It has been report that many smart door locks, such as August, are recognized by Apple and are the only door lock products in the Apple Store. Lockitron, which has been crowdfund on Kickstarter, is cheap and has potential. Schlage, can create 19 passwords for different people to enter. These are consumer grade products that can be remotely controll or authenticat using your mobile app to open doors and Swing Barrier gates.
Have you ever wondered what a smart door lock should look like in an enterprise? If you stay in an oversized office building, you should know that the usual unlocked access control system is not convenient. Access control cards are easy to forget or lose. Dozens of spare cards are always keep in the lobby on the first floor of each house. The existing access control identification technology has been use for many years, and the details are not secret. Unconventional attacks such as “collision and copying” can be use. Means of stealing or forgery.
Can we use current smart phones and wearable devices to replace access control cards as verification devices, and also make an experience similar to August?
Macrosafe is doing just that. It is a manufacturer of turnstile gates and speed gates and specialises in non-contact form of access control systems.
The latest mobile access control technology launch by Macrosafe is specially improved to address the shortcomings of traditional access control. It has several features:
1. Mobile app verification, and will also support bracelet watch verification in the future.
2. Certain gestures can also open the door.
3. The mobile ID can be issue, assign and revok in real time through wireless means.
4, can be upgrad.
5. More modern security means.
This mobile access control can be compare to an IoT system. On the cloud control panel, the administrator manually or automatically operates the management of each mobile ID; through the mobile network or Wi-Fi, these operations are transmitted to the access control device and mobile phone in real time; then, when the door is opened or not, the delay may not be long. to 1 second.
For networked systems, everyone is most worried about security issues. It can be discusshere. Traditional access control, mostly NFC technology, has both public and private standards, and there has been little change in these years. HID’s mobile access control technology is transmitted through Bluetooth and NFC, and the mobile ID is encrypted and bound to the mobile phone. In other words, the mobile ID can only be used on designated mobile phones.
Compared with the access control card, the mobile phone has the advantage that it can do interactive verification, such as biometric identification, PIN code, etc., which can not be unlocked after theft.
And on the phone, you can also do more complex data collection. Through the collection of these data, a set of personal characteristic models can be formed in the background to realize further verification of big data behavior characteristics. Of course, it is not easy to do this step, and the current big data technology is still at a very shallow stage.