Insights into identity and access from ASIS 2010

Seminar from HID's Hebert and Selvaratnam looks at the future of access control

Today, said Selvaratnam, we can introduce authentication based on “where you are”. If the phone becomes the carrier of the identity, and if the phone supports location-based positioning (GPS is in most phones), you start to get possibilities for high-security granting of access. “New credentials like phones will be able to transmit back securely where you are,” he said. “The mobile phone allows that fourth authentication requirement to come through.”

Don’t expect the jump to this location-based authentication model overnight. Transition technologies will be needed. Some of this has started with dual-technology card readers available from a number of companies. To get to the phone-as-credential model, it might mean creating a sticker form factor to stick the card on your phone until the credential is built into the phone. One thing is for sure: If you thought of the access control industry as a fairly staid part of our industry, think again. This part of the industry has a lot of room for technology growth and a lot of possibilities for ways that identity management and access control can be used in the future. The thing I hear from so many of the top access and ID firms is that we’re just beginning to scratch the surface.