mobile access is the killer app the path to flexible, …...mobile devices are rarely forgotten,...

40
Powering the trusted identities of the world’s people, places & things Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement – Senior Director, Product Marketing April 8, 2019

Upload: others

Post on 28-May-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

Powering the trusted identities of the world’s people, places & things

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

Mobile Access is the Killer AppThe Path to Flexible, Secure CredentialsBrandon Arcement – Senior Director, Product MarketingApril 8, 2019

Page 2: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Do You Remember the First Time You Saw This?

Page 3: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

It's a New World

Page 4: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Credential Requirements

Security

Applications

Mobility

Agenda

The Status Quo

Selecting the RightCredential Solution

Mobile Access

How to Upgrade

Page 5: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

The Status Quo - Vulnerabilities

NACCU 2018 Campus Profile Summary Report

Page 6: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

On “secure” smart cards:

Unencrypted Card Serial Number

Poor key management

Unencrypted data payload

Identifier marked on the credential

Open, untracked format

Reader configuration supporting legacy technology

Unencrypted communication from reader to panel

The Status Quo - Vulnerabilities

Page 7: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

The Status Quo – Limited Multi-Application

CSN: 123456789

Page 8: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

The Status Quo – No Path to Mobile

Most technologies deployed today do not

provide a path to mobile access

Reader infrastructure not capable of transition

Common cross-platform credential model not considered

Page 9: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Reader Firmware

Disparate Cross-Platform Credential Models

Card

iOS App

Card

sM

obile D

evic

es

Android App

iOS eSE

Android eSE

Wearable 1

UID: 123456789

Page 10: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Vulnerabilities in Technology or Implementation

Limited Multi-Application Support

No Path to Mobile Access

The Status Quo - Summary

Page 11: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Selecting the Right Credential SolutionSecurityApplicationsMobility

Page 12: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Keep Credential Number Private

The Key is Key

Secure Technology is Foundational

Strong defense has Layers

Track the Format

Remove the Weak Link

Lock the Back Door

Selecting the Right Solution – SecurityA Holistic, Secure Credential Program

Page 13: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Selecting the Right Solution - Applications

Leverage technology that makes it possible to incorporate an increasing number of physical, logical, and extended applications:

– Building access

– Secure print authentication

– Time and attendance

– Cashless vending

Page 14: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Selecting the Right Solution - Mobility

Evaluate solutions that offer the freedom to choose

Device form factors - Card, Phone, Tablet, Wearable…

Semiconductor platforms - NXP, Infineon, EM…

Operating systems - iOS, Android, Tizen…

Readers - Wall readers, Locks, USB readers, embedded

devices…

Communications protocols - NFC, Bluetooth…

…to address your future needs

Page 15: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Mobile Credentials – The Next Frontier

https://www.youtube.com/watch?v=hhvNr3nJ2OA

Page 16: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Common Cross-Platform Credential Model

Reader Firmware

Card

sM

obile D

evic

es

UID: ?????????

UID: ?????????

Page 17: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Seos Credential Technology

Page 18: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

HID Mobile AccessBringing the Magic Back to PACS

Page 19: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

9 Years of Experience in a Dynamic Market

ASSA ABLOY starts world’s first SIM -based Hotel pilot

2009 2010 2011 2012 2013 2014

NFC phones start to appear

ASSA ABLOY develops SIM -based MIFARE solution

NFC microSDs and iPhone sleeves are pushed in the market as bridge technologies

ASSA ABLOY creates solution with MIFARE and bridge technologies

Starwood tries the microSD and iPhone Sleeve solution and dimisses them

Slow uptake on NFC phones.Mobile operators struggle to launch SIM solutions

Arizona State University pilots microSDs and iPhone Sleeves with HID. Lack of native phone support ends the pilot

BlackBerry starts working on an embedded SE solution with NFC

HID tests an iCLASS solution with embedded Secure Elements on BackBerry 9900. Lack of support on other devices and that mobile opetators blocked the solution made it unsellable

A platform independant technology is needed to be future proof. Seos is launched

Google wallet is launched on Google devices and embedded SE

Mifare4Mobile 1.0 is published.Only one card active simultaneously.Closed environment for managing credentials. Unusable specification

Investigates SIM based NFC solutions. Blocks Google Wallet and embedded SE solutions

HID runs a several SIM basedSeos pilots with different MNOs

Samsung announces an embedded SE NFC solution with Visa. Basically no services have been launched

ASSA ABLOY starts integrating with leading handset manufacturer embedded SE solution.

Android 4.3 is released. Includes native support for Bluetooth Smart.

ASSA ABLOY creates a Seos over Bluetooth Smart solution, providing native support for Android and iOS

Visa and Mastercard releasespecifications for payments with NFC Host Card Emulation (HCE)

ASSA ABLOY creates HCE proof-of- concept. We can now emulate Seos in software on Android NFC phones

Allegion tries iPhone MIFARE sleeve, 3 years after ASSA ABLOY

Apple Pay is launched. Based on NFC and eSE

HID Mobile Acces®

Mifare4Mobile 2.0 is published. Only pilots exist

Android 4.4 is released with NFC Host Card Emulation (HCE)

Page 20: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Integrated Architecture

Your App

API

PACS / IAMS

Credential Admin

HID PlatformMobile ID

You Choose: HID User Interfaces Cloud API & App SDK

Page 21: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Tap Twist & Go

HID Mobile AccessTwo Original Modes of Operation

Like withprox cards

TWISTTAP

Page 22: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Android Wear & Apple Watch

Page 23: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Widget & 3-D Touch

Sw

ipe R

igh

t

Press F

irm

ly

Page 24: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Supported Devices List

250+Devices

Page 25: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Bluetooth

NFC vs. Bluetooth

NFC Card Emulation

Supported by iCLASS SE readers

Short Range

– Tap only

Performance similar to card

Android only

Supported by iCLASS SE readers

Short & Long Range

– Tap, Twist & Go, Wearables,

Widget, 3-D Touch

Less consistent than card

Android & iOS

25

Page 26: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Apple June Announcement

ASSA ABLOY will leverage its expertise in mobile access to support Apple’s efforts to make it easier to access dorm rooms with

contactless student IDs

Nico DelvauxCEO; ASSA ABLOY

Page 27: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Mixed PopulationsMobile Devices with Legacy Credentials

Page 28: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Benefits of Mobile Access

More User Convenience

Greater Operational Efficiency

Higher Security

Page 29: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Benefits of Mobile Access

More User Convenience: Enable building occupants to use smartphone, tablet, or wearable to enter controlled areas

Fewer items to carry

Lost or forgotten cards no longer a problem

Remote, over-the-air credentialing

Extended read range for special applications

Adds to perception of innovative environment

No online connectivity required; Background operation

Page 30: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Benefits of Mobile Access

Greater Operational Efficiency: Make physical access administration easier with digital, online processes

Physical credential management transforms to digital experience

Over-the-air credentialing of remote workers and visitors

Streamlined operations with easy integration to PACS, visitor management, and other systems

Sustainable process with reduced waste and lower carbon footprint

Page 31: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Benefits of Mobile Access

Higher Security: Provide higher levels of authentication

Seos technology used to secure credential

Mobile devices are rarely forgotten, lost, or stolen

Missing mobile devices are reported almost immediately

Easily de-provision unauthorized devices; revoke credentials over-the-air

Applications can be protected with biometric and/or passcode

Vulnerabilities can be addressed quickly through remote update

Page 32: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Common Concerns About Mobile Access

Won’t Work with Dead

Battery

No Visual Authentication

of Identity

Page 33: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Simple and Free to Register

https://managedservices.hidglobal.com/faces/maUserOnBoardingStart

Page 34: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

How to UpgradeSteps to UpgradeBest PracticesCation Areas

Page 35: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Migration Options – Pros/Cons

Single Tech Cards Cost neutral credentialsReconfigure all readers More expensive readersReplace all credentials

Multi Tech Cards Readers First

Replace only remaining legacy credentials

Reconfigure all readersMore expensive readers

More expensive credentials (temp)

Multi Tech Cards Credentials First

No reconfiguration of readersLess expensive readers

Replace credentials only onceRisk appropriate reader upgrades

More expensive credentials

Page 36: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

How to UpgradeBest Practices

Site survey and complete inventory of existing

technologies as a first step

Support as few legacy technologies as possible

Choose new solution capable of mobile access

Build your own mobile app

Start small – execute successfully at one

building, then repeat

Page 37: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

How to UpgradeCaution Areas

Don’t procrastinate: Set target dates for completion

Consider and manage performance expectations

Use common, managed credential format

Set expectation for reader hardware refresh cycle

Validate service provider security assertions

– Ask about key management practices

– ISO27001 Certification

Page 38: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Invest in Solutions that Demonstrate Choice

Supports:

– Cards and Mobile Devices

– Smartphones, Tablets, and Wearables

– Multiple Secure Element Hardware Platforms

– iOS, Android, and Other operating systems

– NFC, Bluetooth, and beyond

Independent of:

– Transaction System

– Access Control Host

– Reader/Credential service provider

Page 39: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

Page 40: Mobile Access is the Killer App The Path to Flexible, …...Mobile devices are rarely forgotten, lost, or stolen Missing mobile devices are reported almost immediately Easily de-provision

© HID Global Corporation/ASSA ABLOY AB. All rights reserved.

An ASSA ABLOY Group brand

For more informationBrandon Arcement - [email protected]

Brett St. Pierre - [email protected]