AUTONOMOUS NFC ACCESS CONTROL

12
CREATED BY WITH THE SUPPORT OF IN COLLABORATION WITH

Transcript of AUTONOMOUS NFC ACCESS CONTROL

Page 1: AUTONOMOUS NFC ACCESS CONTROL

CREATED BY

WITH THE SUPPORT OF

IN COLLABORATION WITH

Page 2: AUTONOMOUS NFC ACCESS CONTROL

AUTONOMOUS

NFC ACCESS

CONTROL

DEVELOPMENTS

SUMMARY

BACKGROUND

OBJECT FOCUS

CHALLENGE

PROCESS

ADVANTAGES

OTHER MARKETS

DO IT YOURSELF

AUTONOMOUS NFC ACCESS

CONTROL

Mobile management of an autonomous access controller

using NFC smartphones & contactless cards

Access control

NFC

Scenario

Category

Technology

Page 3: AUTONOMOUS NFC ACCESS CONTROL

Management of keys

and authorisations

for regular operators

and occasional visitors

AUTONOMOUS

NFC ACCESS

CONTROL

DEVELOPMENTS

SUMMARY

BACKGROUND

OBJECT FOCUS

CHALLENGE

PROCESS

ADVANTAGES

OTHER MARKETS

DO IT YOURSELF

Page 4: AUTONOMOUS NFC ACCESS CONTROL

AUTONOMOUS

NFC ACCESS

CONTROL

Administration

and provision

of physical access equipment

DEVELOPMENTS

SUMMARY

BACKGROUND

OBJECT FOCUS

CHALLENGE

PROCESS

ADVANTAGES

OTHER MARKETS

DO IT YOURSELF

Page 5: AUTONOMOUS NFC ACCESS CONTROL

Metal keys

Secure transfer and copying

Track keys

Manage access rights

Magnetic keys / badges

Transfer equipment to users

Share access rights between users

The end of physical keys?

SECTOR CHALLENGES

AUTONOMOUS

NFC ACCESS

CONTROL

DEVELOPMENTS

SUMMARY

BACKGROUND

OBJECT FOCUS

CHALLENGE

PROCESS

ADVANTAGES

OTHER MARKETS

DO IT YOURSELF

Page 6: AUTONOMOUS NFC ACCESS CONTROL

1.

PHYSICAL KEY

AUTONOMOUS

NFC ACCESS

CONTROL

DEVELOPMENTS

SUMMARY

BACKGROUND

OBJECT FOCUS

CHALLENGE

PROCESS

ADVANTAGES

OTHER MARKETS

DO IT YOURSELF

4.

MANAGEMENT AND

REPORTING

3.

DOOR OPENING

2.

VIRTUAL KEYS

CREATED LOCALLY CREATED

REMOTELY

Page 7: AUTONOMOUS NFC ACCESS CONTROL

BENEFITS FOR USERS AND INDUSTRY

AUTONOMOUS

NFC ACCESS

CONTROL

• Use of existing widely used equipment:

smartphones or badges

• No physical keys to be exchanged

• Optional network connection

• Application updates automatically

• Same security system as for credit/debit

cards

DEVELOPMENTS

SUMMARY

BACKGROUND

OBJECT FOCUS

CHALLENGE

PROCESS

ADVANTAGES

OTHER MARKETS

DO IT YOURSELF

Page 8: AUTONOMOUS NFC ACCESS CONTROL

INTEGRATED READERACCESS RIGHTS

SENT BY TEXT

MESSAGE, E-MAIL, ETC.

SECURE HANDS-FREE

ACCESS CONTROL

SECURE

CONTROLLED

ACCESS

AUTONOMOUS

NFC ACCESS

CONTROL

DEVELOPMENTS

SUMMARY

BACKGROUND

OBJECT FOCUS

CHALLENGE

PROCESS

ADVANTAGES

OTHER MARKETS

DO IT YOURSELF

Page 9: AUTONOMOUS NFC ACCESS CONTROL

VEHICLE HIRE

CAR SHARING

AUTONOMOUS

NFC ACCESS

CONTROL

HOLIDAY

RENTALSSPORT & LEISURE HOSPITALITY

LOCKERS

DEVELOPMENTS

SUMMARY

BACKGROUND

OBJECT FOCUS

CHALLENGE

PROCESS

ADVANTAGES

OTHER MARKETS

DO IT YOURSELF

Page 10: AUTONOMOUS NFC ACCESS CONTROL

AUTONOMOUS

NFC ACCESS

CONTROL

SUMMARY

BACKGROUND

FOCUS

CHALLENGE

OBJECT ACTION

DEVELOPMENTS

OTHER MARKETS

ADVANTAGES

DO IT YOURSELF

DEVELOPMENTS

SUMMARY

BACKGROUND

OBJECT FOCUS

CHALLENGE

PROCESS

ADVANTAGES

OTHER MARKETS

DO IT YOURSELF

2.

DOWNLOAD

THE NFCPORTER

APPLICATION

6.

READ THE RF CARD

USING

SMARTPHONE

3.

CREATE

ACCESS RIGHTS UNDER THE

"CREDENTIAL" TAB4.

PASS THE TELEPHONE

OVER THE READER

5.

LAUNCH THE

PATRONPRO

APPLICATION

ON ADMINISTRATOR

SMARTPHONE

7.

SET CARD RIGHTS

USING THE

APPLICATION

8.

SYNCHRONISE

THE SMARTPHONE

WITH THE READER

USING NFC

9.

PASS THE CARD

IN FRONT

OF THE READER

USER

ADMINISTRATOR

Page 11: AUTONOMOUS NFC ACCESS CONTROL

AUTONOMOUS

NFC ACCESS

CONTROL

SUMMARY

BACKGROUND

FOCUS

CHALLENGE

OBJECT ACTION

DEVELOPMENTS

OTHER MARKETS

ADVANTAGES

DO IT YOURSELF

DEVELOPMENTS

SUMMARY

BACKGROUND

OBJECT FOCUS

CHALLENGE

PROCESS

ADVANTAGES

OTHER MARKETS

DO IT YOURSELF

2.

DOWNLOAD

THE NFCPORTER

APPLICATION

6.

READ THE RF CARD

USING

SMARTPHONE

3.

CREATE

ACCESS RIGHTS UNDER THE

"CREDENTIAL" TAB4.

PASS THE TELEPHONE

OVER THE READER

5.

LAUNCH THE

PATRONPRO

APPLICATION

ON ADMINISTRATOR

SMARTPHONE

7.

SET CARD RIGHTS

USING THE

APPLICATION

8.

SYNCHRONISE

THE SMARTPHONE

WITH THE READER

USING NFC

9.

PASS THE CARD

IN FRONT

OF THE READER

USER

ADMINISTRATOR

Page 12: AUTONOMOUS NFC ACCESS CONTROL

AUTONOMOUS

NFC ACCESS

CONTROL

2.

DOWNLOAD

THE NFCPORTER

APPLICATION

6.

READ THE RF CARD

USING

SMARTPHONE

3.

CREATE

ACCESS RIGHTS UNDER THE

"CREDENTIAL" TAB4.

PASS THE TELEPHONE

OVER THE READER

5.

LAUNCH THE

PATRONPRO

APPLICATION

ON ADMINISTRATOR

SMARTPHONE

7.

SET CARD RIGHTS

USING THE

APPLICATION

TAKE IT TO THE NEXT LEVEL

• Download the NFCPorter application on your phone

• Configure your authorisations (credentials)

• Explore all the PatronPRO admin app tools: access log, multiple list management...

• Secure data and reports

8.

SYNCHRONISE

THE SMARTPHONE

WITH THE READER

USING NFC

9.

PASS THE CARD

IN FRONT

OF THE READER

SUMMARY

BACKGROUND

FOCUS

CHALLENGE

OBJECT ACTION

DEVELOPMENTS

OTHER MARKETS

ADVANTAGES

DO IT YOURSELF

DEVELOPMENTS

SUMMARY

BACKGROUND

OBJECT FOCUS

CHALLENGE

PROCESS

ADVANTAGES

OTHER MARKETS

DO IT YOURSELF

USER

ADMINISTRATOR

1.

ACCESS REFUSED

WITH YOUR BADGE

OR SMARTPHONE