HID 'Twist and Go' Access Control

By: Brian Rhodes, Published on Sep 30, 2014

Credential giant HID Global is making it easier to use cell phones as credentials. Instead of pushing buttons to turn on an app, users need only to raise and tilt their phones in a concept HID calls 'Twist & Go'.

We examine how HID has implemented gesture controls in their mobile credential, the limitations on deploying this with existing systems and what competitive impact this may have.

********** ***** *** ****** is ****** ** ****** to *** **** ****** as ***********. ******* ** pushing ******* ** **** on ** ***, ***** need **** ** ***** and **** ***** ****** in * ******* *** calls '***** & **'.

** ******* *** *** *** implemented ******* ******** ** ***** mobile **********, *** *********** on ********* **** **** existing ******* *** **** competitive ****** **** *** have.

[***************]

"Twist & **"

************** **** ******** * year ***, *** **** ********** ********* ** activate ****** ***********. *** process ** ****** ** demonstrate **** ********, ** shown ** **** ********* of * ********** ****:

*** **** ****** ***** phone ****** ** *** reader, **** ******* ** 90 ******* ********* ** enact * ********** **** from *** ***** ** the ******.

Product *********

********* ** ********* ** part ** ***'* ****** ****** ******** ******* **** ******* and *** ***** ***********. However, ** ******* ***** is **** **** ** the ******** ******* ****** from *** ** **** it ****, * ***** the ********* ********* **:

"(***** & **) ** **** only ** **** ** a ******** ******** **** ******** the ********* **********:

  • ***, ******-******* ******* (******** ** ********** ** with *******-********* **********)
  • *** ****** ****** ******* Bundle, **** ****** ***, HID ****** ******** ******** portal (* ****** *******), and *** ****** ****** App"

** ***** ** ***** Twist & **, * whole *** ********** ********** platform, ********** ****, *** reader ******* ** ****** required.

*** ***** **********, *** full ***** ********* "***** & **" ** ******** below:

*** ** ***

***** & ** ***** with **** ***********. ****** than ***** ******** **** as ** *** **********, Twist & ** **** Bluetooth *** ****** ** well. *** **** *** more ****** ******** **** BLE ** ***, *** the ********* ******** ***** with *** ** **** longer; ** ** *** feet ** *" - 4". ******* ****** ************, like ******* *** *****, benefit **** **** ****** range.

***** ************* *****

****** **** ******* ** inexpensive**** **************, ***** & ** uses *** ***** ***** integrated **** ***********. ***** are ********* ******-******* *** more ********** **** *********, semi-disposable *********.

No ******** *************

******** ***** & ** takes **** **** **** adding ****** *********** ** a ******; ** **** requires ********* ** ***'* latest ******* (******/********** **) **** ********* ******* credentials.

**** ***** **** *********** all ****** ******* **** need * ****** *******, with **** ***** ********* in *** **** *** months *********** ****** *** right ******. *** **** of **** ******* ***** will ** ******* ******* to ********* ** ******* for **** *******.

Credential ******** ******

********* ********* '********' **** ** essentially ******* *** ********** turned *** ***** ************ activated.  ****** * **** that *** ** ********* energized *** **** ******* the **** ***** *****, gesturing ******** ******** ********** of *** ********** *****, greatly ******** *** ****.

**** * ********* **********, Twist & ** ***** users **** *** **** to **** ** ** app *** ***** ******* on *** ***** ** a ******. **** *** credential *** ******* ** the **********, ***** **** only **** ** ******* the ***** ** ******** a **********.

The ******

** ** ***** ******** in ***'* ******* *********** *******, "***** & **" is **** *** ******** implementation ********* ** *** patents. **** ***-****** **** accelerometers, ** ** ******** to *************************-***** *********** *************** ** **** **** use *********.

****, ***** "***** & Go" ** * ****** movement, ** ** *** the **** ******* ******* described ** *** ****** documents: 

******, "***** & **" may ** *** ***** of ******* '********' ******** that ******** ********* ******** or ********* ********* *********** for * ***** ** systems.

Market ******

***** '***** & **' makes ********** ************* ****** to ***, *** ***** has * *** ****** battle ****** ********** ********** adoption ** ****** *********** is * *******. *** many*********** ** ***********, *** prospect ** ***** ******** phones (****) ** ***** a ****** *****. ******** with *** ********** ********** required ****** *** **** or **** ******, ****** service *****, *** ***** ID ******, ****** ***** based *********** ****** **** problems **** **** *****.

Comments (11)

Since this is bluetooth enabled.... could this be a potential deathknell for the long range readers that require a 1'x1' surface area, and extra power supplies - or the even longer credentialed readers from AWID and Farpointe that require seperate credentials to read farther distances?

Bluetooth has a pretty long range.

No, I think no one will use this simply because it is Bluetooth. Not too many people walk around with their bluetooth constantly enabled for security and battery life reasons

Yes, and I have yet to see where bluetooth reads as fast as a normal contactless card.

I don't mean transfer rate. I mean the amount of time it takes the devices to 'see each other' so they can pair and trade data.

We've tested a few BLE equipped devices, (for example Lockitron) and it always took a few seconds of waiting before connections were made. In an access control application, even a half-second delay can be too long, and two or three full seconds feel eternal.

In the HID video it seems to go quick, but thats also an advertisement for HID.

You know, the "twist and go" feature could be there to help mask that delay.

I think it is that quick if you are already connected to the reader.

If your phone is paired with other things (like your car or ear mic), it might take a few seconds to switch over and connect.

Just checking? Does this output a Wiegand based "card number"? I guess you set it up from the website, send the user a link, they input the code as seen on the video on the HID website. The phone transmits a token to the reader when twisted, in effect like a card?

I am looking to integrate this solution with a paxton system so would require a actual wiegand or even clock and data code?

The way HID has implemented this, the phone communicates with the reader via BLE, so you'd need to 'buy in' to HID mobile credentials and use iClass SE readers to use it with a Paxton system.

Here's the Twist & Go spec sheet detailing this.

Thanks Brian :) So in a traditional method a reader would detect the token and transmit via wiegand to the Paxton control unit as a 8 digit code. I guess this code is available to view on the HID enrollment / license website or is it hidden ?

Maybe another way to getting this would be to "twist and go" a HID se reader and have that reader setup in Paxton as a desktop reader so the code is read into the Paxton system - this brings me to my last part. I guess this code must be fixed? :)

The access control code is visible to the administrator through the HID enrollment website. You can also export a csv file of users with card numbers and other user data to import into your access system. The admin can choose whether or not to make it visible on the card image shown on the mobile device. When you establish your account (which requires purchase of 100 mobile credentials), you get to select what card format you want your mobile credentials to have.

Thank you for this, perfect :)

Does anyone know ballpark cost on licensing for HID mobile access?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Nortek Mobile Access Reader BluePass Examined on Feb 12, 2019
Nortek's Linear access control division claims to make mobile credentials "more secure and easier to use than ever before" with their BluePass...
HID Launches Origo To Fix Mobile Credential Problems on Feb 05, 2019
HID is releasing Origo, an overhaul of its mobile credential platform, this time drastically restructuring the way it is priced and packaged. HID's...
Proxy Access Control Tested on May 09, 2019
Silicon Valley Access Startup Proxy raised $13.6 Million in May 2019, focusing on mobile physical access control. Beyond the fund raising, Proxy...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Nortek Blue Pass Mobile Access Reader Tested on Jul 11, 2019
Nortek claims BluePass mobile readers are a 'more secure and easy to use approach to access', but our testing uncovered security problems and...
Mobile Access Control Shootout - Farpointe, HID, Openpath, Nortek, Proxy on Jul 29, 2019
One of the biggest rising trends in access control is using phones as credentials but which offering is best? IPVM has tested five of the...
Mobile Access Control Guide on Aug 28, 2019
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this...
Fingerprints for Access Control Guide on Sep 09, 2019
Users can lose badges, but they never misplace a finger, right? The most common biometric used in access are fingerprints, and it has become one...
Directory of Access Reader Manufacturers on Nov 27, 2019
Credential Readers are one of the most visible and noticeable parts of access systems, but installers often stick with only the brand they always...

Most Recent Industry Reports

'Severe Impact' Mercury Security 2020 Leap Year Firmware Issue on Jan 17, 2020
One of the largest access controller manufacturers has a big problem: February 29th. Mercury Security, owned by HID, is alerting partners of the...
Apple Acquires XNOR.ai, Loss For The Industry on Jan 16, 2020
Apple has acquired XNOR.ai for $200 million, reports GeekWire. This is a loss for the video surveillance industry. XNOR.ai stunned the industry...
Installation Course January 2020 - Last Chance on Jan 16, 2020
Thursday, January 16th is your last chance to register for the Winter 2020 Video Surveillance Installation Course. This is a unique installation...
Halo Smart Vape Detector Tested on Jan 16, 2020
The Halo Smart Sensor claims to detect vaping, including popular brand Juul and even THC vapes. But how well does it work in real world...
PRC Government Entity Now Controlling Shareholder of Infinova / March Networks on Jan 16, 2020
A PRC government entity is now the controlling shareholder of US security manufacturer Infinova as well as its wholly-owned subsidiary March...
Network Cabling for Video Surveillance on Jan 15, 2020
In this guide, we explain the fundamentals of network cabling for video surveillance networks, how they should be installed, and the differences in...
ONVIF Trashed Statement, Confirms Dahua and Hikvision Still Suspended on Jan 15, 2020
ONVIF has 'trashed' the suspension statement for Dahua, Hikvision, Huawei, etc. but confirms to IPVM that those companies are all still...
Wyze Smart Door Lock Test on Jan 14, 2020
Wyze's inexpensive cameras have grabbed the attention of many in the consumer market, but can the company's new smart lock get similar...
Wesco Wins Anixter on Jan 13, 2020
Despite Anixter earlier arguing that Wesco's bid was inferior to CD&R's by nearly 10%, Anixter confirmed that they are taking Wesco's 3.1%...
Anixter Resisting Takeover From Competitor, Bidding War Emerges, Wesco Wins on Jan 13, 2020
Mega distributor Anixter is going to be acquired but by whom? Initially, Anixter planned to go private, being bought by a private equity firm....