Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

Rumah> Blog> Smart phone access card opens new mode of access control

Smart phone access card opens new mode of access control

August 01, 2023
China Security Exhibition Network News As people enter a new era of increased mobility, more advanced applications, and increased security threats, the access control industry is gradually moving toward a new generation of portable authentication access control architecture. A new generation of access control technology, such as iCLASSSE, enables credential cards to be securely embedded in fixed or mobile devices and provides security settings that not only improve security, but also enable access control technology to be applied to virtual credential cards.

The access control card can be used for more complex applications, such as a 13.56 MHz contactless smart card, which not only binds cardholders, but also enables two-factor authentication with the reader to ensure security. In addition, the secure storage capabilities of contactless smart cards allow them to support a wide range of applications, such as biometrics, micro-electronic payments, and secure PC desktop login. Until now, we still need such cards to identify the rules of the access control system stored between the reader and the central controller, and perform secure identification to determine whether to open the door.



Phone access card

The first step to supporting portable authentication is to establish a reliable authentication framework that verifies all terminal devices (such as credential cards, printers, card readers, and NFC-enabled mobile phones) in the network so that data can be exchanged between end devices. Secure transmission. HIDGlobal's TrustedIdentityPlatform (abbreviated as TIP) is one of the frameworks that supports secure data transmission. TIP has established an extensible framework and delivery infrastructure that provides three key features: ready-to-use secure access between hardware and software, best-in-class key management and security setup processes, and seamless integration with IT infrastructure.

A trusted framework must use a secure, open, and independent SecureIdentityObject (SIO) data structure on the credential side; a corresponding SIO decoder is used on the side of the reader. SIO is a standards-based, device-independent data object that can be stored on any number of authentication devices. The SIO and SIO decoders perform functions similar to traditional cards and readers, except that the data structures used are more secure and flexible.
Hubungi kami

Author:

Ms. Yanjun Chen

Phone/WhatsApp:

+8613602572892

Produk populer
You may also like
Related Categories

Email ke pemasok ini

Subjek:
Email:
Pesan:

Your message must be betwwen 20-8000 characters

Rumah

Product

Phone

Tentang kami

Permintaan

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Kirim