Critiquing HID's 'Access Control Goes Mobile' Presentation

Author: Brian Rhodes, Published on Apr 11, 2012

Are Mobile Credentials ready for primetime?  ASSA ABLOY / HID, who have invested heavily in the technology, posted a webcast of their joint 'Access Control Goes Mobile' event at ISC West. Using mobile devices to host access credentials is a growing trend, with recent development centering around the inclusion of NFC technology into credential readers, door hardware, and smartphone devices. In this note, we examine the key takeaways from that presentation.

We have embedded the entire webcast here for reference. (note: the player omits timestamps so its hard to track by time):

** *** *******, *** / **** ***** * ****** ** important ******:

    • *** *********** **** ** ************ *********** **** *********** **** ** cards. *** ****** **** (****** **** ***) "* ******* **** in ****** *******" ** "*********** ******** *********** *** ********** **** on * ****** ******". ***** *********** **** ************ ** *** through "**** *** *** ************ *** **********" *** * *** based mobile ******** ******.
    • ** **** *** ********** ** "*** **** ********" *** ** management *******, *** ******* ***** ** ******** "******* ******* ********* corporate ********" *** ********* *** *** ********** *********. *** ****** that ***** "**** ********* ********* *** ******* ** *****", *** problem ***** *** ** ************* ********. **** ***** *** ******* illustrated ** * ********* ******** ************* **** ******* ****** *** connections **** ****** ******* ** * ********* ********, *** **** nothing ** ****** ** ****** **** ********* ** *** ***** devices.  
    • "*** **** *** ******* ******* *** ******* ***" *** *** feature ** *** ********** *** ***********.
    •  *** ************ **** ****** *********** *** *** *** ****** *** every ****** ******* *********. **** ******* ****** "**** *********** *** not ***** ****" *** ****** *********** *** "*** * ****** replacement" *** **** ***********. **** ******** **** "*** ** **** * portion ** *** ******** ****** ******* ********" *** ** **** valuable ******* ** *** **% ** ******** ********* *** ************ in *** ********** ****** ******* ******. **** *********** **** ***** through *** ********* ***** **** ******'*** ******** *********':

********

*. ******* *** *********** **** ** **************** ******* *********** *** *******, credential ********** ******* * **** *********** *******. *** ******* ** ************  and ******** *** *********** **** ** ****** ******** ********* ***** used. **** ********** ******* **** ** *** ***** *********** *** purchased *** ******. ***** *** *********** *** *** ******** ******* they **** **** *** ******* ** ** *********** **** ****** to ******. *********, ******* **** ********** ** ***** ** ***** versions, **** ** ***** **************** ****** **** *** ** ** discovered.

*. ****, ** '***** **** *** ******', ** * ******* ***** *** ******** ******* *** ********* IT/security ***********. ********* ** *** ************, **% ** *** ******* sold *** **** ** ********* ************, *** ***** ** *********. As ******* ** *** *** ***********, ************ ******** *** ************** ******* *** ***** ** ********* is ** ******* *********. ***** * ******* ** ****** *** authentication ******** *** ***** *********, ** '***** ******' ****** ** the ******. *** ************ *'**** *****' ****** ** ** ***** ******* ** ****** **** ***.

*. *** ********** ******* *** ************* ****** *** ***** ** ***. For **** ******** ***** (***** ***** ************* *** **** *** dual **************) *** ***** ******** ******** * ***** ***** ***** undermines *** **** ******* ******* ** ***. ***** *** ********** is ******** ** * *** *********, *** ****** ************ ******, the **** ******** ** ******** **** *********** ******* ***** ** excessive *** ***** ** ***** ** ************ *****. 

*. ******* ***** ********** ** * **** *******, ** ******** that *** **** ***** ****** ******* ** *** *****. ******** access ******** ** *** ******** "**%" ** ***** *** *** occured **** ****** ******* ***** ************ ** **** ***** ****** controlled **** *****. ** *** ***** ********* ** **** ** NFC ** ********** ********, ******** **** ******** ***-**** ********* **** ************* ********* ** **** *** **** ******. ** ***'* *********** is *** ****, **** ******** ********** ******** *****(********* ** ******** ********** ** ***) **** **** ** *** market *** **** *****.

**********

*********** ** ****** ** *** ******* *** ************* *****, *** ** ** ***** **** '****** **********' ********** is ***** ***** ********* *** ******* ******* ******* *****. *******, these ******* **** ** ***** **** *** ********** **** ******** to ******* *********** ********* *** *** **** ******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Mercury Releases New Series 3 Redboard Access Panels on Feb 15, 2018
Mercury Security has their first major product release post-HID buyout, and things literally look different. The Series 3 SIO boards now are red...
Assa's Lowest Power Draw Maglock: Securitron M680E Examined on Feb 14, 2018
Securitron produces some of the most extreme maglocks on the market, including massively strong maglocks and even ones with integrated CCTV cams...
Ingram Micro Owner HNA Declares "Victim of Conspiracy Against China" on Feb 08, 2018
Just 2 years ago, Ingram Micro was acquired by a Chinese company that paid them $6 billion in cash, nearly 40% more than their then stock...
Convergint Damage Control on Feb 07, 2018
Convergint needs you to understand. When Convergint acquires companies, as they continuously do, it is an acquisition, e.g.: But when...
Hanwha: Chinese Products Damaged Industry on Jan 25, 2018
Hanwha Techwin's CEO has come out swinging against the Chinese. In this note, we examine his statements, the relative positioning of Chinese and...
Door Closer Startup Lifedoor Aims To Prevent Fire Deaths on Jan 24, 2018
A startup named Lifedoor has a device with one basic function: Close doors during a fire. Closing doors is so powerful, UL and FDNY Fire Chiefs say...
PoE Powered Access Control Tutorial on Jan 19, 2018
Powering access control with Power over Ethernet is becoming increasingly common.  However, access requires more power than cameras, and the...
Axis: "It’s A Question Of Trust And Who You Want To Be Associated With" on Jan 17, 2018
Who do you trust? Who do you want to be associated with? Axis is raising hard questions to start 2018. In this note, we examine these questions,...
'Defiant' Hikvision 'Strikes Back' At WSJ And US on Jan 16, 2018
The fight is on. Hikvision and their owner, the Chinese government, 'strikes back' against the Wall Street Journal and US politicians raising...
Access Control Course Winter 2018 on Jan 04, 2018
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in the...

Most Recent Industry Reports

Why 3VR Failed on Feb 16, 2018
3VR destroyed transformed ~$65 million in VC funding into a $6.9 million exit. The reason they failed is simple. They bet on analytics. They...
"Fear Mongering": Hikvision USA Cybersecurity Director Dismisses Chinese Government Ownership Concerns on Feb 16, 2018
The facts are: The Chinese government created Hikvision and is Hikvision's controlling shareholder. Hikvision's Chairman, a Communist Party...
16:9 vs 4:3 Video Aspect Ratio Statistics on Feb 16, 2018
What aspect ratio do security integrators prefer? The 'standard' 4:3 or the 'wide' 16:9 one? 100+ integrators told us what they preferred, with...
Mercury Releases New Series 3 Redboard Access Panels on Feb 15, 2018
Mercury Security has their first major product release post-HID buyout, and things literally look different. The Series 3 SIO boards now are red...
Last Chance February 2018 Camera Course on Feb 15, 2018
This is the last chance to get into the Winter camera course, starts next Tuesday. Register now. IPVM provides the best education, live online...
Hikvision DeepInMind Tested Terribly on Feb 15, 2018
While Hikvision is heavily marketing deep learning and 'AI' as their next big thing, new IPVM test results of their DeepInMind NVR shows their deep...
Genetec CEO: You Cannot Buy Trust on Feb 14, 2018
Genetec's CEO, Pierre Racz, delivered a direct message at their channel partner conference: Racz has become a focal point in the industry debate...
Assa's Lowest Power Draw Maglock: Securitron M680E Examined on Feb 14, 2018
Securitron produces some of the most extreme maglocks on the market, including massively strong maglocks and even ones with integrated CCTV cams...
Hanwha Wisenet X 5MP Camera Tested (XNV-8080R) on Feb 13, 2018
Wisenet X is Hanwha's high-end camera line. We tested their Wisenet X 1080p camera last year. Now Hanwha is offering 5MP cameras listing super low...
Top Problems For Integrator Project Management on Feb 13, 2018
Security projects routinely encounter issues that jeopardize deadlines, create confusion, and shrink profits. Unfortunately, there are common...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact