HID Global's approach to secure identity management: Avenue to Jane, stop at Ann

"Switching the door" is a very simple matter, and with the development of technology, it has become a technical activity. In addition to the card-opening methods such as swiping and fingerprinting that have been adopted by many hotels and enterprises, the new way of opening the door of mobile phones is gradually entering the reality. Driven by HID Global's Mobile Access Technology. And with the times with smart devices, clouds, software and other use.

Interpretation of the secret of Seos

Industry trends in secure identity management and upgrading from static password authentication to a more secure, open and adaptable solution; mobile access is gradually implemented; enhanced authentication for access control, including biometric and gesture recognition; using a single solution Integrate access control and IT to bring new benefits to end users; advances in printing and coding technology will simplify personalized cards; integrated visitor management systems. Technology is driving convergence, such as enhancing mobility, especially replacing passwords with a new generation of NFC-enabled laptops and tablets, as well as building a multi-application ecosystem. ”

Non-contact technology has experienced the evolution from magnetic stripe card, Prox, iCLASS, SE (SIO Enabled), and iCLASS Seos. HID Global's Seos has built a platform that supports multiple technologies, whether software or hardware. The core technology of Seos allows other technologies to communicate in the same language while preventing unauthorized access to information exchanged between technologies. The advantages are flexible, portable, secure, private, adaptable and feasible.

The core technology of Seos lies in the data structure of Secure IdenTIty Object (SIO). SIO can be installed on any device in a software application (or applet): on a secure computer platform, such as a smart card chip or SIM; manage storage and revoke virtual credentials; in addition, SIO, in the future can develop application passwords and Oath one-off The cryptographic key is to delete the content of the lost mobile phone by the network method. This function is very important for privacy protection. How does the Seos keystore protect each credential? Each item in the keystore is protected by the “Seos Authentication Key”. To obtain the credentials, the system must know the authentication key of the certificate through the edge of the Seos card. Mr. Zhao Jianbang gave the process of Seos keystore and SIO different carriers: iCLASS Seos card - smart device (smartphone, wearable device) - NFC (or Bluetooth or Wi-Fi) - HID iCLASS SE - Wiegand protocol.

Mobile smart authentication

The transition to HID Global mobile access control technology is in line with the “safe, simple and intelligent” requirements of modern security. Mr. Zhao Jianbang stated: “Seos technology for security, privacy and security; flexible, easy to manage access control; simple, easy to use application, now available for download from Google and iTunes app store; universal, 'tap touch' Mode or patented 'rotate unlock' gesture control mode. In addition, Seos provides technical support to port virtual credentials to devices; Bluetooth and NFC technologies for iOS and Android devices."

Mobile smart authentication

Seos ecosystem

HID's innovative and integrated secure identity solution is based on Seos technology. It seamlessly integrates secure identity management such as secure identity creation, cloud data synchronization, access control and computer desktop login through cloud management platform, and can adapt to a wide range of application environments, such as access control. Computer desktop security login, biometrics, electronic payment and other applications. At the same time, the technology can be applied to mobile devices to realize mobile access control management and application by issuing, providing and revoking virtual credential cards on NFC mobile phones. Tens of thousands of customers choose HID's solution to create, use and manage secure identities easily and efficiently.

For example, if Seos is installed on the phone, you can use your phone to open the door and enter the authorized area; the computer logs in to the authorized workstation; authenticates the identity locally or remotely, logs in to the application; allows you to sign and encrypt emails and documents. This is due to the integration of access control and IT security management.

Change usage mode

Used for enhanced security gesture authentication. Gesture control technology applications include gesture-based user authentication and gesture recognition. The former is designed to verify the identity of the user, not the gesture itself; as the second factor of authentication; similar to a password, but unlike biometrics, when leaked, the gesture for authentication can be changed. The latter is intended to identify the gesture used, regardless of who is using the gesture. The user presents the phone in front of the card reader, rotates 90 degrees to the right, and then returns to the original position. Simple control of the device with gestures, when and where NFC or Bluetooth low-energy communication occurs, enhances privacy and improves security because credentials are issued only when needed.

The application of gesture recognition made the reporter feel the impact of the Apple mobile phone when it first appeared, because it is enough to change the whole usage mode, from opening the door to asking for help, from work to life and other aspects you can use. For example, the gesture opens the door: the function of opening the door and locking the door by the mechanical key can be copied, the door is rotated to the left, and the door is rotated to the right. Send a signal like a password: The person who uses the card or the phone to unlock is being coerced. Based on this, we can also think of more applications of gesture control: mobile phones can be unlocked according to the predefined motion sequence of the gesture “password”, which can unlock the phone or issue virtual credentials; the password can also be used to unlock the application and lock the door and open the door; Gesture movements can be transferred to the PC for analysis and corresponding actions (login, access to programs or files, etc.).

Active Linear Array Loudspeaker

Line Array Sound System,Line Array Speaker System,Line Array Loudspeaker System,Active Linear Array Loudspeaker

The ASI Audio Technology Co., Ltd , https://www.asi-sound.com