to adopt any tangible examples. This is a example of convergence beyond concept. Two industry players have collaborated in a smart way, and the end result is an integrated security method useful to end users.

Comments : PRO Members only. Login. or Join.

Most Recent Industry Reports

Favorite Access Control Manufacturers 2018 on Apr 26, 2018
150+ Integrators told IPVM "What is your favorite access control management software/system? Why? Unlike the 2016 access favorites where a group...
Last Day Save $50 - May 2018 Camera Course on Apr 26, 2018
Today is the last day to save $50 on early registration. Register now (save $50) for the Spring 2018 Camera Course This is the only independent...
Hikvision DarkfighterX Vs Darkfighter PTZ Tested on Apr 26, 2018
Hikvision has focused on improving low-light performance for PTZs, an area that has traditionally been a problem, even more so than fixed cameras,...
Digifort VMS Profile on Apr 25, 2018
Digifort, a Brazilian company, has a strong presense in their home country. In a crowded and mature Enterprise VMS market, will they be able to...
Death Of A Dummy Camera Manufacturer on Apr 25, 2018
5 years ago, IPVM gathered insights from a dummy camera manufacturer, who was then the top selling dummy camera provider on Amazon and 3rd in all...
Hikvision Critical Cloud Vulnerability Disclosed on Apr 25, 2018
Security researchers Vangelis Stykas and George Lavdanis discovered a vulnerability in Hikvision's HikConnect cloud service that: just by...
The Yolo Bro And The Death of Journalism on Apr 24, 2018
There's an old quote: The job of the newspaper is to comfort the afflicted and afflict the comfortable Unfortunately, the opposite is more...
DMP Adds Ring Video Doorbell Integration on Apr 24, 2018
Video doorbells have become one of the hottest items for security systems. After several years with no doorbell, DMP has announced integration with...
Milestone 2017 Financials Examined on Apr 24, 2018
For ISC West 2018, Milestone released ... their financials, touting "strong revenue growth in 2017". However, there were discrepancies with the...
Chinese Manufacturer Kickstarter Campaign Huge Success (EverCam) on Apr 23, 2018
In a week, a Chinese manufacturer's expertly done Kickstarter campaign has received $1.4 million in pledges, an incredible amount for a video...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact