Critiquing HID's 'Access Control Goes Mobile' Presentation

Author: Brian Rhodes, Published on Apr 11, 2012

Are Mobile Credentials ready for primetime?  ASSA ABLOY / HID, who have invested heavily in the technology, posted a webcast of their joint 'Access Control Goes Mobile' event at ISC West. Using mobile devices to host access credentials is a growing trend, with recent development centering around the inclusion of NFC technology into credential readers, door hardware, and smartphone devices. In this note, we examine the key takeaways from that presentation.

We have embedded the entire webcast here for reference. (note: the player omits timestamps so its hard to track by time):

In the webcast, HID / ASSA makes a number of important points:

    • NFC credentials will be administered differently than traditional keys or cards. HID stated that (mobile keys are) "a quantum leap in access control" by "replicating existing credentials and depositing them on a mobile device". These differences were demonstrated by HID through "over the air provisioning and revocation" via a web based mobile services portal.
    • In what was introduced as "the next frontier" for IT management control, the growing issue of securing "foreign devices accessing corporate networks" was mentioned but not completely addressed. HID states that while "many different companies are looking it today", the problem still has no comprehensive solution. This point was clearly illustrated by a confusing software demonstration that enables secure VPN connections from mobile devices to a corporate networks, but does nothing to secure or ensure safe condition of end point devices.  
    • "NFC does not include support for Picture IDs" and the feature is not roadmapped for development.
    •  HID acknowledged that mobile credentials are not the answer for every access control situation. They clearly stated "card credentials are not going away" and mobile credentials are "not a direct replacement" for card credentials. ASSA declares that "NFC is only a portion of the complete access control envelope" and is most valuable applied to the 95% of openings currently not incorporated in any electronic access control system. ASSA illustrated this point through the following chart they titled 'The Security Continuum':

Analysis

1. Because NFC credentials rely on interoperability between credentials and devices, credential management becomes a huge operational concern. The process of provisioning  and managing NFC credentials will be unlike anything currently being used. This difference extends even to how these credentials are purchased and shared. Since NFC credentials are not physical objects they must have the ability to be transported from device to device. Therefore, because this technology is still in early versions, many of these interoperability issues have yet to be discovered.

2. BYOD, or 'Bring Your Own Device', is a growing trend and security concern for corporate IT/security departments. According to the presentation, 37% of all tablets sold are used in corporate environments, but owned by employees. As we noted in our NFC examination, successfully managing and administrating devices not owned by companies is an awkward situation. While a variety of policy and authentication programs are being developed, no 'clear answer' exists in the market. HID demonstrated a 'soft token' system in an early attempt to bridge this gap.

3. Not supporting Picture IDs significantly limits the value of NFC. For high security areas (where image verifications are used for dual authentication) NFC still requires carrying a badge photo which undermines the main claimed benefit of NFC. Since NFC technology is designed as a low bandwidth, low energy transmission medium, the time required to transmit high resolutions picture files is excessive and would be prone to transmission error. 

4. Despite being positioned as a game changer, we disagree that NFC will bring access control to new doors. Bringing access controls to the untapped "95%" of doors has not occured even though several cheap alternatives to hard wired access controlled door exist. If the major incentive to move to NFC is additional security, consider that multiple low-cost proximity card leversets have attempted to gain the same market. If NFC's convenience is the push, then consider that keypad operated locks (requiring no external credential at all) have been in the market for many years.

Conclusion

The concerns we raised in our initial NFC analysis still stand, and it is clear that 'mobile credential' technology is still being developed and working through growing pains. However, these vendors make it clear that NFC technology will continue to recieve development attention for the near future.

Comments : PRO Members only. Login. or Join.

Related Reports

FST Fails on Jul 17, 2018
FST was one of the hottest startups of the decade, selected as the best new product at ISC West 2011 and backed with tens of millions in...
Belgium Bans Private Facial Surveillance on Jul 06, 2018
Belgium has effectively banned the use of facial recognition and other biometrics-based video analytics in surveillance cameras for private,...
GDPR For Access Control Guide on Jul 03, 2018
Electronic access control is common in businesses plus organizations are increasingly considering biometrics for access control. With GDPR coming...
Allegion Acquires Isonas on Jun 29, 2018
Isonas failed to 'revolutionize' access control as they regularly claimed. Now, nearly 20 years after their founding, they are being acquired by...
Replacing / Switching Access Control Systems Guide on Jun 28, 2018
Ripping out and replacing access control systems is hard for important reasons. Because users typically hold on to access control systems for as...
Free Online NFPA, IBC, and ADA Codes and Standards on Jun 27, 2018
Finding applicable codes for security work can be a costly task, with printed books and pdf downloads costing hundreds or thousands. However, a...
Hikvision Covers Up Racial Profiling And AI Error on Jun 25, 2018
Faced with global scrutiny, led by the US government-funded Voice of America (VOA), Hikvision has covered up evidence showing their racial...
'Secure Channel' OSDP Access Control Examined on Jun 21, 2018
Despite claiming to be better than Wiegand, OSDP's initial releases did not address the lack of encryption between reader and controller, leaving...
IFSEC 2018 Final Show Report on Jun 20, 2018
IPVM attended the IFSEC show for the first time this year. The Chinese took over the show, centered on Hikvision, flanked by Dahua, Huawei and a...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...

Most Recent Industry Reports

Axis ~$100 Camera Tested on Jul 17, 2018
Axis has released their lowest cost camera ever, the Companion Eye Mini L, setting their sights on a market dominated by Hikvision and Dahua. Can...
Amazon Ring Alarm System Tested on Jul 16, 2018
Amazon Ring is going to hurt traditional dealers, and especially ADT, new IPVM test results of Ring's Alarm system underscore. IPVM found that...
Hikvision Wins Chinese Government Forced Facial Recognition Project Across 967 Mosques on Jul 16, 2018
Hikvision has won a Chinese government tender which requires that facial recognition cameras be set up at the entrance of every single mosque...
Installing Dome Cameras Indoors Guide on Jul 16, 2018
IPVM is producing the definitive series on installing surveillance cameras. This entry covers one of the most common scenarios - installing dome...
Security Sales Course Summer 2018 on Jul 13, 2018
Based on member's interest, IPVM is offering a security sales course this summer. Register Now - IPVM Security Sales Course Summer 2018 This...
US Tariffs Hit China Video Surveillance on Jul 13, 2018
Chinese video surveillance products avoided tariffs for the first two rounds. Now, in the third round, many video surveillance products will be...
Last Chance - July 2018 IP Networking Course on Jul 12, 2018
Registration ends today, Thursday. Register now. This is the only networking course designed specifically for video surveillance...
4 Most Difficult Camera Installs (Statistics) on Jul 12, 2018
Heavy housings, cumbersome brackets, heavy ladders required, and tricky field of view requirements will cause difficulties no matter the camera...
Axis Perimeter Defender Video Analytics Tested on Jul 12, 2018
Axis 'high security' video analytics offering is Perimeter Defender, OEMed / developed with Digital Barriers. But how good is Perimeter Defender?...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact