Readers and keypads are input devices where humans interface with some sort of technology. Within our context of electronic security, this technology will be an alarm system or access control system. The demand for readers and keypads is strong, and it is a logical progression for locksmiths who have traditionally focused solely on keys and lock cylinders.
Market survey statistics report that 90 percent of all doors have keys, while only 10 percent have keypads or readers. For the traditional locksmith, keys remain very much a part of the security landscape, although their role will continue to diminish. For the locksmith looking to the future, the demand for keypads and readers is there, with 9 out of every 10 doors a candidate for upgrades.
As a security professional, we recommend a balanced perspective, embracing both the mechanical elements and the electronic elements of security technology so you can best service your clients.
One realization applies to all technologies and products; whatever is hot now will soon be upgraded to something better. Thus, you need to remain current and perhaps cutting edge with readers and keypads, but a working knowledge and healthy respect for mechanical locks and keys and the basics of traditional locksmithing.
HID Mobile Access®
HID Mobile Access merges security with convenience by enabling a smartphone and other mobile devices to securely open a door or gate.
This unique solution enables new iCLASS SE® or multiCLASS SE® readers to activate with a close range “tap” of a smartphone, or from a distance with HID Global’s patented “Twist and Go” mode. Active feedback including vibration and sound enhances the user experience when opening doors. It leverages standard communications technologies to support both Android™ and iOS® operating systems for a mobile solution that is easy to deploy and manage. It increases operational efficiencies with the ability to manage Mobile IDs through the robust online HID Secure Identity Services portal wherein administrators easily invite, provision or revoke Mobile IDs over the air. Secure identities are managed wirelessly through the phone. HID Mobile Access is powered by HID Global’s Seos® technology.
HID Mobile Access is sold only as a complete solution that requires the following components:
New, mobile-enabled readers (iCLASS SE or multiCLASS SE with factory-installed components)
HID Mobile Access Service Bundle : Mobile IDs, HID Secure Identity Services portal (a hosted service) and HID Mobile Access App for supported mobile phones
For more information, visit www.hidglobal.com.
Honeywell Tuxedo Touch
Honeywell has announced voice command capabilities for Tuxedo Touch, its touchscreen security and home automation controller that can serve as the central hub of a connected home or business. The technology now allows homeowners to simply state “leaving the house” to perform a range of tasks, including arming their security systems, adjusting thermostats, turning lights on or off and locking doors.
Additional enhancements to Tuxedo Touch include:
- The ability to record video captured by security cameras
- Remote-upgradeable software that can be updated remotely without having to schedule on-site service
- Support for higher-resolution cameras that use H.264 and ONVIF protocol
Tuxedo Touch is the newest member of Honeywell’s VISTA® series of home and building control solutions, which also include the VISTA Automation Module (VAM) that provides, local home monitoring and control on mobile devices. Tuxedo Touch can connect a home’s or business’ VISTA security system with Z-Wave® thermostats, locks, lighting systems and shades. Consumers can program the Tuxedo Touch, for example, to automatically lower thermostats and close shades when the security system is armed.
Additionally, the product features a built-in Web server that allows users to control it using Web-enabled devices such as smartphones and tablets while on premises. Tuxedo Touch is also compatible with Honeywell’s Total Connect™ Remote Services, which allows homeowners to control their systems anywhere with an Internet connection.
For more information, visit www.honeywellnow.com.
Farpointe Keypads & Readers
Based upon proven contactless digital radio frequency identification (RFID) technology, Farpointe Data Pyramid Series and Delta Proximity® readers interface with electronic access control systems via Wiegand communication protocol. They offer value add features such as MAX Secure™ and fleaPower™, and can be ordered to support several proximity card and tag technologies. Additionally, cards and tags are passive devices, eliminate maintenance by requiring no battery, and can be ordered to support several proximity reader technologies.
The new Farpointe P-640 Patagonia reader supports popular proximity card and tag technologies with an integrated keypad for dual-factor verification applications. For those environments where single factor verification does not provide the access security level they now require.
The P-640 mounts directly to a standard North American sized wall switch box or any flat surface. It is available for shipment now.
The proximity card reader features an expanded eight-inch read range for increased convenience as the user enters a PIN on the keyboard.
The P-640 features tamper-proof and weather-resistant epoxy potting to avoid problems with dust, mist or water. It works in temperature extremes and has distinctive blue backlit keys, making the P-640 easy to read in dark environments.
Farpointe Data is a DORMA Group company. For more information, visit http://www.farpointedata.com
Securitron R100-1H
The Securitron R100-1H Surface Mounted Wireless Reader with pre-paired Aperio® hub offers an aesthetically appealing way to extend access control to glass, stone or marble entryways. Installation is easy, requiring no drilling or pulling of wires to the door and can adhere in a few short minutes.
Two models are available to support low frequency or high frequency cards. Low frequency model supports PROX and EM PROX. High frequency model supports iCLASS, iCLASS Seos™, iCLASS SE, ISO14443B UID, Mifare, Mifare Plus, Desfire SE, Desfire EV1, NFC
Features incude
- Fully-encrypted AES 128 wireless communication
- Online transaction audit trail capability
- Low battery signaling and reporting
- Suitable for outdoor use
- Green status LED indicator
- Adheres to glass surface without any connecting wires
- Shortened wire pull from pane to hub provides cost benefit in installation
For more information, visit www.securitron.com
Four Tips to Specifying Readers and Keypads for Access Control Systems
By Gary Oliver, CLARK Electronic Security Specialist, and Dawn Mavity, CLARK Learning and Organizational Development Manager
Tip 1: Sell multi-tech readers whenever you are doing a complete new install. These cover a wide array of cards. iCLASS is proprietary technology by HID. The biggest separations are prox versus multi-tech versus iCLASS. Some new readers include Bluetooth or NFC (Near Field Communication) technology, which means a phone can be used as a credential.
Tip 2: Size matters! Consider the size of the reader for the installation space and material, as well as to meet the read range needs of the users. The smaller the reader, the shorter the read range. The smaller the credential, the smaller the read range.
Tip 3: Card technology and communication protocol must match that of the controller. On new systems, use proprietary formats to increase security and to retain repeat customer business. Offering proprietary formats is like using a restricted key way in traditional mechanical key systems.
Tip 4: Consider the construction of the keypad and reader based on the environment and usage. Heavy usage and weather will require sturdier material.
2015 Physical Access Control Trends to Watch
By John Fenske, Vice President of Product Marketing, Identity and Access Management for HID Global.
Each market segment will face its own unique challenges in 2015, whether it’s regulatory compliance for federal agencies and government ID applications, or budgetary issues in K-12 and higher education, or protecting facilities as well as user privacy in banking and healthcare applications. At the same time, all markets share the same concerns about improving the user experience with solutions that are simple and convenient. Trends that span all market segments include:
Increased innovation fueled by the move to interoperable platforms based on open standards: The industry is well into its transition to access control platforms based on open standards, creating the opportunity for organizations to move beyond static, proprietary access control architectures to more secure, open and adaptable solutions that support demand for new products and technologies. Innovation will accelerate in an industry that is now free to pursue new capabilities without the fear of being anchored to legacy or obsolete software, devices, protocols and products.
Adoption of new credential form factors: Today’s solutions meet growing demand for new credential form factors including mobile devices that offer a more secure and convenient way to open doors and parking gates. In 2015 and beyond, we will see the transition to a single card or phone that can replace previous mechanical keys and dedicated one-time password (OTP) solutions for physical and logical access control. Using Bluetooth Smart or NFC technology on cards or phones, users will be able to simply “tap in” to gain access to facilities, VPNs, wireless networks and cloud- and web-based applications, and take advantage of an access control ecosystem that provides a seamless user experience and can flexibly scale and adapt while delivering growing value to the organization.
More convenient ways to open doors and gates: Bluetooth Smart short-range connectivity technology is one of the most exciting drivers for the adoption of mobile devices for access control. Combined with gesture technology, it offers the additional user benefit of being able to open doors from a distance by rotating a smartphone while approaching a mobile-enabled reader. This new gesture-based technology capability will create new ways to open doors and gates, and will enable many additional future applications.
Advances in how to manage identities: As physical access control applications merge with logical access control applications, they will both also merge onto cards and phones, and organizations will be managing multiple ID numbers for multiple uses on multiple devices. This will create the need for more centralized identity management systems that are easy to use and support multiple application identities with different lifecycles, while also ensuring security and privacy for online transactions.
Using biometrics to help change security from a barrier to a guardrail: The industry will continue moving toward a biometric authentication model that is focused less on technology and more on the user experience. Biometric templates will also move with user IDs onto mobile devices. Meanwhile, credential delivery and management will grow in importance, using cloud-based solutions into which all entities have been biometrically authenticated.
Tim O'Leary
Tim O'Leary is a security consultant, trainer and technician who has also been writing articles on all areas of locksmithing & physical security for many years.