Critiquing HID's 'Access Control Goes Mobile' Presentation

Author: Brian Rhodes, Published on Apr 11, 2012

Are Mobile Credentials ready for primetime?  ASSA ABLOY / HID, who have invested heavily in the technology, posted a webcast of their joint 'Access Control Goes Mobile' event at ISC West. Using mobile devices to host access credentials is a growing trend, with recent development centering around the inclusion of NFC technology into credential readers, door hardware, and smartphone devices. In this note, we examine the key takeaways from that presentation.

We have embedded the entire webcast here for reference. (note: the player omits timestamps so its hard to track by time):

** *** *******, *** / **** ***** * ****** ** important ******:

    • *** *********** **** ** ************ *********** **** *********** **** ** cards. *** ****** **** (****** **** ***) "* ******* **** in ****** *******" ** "*********** ******** *********** *** ********** **** on * ****** ******". ***** *********** **** ************ ** *** through "**** *** *** ************ *** **********" *** * *** based mobile ******** ******.
    • ** **** *** ********** ** "*** **** ********" *** ** management *******, *** ******* ***** ** ******** "******* ******* ********* corporate ********" *** ********* *** *** ********** *********. *** ****** that ***** "**** ********* ********* *** ******* ** *****", *** problem ***** *** ** ************* ********. **** ***** *** ******* illustrated ** * ********* ******** ************* **** ******* ****** *** connections **** ****** ******* ** * ********* ********, *** **** nothing ** ****** ** ****** **** ********* ** *** ***** devices.  
    • "*** **** *** ******* ******* *** ******* ***" *** *** feature ** *** ********** *** ***********.
    •  *** ************ **** ****** *********** *** *** *** ****** *** every ****** ******* *********. **** ******* ****** "**** *********** *** not ***** ****" *** ****** *********** *** "*** * ****** replacement" *** **** ***********. **** ******** **** "*** ** **** * portion ** *** ******** ****** ******* ********" *** ** **** valuable ******* ** *** **% ** ******** ********* *** ************ in *** ********** ****** ******* ******. **** *********** **** ***** through *** ********* ***** **** ******'*** ******** *********':

********

*. ******* *** *********** **** ** **************** ******* *********** *** *******, credential ********** ******* * **** *********** *******. *** ******* ** ************  and ******** *** *********** **** ** ****** ******** ********* ***** used. **** ********** ******* **** ** *** ***** *********** *** purchased *** ******. ***** *** *********** *** *** ******** ******* they **** **** *** ******* ** ** *********** **** ****** to ******. *********, ******* **** ********** ** ***** ** ***** versions, **** ** ***** **************** ****** **** *** ** ** discovered.

*. ****, ** '***** **** *** ******', ** * ******* ***** *** ******** ******* *** ********* IT/security ***********. ********* ** *** ************, **% ** *** ******* sold *** **** ** ********* ************, *** ***** ** *********. As ******* ** *** *** ***********, ************ ******** *** ************** ******* *** ***** ** ********* is ** ******* *********. ***** * ******* ** ****** *** authentication ******** *** ***** *********, ** '***** ******' ****** ** the ******. *** ************ *'**** *****' ****** ** ** ***** ******* ** ****** **** ***.

*. *** ********** ******* *** ************* ****** *** ***** ** ***. For **** ******** ***** (***** ***** ************* *** **** *** dual **************) *** ***** ******** ******** * ***** ***** ***** undermines *** **** ******* ******* ** ***. ***** *** ********** is ******** ** * *** *********, *** ****** ************ ******, the **** ******** ** ******** **** *********** ******* ***** ** excessive *** ***** ** ***** ** ************ *****. 

*. ******* ***** ********** ** * **** *******, ** ******** that *** **** ***** ****** ******* ** *** *****. ******** access ******** ** *** ******** "**%" ** ***** *** *** occured **** ****** ******* ***** ************ ** **** ***** ****** controlled **** *****. ** *** ***** ********* ** **** ** NFC ** ********** ********, ******** **** ******** ***-**** ********* **** ************* ********* ** **** *** **** ******. ** ***'* *********** is *** ****, **** ******** ********** ******** *****(********* ** ******** ********** ** ***) **** **** ** *** market *** **** *****.

**********

*********** ** ****** ** *** ******* *** ************* *****, *** ** ** ***** **** '****** **********' ********** is ***** ***** ********* *** ******* ******* ******* *****. *******, these ******* **** ** ***** **** *** ********** **** ******** to ******* *********** ********* *** *** **** ******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Anti-Hack Access Card Shields Tested on May 26, 2017
Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple...
Hikvision Marketer Caught Spamming, Fails at Coverup, Fired on May 23, 2017
A Hikvision marketing employee was caught by IPCamTalk trying to surreptitiously disparage IPVM and IPCamTalk. This is an outgrowth of Hikvision's...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Smartphone Controlled Kevo Lock Tested on May 04, 2017
Smartlocks are a growing market, with millions sold. Kwikset's Kevo is one of the most common choices, using the Unikey smart phone access control...
Hack Your Access Control With This $30 HID 125kHz Card Copier on May 01, 2017
You might have heard the stories or seen the YouTube videos of random people hacking electronic access control systems. The tools that claim to do...
Hikvision EZVIZ Amazon Scam Revealed on Apr 26, 2017
Hikvision is violating US Federal Trade Commission guidelines and Amazon rules with a "Honest" Review Program scheme that provides gift cards to...
IPVM First Dean's List W2017 - Thomas Atkinson, Matt Hurly and Fredrik Lundqvist on Apr 24, 2017
IPVM is happy to congratulate and celebrate our first "Dean's List", the top students in our courses. For the Winter 2017 IP Networking course...
Beware The "Hit List" Ranking on Apr 21, 2017
The hit list. Kirschenbaum's recent newsletter complained about a 'hit list', bemoaning how a company took aim at ADT. Alas, that's the Google...
Lenel President Is Out on Apr 20, 2017
Lenel's challenges continue. Now, Lenel's President is out, suddenly. This follows increasing challenges for the company who has broadly upset...
Access Control Course Spring 2017 on Apr 14, 2017
IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the...

Most Recent Industry Reports

Anti-Hack Access Card Shields Tested on May 26, 2017
Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple...
H.265 / HEVC Codec Tutorial 2017 on May 25, 2017
Since 2013, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
Camera Course Summer 2017 on May 25, 2017
Learn video surveillance and get certified. IPVM provides live online classes, recorded videos, personal help, cutting edge education and...
Most Respected Manufacturer Competitors on May 25, 2017
Manufacturers told IPVM what competitor they most respected. In terms of total revenue, Hikvision, Dahua and Axis are certainly tops but would...
CyPhy 'Unlimited' Flight Time Security Drone Examined on May 25, 2017
Drones face several issues as commercial security platforms - legal restrictions (e.g., in the US, the FAA), costs, and limited flight durations...
Milestone Entry Level Mobile Password Vulnerability Disclosed on May 24, 2017
While many manufacturers have only addressed cybersecurity vulnerabilities after public disclosures were made (or threatened), Milestone has...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Arlo Go Cellular Cloud Camera Tested on May 23, 2017
Totally wireless surveillance cameras are growing but almost all typically depend on a hub and local Internet access. However, many outdoor...
Avigilon New COO James Henderson Profile on May 23, 2017
It has been nearly 2 years since the infamous Bryan Schmode 'resigned' as Avigilon COO. Now, Avigilon once again has a COO, promoting James...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact