This is the third and final part on a primer of proximity, smart card, smart phone credentials, readers and long-range solutions for campus access control.
Smart Phones as Credentials
About five years ago, smartphones as credentials appeared to be the new panacea. Everybody had a smartphone and always carried it with them. The belief was that with the adoption of smartphone credentials there would be no need to print or distribute cards. However, we learned that students and employees had different types of smartphones. They were a nightmare to incorporate into the existing system. Adding them drove systems installers and users crazy, and most were soon disbanded. The problem wasn’t with the new technology, it turns out; it was how the industry tried to retrofit their old system into the new solution. Continue reading
This is the second part on a primer of proximity, smart card, smart phone credentials, readers and long-range solutions for campus access control.
13.56 MHz Smart Cards and Readers
Contactless smart cards are becoming the new standard. At often a cost comparable to proximity card systems, smart card systems often are more secure and can be used for applications beyond access control, such as library privileges, the campus cafeteria and so on. Continue reading
Here’s a primer on proximity, smart card, smart phone credentials, readers and long-range solutions for campus access control.
In healthcare and education, it’s critically important to identify and control who comes and goes, but the topics of physical access control and identification badges can be a bit confusing. Continue reading
In response to rising consumer demand, card manufacturers and issuers are actively working to develop and provide more environmentally-conscious solutions to address the growing problem of plastic waste. The challenge for card manufacturers is in sourcing materials that are not only durable, but able to handle the complex security and technology requirements of today’s evolving payment standards, including both EMV® and contactless payment functionality. Continue reading
Have you ever thought of deploying biometrics, but are not sure about its advantages and disadvantages? Biometric solutions include the most cutting-edge technologies that use unique attributes for identification and verification. These human attributes such as fingerprint, finger vein, and iris cannot be copied, manipulated or forged, so their correct usage creates an unbreakable access wall. As traditional individual authentication methods are gradually becoming obsolete, biometric authentication is taking over where passwords or ID card-based authentication used to be due to numerous advantages. Continue reading