Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Access control
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Credential=== A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an [[access badge]]), something they are (such as a biometric feature), something they do (measurable behavioural patterns), or some combination of these items. This is known as [[multi-factor authentication]]. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.<ref>{{cite news|date=14 April 2014|title=MicroStrategy's office of the future includes mobile identity and cybersecurity|newspaper=Washington Post|url=https://www.washingtonpost.com/business/capitalbusiness/microstrategys-office-of-the-future-includes-mobile-identity-and-cybersecurity/2013/04/13/eb82e074-a1e3-11e2-be47-b44febada3a8_story.html|url-status=live|access-date=30 March 2014|archive-url=https://web.archive.org/web/20140216093132/http://www.washingtonpost.com/business/capitalbusiness/microstrategys-office-of-the-future-includes-mobile-identity-and-cybersecurity/2013/04/13/eb82e074-a1e3-11e2-be47-b44febada3a8_story.html|archive-date=16 February 2014}}</ref> There are many card technologies including magnetic stripe, bar code, [[Wiegand effect|Wiegand]], 125 kHz proximity, 26-bit card-swipe, contact smart cards, and [[contactless smart card]]s. Also available are key-fobs, which are more compact than ID cards, and attach to a key ring. [[Biometrics|Biometric technologies]] include fingerprint, [[Facial recognition system|facial recognition]], [[iris recognition]], [[retinal scan]], voice, and hand geometry. The built-in biometric technologies found on newer smartphones can also be used as credentials in conjunction with access software running on mobile devices.<ref>{{cite web|date=16 September 2013|title=iPhone 5S: A Biometrics Turning Point?|url=http://www.bankinfosecurity.com/iphone-5s-biometrics-turning-point-a-6065/op-1|url-status=live|archive-url=https://web.archive.org/web/20150911223315/http://www.bankinfosecurity.com/iphone-5s-biometrics-turning-point-a-6065/op-1|archive-date=11 September 2015|access-date=30 March 2014|publisher=BankInfoSecurity.com}}</ref> In addition to older more traditional card access technologies, newer technologies such as [[near-field communication]] (NFC), [[Bluetooth low energy]] or [[Ultra-wideband]] (UWB) can also communicate user credentials to readers for system or building access.<ref>{{cite web|date=25 September 2013|title=NFC access control: cool and coming, but not close|url=http://www.securitysystemsnews.com/article/nfc-access-control-cool-and-coming-not-close|url-status=live|archive-url=https://web.archive.org/web/20140406155040/http://www.securitysystemsnews.com/article/nfc-access-control-cool-and-coming-not-close|archive-date=6 April 2014|access-date=30 March 2014|publisher=Security Systems News}}</ref><ref>{{cite web|date=11 June 2012|title=Ditch Those Tacky Key Chains: Easy Access with EC Key|url=http://www.wirelessdesignmag.com/blogs/2012/06/ditch-those-tacky-key-chains-easy-access-ec-key|url-status=dead|archive-url=https://web.archive.org/web/20140407101653/http://www.wirelessdesignmag.com/blogs/2012/06/ditch-those-tacky-key-chains-easy-access-ec-key|archive-date=7 April 2014|access-date=31 March 2014|publisher=Wireless Design and Development}}</ref><ref>{{cite web|date=26 November 2013|title=Kisi And KeyMe, Two Smart Phone Apps, Might Make House Keys Obsolete|url=http://www.huffingtonpost.com/2013/11/26/house-keys-extinct_n_4339682.html|url-status=live|archive-url=https://web.archive.org/web/20150311201754/http://www.huffingtonpost.com/2013/11/26/house-keys-extinct_n_4339682.html|archive-date=11 March 2015|website=The Huffington Post}}</ref>
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Access control
(section)
Add topic