Dell and HID: Convergence?

By: Brian Rhodes, Published on Mar 18, 2012

Convergence typically describes political or process integration. Beyond buzzword, it very seldom takes shape beyond in hardware. In this note, we detail a rare example of 'true' hardware convergence, examining a partnership between credential provider HID and computer manufacturer Dell.

Embedded iClass Reader

For several years, Dell and HID have furnished card readers as an embedded option [link no longer available] in business class laptops (such as Latitude and Precision). The readers are designed to operate with HID Crescendo and iClass cards for contact credentials, and iClass for Contactless operation in the 13.56 MHz formats. The image below is an example of the embedded reader:

HID provides a stand alone credential management application named 'naviGO' to provision credential access on computers. Dual authentication security is possible when this form of credential is configured to be used with fingerprint scanners or PIN entry.

Dell has designed this application to run at a pre-OS level, requiring valid credentials for the computer to completely boot for use (termed 'PBA', or 'Pre Boot Authentication'). This provides an additional measure of security because many methods of data exploit require the computer to be fully booted and resident for success.

The additional cost of embedded readers vary by platform, typically cost less than $50 USD per computer. This is provided when configuring a laptop on Dell's website but may not be able for all configurations, depending on other product options selected.

This functionality is available for other computer manufacturers using an external USB reader. These mutli-format readers must be plugged into a fully booted computer in order to register, but can be purchased online for around $50 per device. The most commonly cited is Omnikey and a picture of it is provided below:

Application

With this, previously issued credentials for Electronic Access Control (EAC) Systems can now be used to provide logical access. This streamlines authentication and results in less passwords to remember and manage. Taking advantage of a previously issued credential lowers the overhead and administration costs of new credentials.

Convergence occurs through reuse of the credential rather than integration of the systems. The physical access and logical access control systems remain separate. However, the same credential used in the existing EAC system can now be used in the logical one. The administrator will need to take the badge number of the credential used in the EAC system and enter in to the logical system.

Conclusion

Unfortuantely, as important as 'convergence' sounds to be, many vendors struggle to adopt any tangible examples. This is a example of convergence beyond concept. Two industry players have collaborated in a smart way, and the end result is an integrated security method useful to end users.

1 report cite this report:

Proxy Raises $42 Million on Mar 17, 2020
Startup Proxy has raised $42 million, an astounding amount for the access...
Comments : Members only. Login. or Join.

Related Reports

Open Access Controller Guide (Axis, HID, Isonas, Mercury) on Sep 19, 2019
In the access control market, there are many software platforms, but only a...
Low-Tech Access Control: Master Keying Explained on Jan 09, 2020
Mechanical keys are one of the most fundamental forms of access control....
Milestone Presents XProtect On AWS on May 04, 2020
Milestone presented its XProtect on AWS offering at the April 2020 IPVM New...
Access Control Door Controllers Guide on Oct 22, 2019
Door controllers are at the center of physical access control systems...
Cisco Acquiring Fluidmesh on Apr 09, 2020
Cisco announced it is acquiring niche wireless manufacturer...
Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring...
Fail Safe vs. Fail Secure Tutorial on Oct 02, 2019
Few terms carry greater importance in access control than 'fail safe' and...
Keypads For Access Control Tutorial on Jul 28, 2020
Keypad readers present huge risks to even the best access systems. If...
HID Presents Mercury Security & Aero Access Controllers on Aug 25, 2020
HID presented Mercury Security & Aero Access Controllers at the 2020 IPVM...
HID Releases VertX Replacement Aero on Aug 10, 2020
HID is replacing two established and broadly supported types of access...
Genetec Security Center 5.9 Release Examined on Feb 06, 2020
Genetec released the next major version of Security Center, less than a year...
New: Mobile Access Proxy Releases 'World's Smallest Mobile Reader' on Mar 04, 2020
Mobile access provider Proxy claims its new Nano is 'the world’s smallest...
Disruptor Wyze Releases Undisruptive Smartlock on Dec 06, 2019
While Wyze has disrupted the consumer IP camera market with ~$20 cameras, its...
Sequr Presents HID based Cloud Access Control on Jun 04, 2020
Sequr presented HID based Cloud Access Control at the May 2020 IPVM Startups...
Use Access Control Logs To Constrain Coronavirus on Apr 09, 2020
Access control users have included capabilities that are not commonly used...

Recent Reports

OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
The Future of Metalens For Video Surveillance Cameras - MIT / UMass / Immervision on Sep 25, 2020
Panoramic cameras using 'fisheye' lens have become commonplace in video...
Hikvision Sues Over Brazilian Airport Loss on Sep 24, 2020
Hikvision was excluded from a Brazilian airport project because it is owned...
China General Chamber of Commerce Calls Out US Politics on Sep 24, 2020
While US-China relations are at an all-time low, optimism about relations...
Verkada Disruptive Embedded Live Help on Sep 24, 2020
Call up your integrator? Have someone come by the next day? Verkada is...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Norway Council of Ethics Finds Hikvision Human Rights Abuses "Ongoing" on Sep 23, 2020
Hikvision's involvement in "serious human rights abuse" in Xinjiang is...
IPVM Camera Calculator User Manual / Guide on Sep 23, 2020
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The...
Installation Course Fall 2020 - Save $50 - Last Chance on Sep 22, 2020
This is a unique installation course in a market where little practical...
SimpliSafe Business Security Launched Examined on Sep 22, 2020
SimpliSafe has launched "SimpliSafe Business Security" that the company...
FLIR CEO: Many New Fever Entrants "Making Claims That The Science Just Won't Support" on Sep 22, 2020
FLIR's CEO joins a growing number calling out risks with fever / screening...
China Bems Temperature Measurement Terminal Tested on Sep 22, 2020
Guangzhou Bems (brand Benshi) is the manufacturer behind temperature...
Axis Exports To China Police Criticized By Amnesty International on Sep 21, 2020
Axis Communications and other EU surveillance providers are under fire from...
Milestone XProtect on AWS Tested on Sep 21, 2020
Milestone finally launched multiple cloud solutions in 2020, taking a...