Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS

By Michael Harris, Vice President of Sales for the Eastern US, Alert Enterprise

Higher education institutions are facing unprecedented challenges in managing campus security. With a myriad of disparate security solutions, homegrown databases and technologies that seldom integrate smoothly, campus security teams are often left grappling with inefficiencies and vulnerabilities. The need for a streamlined approach to security is more critical than ever. This is where the concept of cyber-physical security convergence comes into play, offering a comprehensive solution that unifies siloed systems, enhances security measures, and drives process automation and business efficiencies.

The Challenge of Disparate Security Systems

Higher education campuses are unique ecosystems, made up of diverse facilities such as lecture halls, dormitories, research labs and administrative buildings. This fragmentation not only makes security management cumbersome but also creates loopholes that can be exploited by malicious actors. The reliance on homegrown databases and outdated technology further exacerbates the problem, leading to inefficient security processes and increased risk.

The Solution: Cyber-Physical Security Convergence

The convergence of cyber and physical security through a unified platform seamlessly integrates various security systems and technologies. This integration facilitates real-time monitoring and automation of all security aspects, from access control to data protection. By adopting a security convergence platform, higher education institutions can ensure a holistic security posture that guards against both physical and cyber threats.

Enhanced Security through Unified Systems

One of the most significant advantages of cyber-physical security convergence is the unified view it offers of the entire security landscape. By integrating disparate systems, security teams can monitor and manage security protocols more efficiently. This integration enables the rapid identification and response to potential threats, ensuring the safety of students, faculty and campus assets.

Process Automation and Business Efficiencies

The automation of security processes is another critical benefit of security convergence. Automated systems can quickly analyze vast amounts of data, identify patterns and respond to security events with minimal human intervention. This automation not only reduces the workload on security staff but also enhances the accuracy and speed of threat detection and response. Bonus: The efficiency gains from process automation translate into cost savings and better allocation of resources.

Mobile Credentials: A Step Toward Smarter Security

In the context of enhancing campus security through mobile credentials, two notable developments are Apple's Student ID cards and Google's Campus ID. These digital solutions represent a significant leap forward in access control technology, aligning perfectly with the needs and habits of a tech-savvy student population.

Mobile credentials can be integrated into the broader cyber-physical security convergence platform, ensuring a unified and efficient security management system

Apple's Student ID cards, designed for integration with iOS devices, offer a convenient and secure method for students and staff to access campus facilities. Utilizing the robust security features of Apple devices, these digital ID cards ensure that only authorized individuals can gain entry to buildings, rooms and other secured areas. The convenience of having an ID card on a device that students invariably always carry with them not only enhances user experience but also streamlines campus security operations. This technology can be seamlessly integrated into the broader cyber-physical security convergence platform, ensuring a unified and efficient security management system.

Similarly, Google's Campus ID serves as a digital access solution for Android users, mirroring the functionality of Apple's Student ID cards. By leveraging the widespread use of Android devices among students and faculty, Google's Campus ID facilitates easy and secure access to campus facilities. This solution further adds to the layer of security by incorporating features unique to the Android platform. The integration of Google's Campus ID into the campus security infrastructure complements the existing physical and cyber security systems, offering a cohesive and robust security framework.

To complete the solution, a platform that automates the backend policy and access assignment engine is needed. Based on the students’ course enrollment every semester, their access can be adjusted for various departments. Same applies for athletes—their locker and gym access can be controlled based on their choice of sports. Gone are the days of resource overload and risky custom scripting to manage all access combinations.

Visitor Management: Ensuring Comprehensive Security

Visitor management is another critical aspect of campus security. Traditional visitor management systems are often manual and disjointed, posing security risks and administrative burdens. A converged security platform streamlines visitor management by integrating it with other security systems. This integration ensures that visitors are properly screened, their movements are monitored and their access is controlled, thereby maintaining campus security while offering a welcoming environment to guests.

The Emerging Role of Generative AI in Enhancing Campus Security

In addition to the integration of cyber and physical security systems, the future of campus security is poised to be significantly transformed by the advent of generative AI technologies. Generative AI (Gen AI), known for its ability to create new content and solutions, is set to play a crucial role in advancing security measures on higher education campuses. This technology, when integrated with existing security frameworks, can offer unprecedented capabilities in threat prediction, simulation and response strategies.

Predictive Analysis and Threat Identification: One of the most promising applications of Gen AI in campus security is in predictive analysis. By leveraging machine learning algorithms and vast datasets, generative AI can predict potential security threats before they occur. This proactive approach to security enables campus security teams to anticipate and mitigate risks, rather than just reacting to incidents when they occur.

Real-time Response and Decision Making: In emergency situations, the speed and accuracy of decision-making are critical. Generative AI can assist in real-time response by quickly analyzing situations and providing recommendations or automated actions. Gen AI can guide rapid response strategies, ensuring the safety of students and staff.

A Unified Way Forward

The convergence of cyber and physical security is not just a trend but a necessity in the context of higher education. By adopting a security convergence platform, higher education institutions can overcome the challenges posed by disparate solutions and outdated technologies. This unified approach enhances security measures, automates processes and drives business efficiencies—ensuring a safe and secure environment conducive to learning and innovation. Contact AlertEnterprise to learn more.

 


Mike Harris, Alert EnterpriseMichael Harris, VP of Sales, East US

Michael Harris serves as the Vice President of Sales for the Eastern US at Alert Enterprise. With a career spanning 19 years in the physical security industry, he is recognized for his expertise in bridging physical and logical security to address business-critical challenges. Harris has a comprehensive background that includes roles in security integration, consulting, application end-use, and software manufacturing. His approach to sales strategy and execution is deeply rooted in stakeholder engagement and exceptional customer service, which has led to significant successes in physical security programs.

 

Headshot of Mike Gaines, AllegionBy Mike Gaines, Allegion Product Manager, Readers & Reader Controllers

Selecting the right campus card reader is a crucial decision for every institution. Each campus has its own unique wants and needs, but the process can be challenging due to the variety of options available, future goals, and cost. In the past, this decision was simpler, with magstripe and proximity cards and readers as the primary choices. Today, the range of options has expanded significantly to include physical credentials with DESFire technology and mobile-enabled credentials. By making informed decisions based on factors including credential type, reader criteria, wiring, and non-technical factors, campuses can ensure a secure and efficient access control system to meet their current and future needs.

What should come first: credential selection or reader selection?

This question has been debated for years. In the early days of single technology readers, it was easier to answer. If you wanted magstripe cards due to low cost, then you would purchase a magnetic stripe reader. Technology improvements in the ‘80s allowed campuses to move to proximity cards and readers. Today the choices are broader, and you want to get it right the first time. Start by selecting the credential technology that will meet the campus' needs today and the next 5-10 years. This approach helps align your goals with the reader type and manufacturer. If you let your existing reader technology drive the campus’ future direction in card technology, your choices may be limited.

A multi-technology reader can allow you to transition from legacy technologies (mag, prox) to SEOS, DESFire, or mobile credentials

What are some initial considerations to start developing a campus reader standard?

Does the campus plan to use a secure plastic credential with DESFire technology for identification, access to buildings, printing, food service, and other on-campus solutions? Or is there a desire to move to mobile credentials that are issued directly to the phones of your employees and students? Those two options, or a combination of the two, are both critical decisions that will determine the direction you can go with reader technology.

The Apple & Google Near Field Communications (NFC) Wallet credentials are quickly being adopted for use in everyday life which has driven many Radio Frequency Identification (RFID) technology companies to adapt their readers to support NFC for non-access control applications. NFC mobile credentials are as secure as DESFire credentials, but also have another layer of security provided: students may not hesitate to loan their ID card to a friend, but they might be reluctant to share their phone.

If you’re looking for readers that will offer the ability to read NFC credentials, be sure to specify and select readers that meet Apple’s ECP (Enhanced Contactless Polling) 2.0 requirement.

The most secure plastic credentials will include a DESFire solution that offers advantages over the 50-year-old magnetic stripe and proximity options that can be compromised, but legacy readers may need to be updated to take advantage of the more secure credential choice.

What are the reader selection criteria to consider once the credential technology is determined?

Once the credential choice is made, you can select the reader technology that meets your current needs and may also meet transitional or future needs with a multi-technology reader. For instance, a multi-technology reader may allow you to transition from legacy technologies (mag, prox) to SEOS or DESFire and could include options for keypad such as dual authentication, like a card and a PIN number. It is especially important to confirm that the credential you have selected will work with the reader manufacturer you are considering. Interoperability is growing quickly, but some manufacturers offer only proprietary solutions that require the credential and reader to be made by the same manufacturer.

Wiegand, named after its creator, John Wiegand, has been regarded for over 40 years as the wiring standard between a card reader and the access control panel. It is a simple, one-way communication that was once dependable and common, but Wiegand sniffing (ESPKey and ESP RFID Tool) attacks have compromised the credential information needed to be secure. The technology placed limits on the number of bits a card could have: 26 Bit was the most common, and 37 Bit format was the top limit.

Open Supervised Device Protocol (OSDP) meets the high security guidelines from the Federal Identity, Credential, and Access Management (FICAM) governance. OSDP simplifies access control wiring and provides AES-128 level encryption to ensure the information being passed from the credential to the access control panel remains secure. Its ability to receive communication from the credential reader, plus the ability to monitor those communications, provides for a reliable and secure path. Compared to Wiegand, if a bad actor installed an ESPKey on the communication line for an OSDP reader, the data captured would not be usable. The encrypted data is only converted with the one-time key for that communication, and there are 3.4×1038 combinations. If you’re not a math expert, that’s a lot of combinations!

You may hear OSDP and RS-485 used together. OSDP uses the RS-485 wiring as its method to pass communications on. RS-485 requires two conductors for power and two conductors for OSDP data.

OSDP is growing in its ability for communications between the software, control panel and OSDP enabled readers to push updates, configurations, and firmware out to the all the readers. Not all control panels have this separate path today, but as the technology grows, the OSDP wiring and reader should be able to take advantage of the updates without having to visit the card reader.

IP enabled, also known as Edge devices, refers to a device with an access control panel and reader built into one assembly that can be plugged into an existing campus network system for communication and power. This creates a unique solution that saves on installation, wiring, and programming costs. It also offers network security that your IT administrator can use to determine the security level, which follows the same AES-128 level encryption while reducing the number of components required.

How are the various readers similar related to installation and configuration?

Student at campus access control reader

A mullion reader fits on the thin aluminum stile of a glass entry door. A standard reader is normally installed during construction. Both readers can be mounted to drywall, brick, block, or other surfaces.

Installation

Physical installation of the reader devices is similar across the various types and brands. Most require a hole in the mounting surface that will allow a set of wires to pass through and two screws that attach the reader to the mounting surface. However, how the reader wiring attaches does vary. Readers may connect wires via stationary terminal block, some have removable terminal blocks, while others have complete wire harnesses.

Mounting Location

Most readers today are available in two sizes. One is a narrow reader, called a mullion reader, that fits on the thin aluminum stile of a glass entry door. The other is a standard reader that is at least the width of a single gang electrical box, normally installed during construction. Both readers can be mounted to drywall, brick, block, or other surfaces. It is important to know the mounting location to get the proper size.

How Important is Wire?

Consider the wiring communication protocol a reader may support. This important topic should be discussed internally with key departments. Pulling new wire for card readers can be costly, and you only want to do it once if possible. Make sure you put in cable that meets current and future needs.

Can existing wiring be utilized, or do you have to replace it?

As a rule, all Wiegand readers will use similar wire/cable and it can be re-used when replacing with another Weigand reader. Generally, with this protocol, the wire/cable runs directly from the reader to the control panel and is limited to a single reader. However, if you are upgrading to the secure communications path of OSDP or IP readers the wiring will need to be upgraded in most cases. If newer wiring was pulled for the Wiegand readers, it may meet the standards for TIA485/EIA-RS485 wire specification related to OSDP. OSDP readers provide the ability to wire in a multi-drop or daisy-chain configuration that allows you to connect more than one reader to that wire run. Wiegand communication is limited to 500 feet between the reader and the control panel while OSDP RS-485 offers distances of up to 4,000 feet.

IP readers will need a standard Network cable, preferably with power that will allow the reader and lock to work without separate power. This type of network is called POE (Power over Ethernet) and allows many IP readers to work from one Network switch.

What other non-technical factors should a decision-maker be aware of when selecting their campus standard for card readers?

Aside from the technical aspects of the reader fit for your campus, one should consider factors including:

Price vs. Value. Take time to consider the value of the equipment, not just the cost. How will it enhance the campus experience now and in the future?
Certifications. Does the reader have the right FCC and UL certifications?

Warranty policy. Will the manufacturer support and stand behind their product after installation? How long do they guarantee support?
Where can I buy from? Can I only get from a single distributor or are there several? Do they have local inventory?

Lastly, don’t forget the greatest resource you have: your campus peers. Talk to and network with other campuses to learn what they have used and what their experience has been, whether positive or negative.


To learn more about the basics of electronic access control systems, check out this article.


If you’re ready to begin implementing card reader technology on your campus but aren’t sure where to start, contact Jeff Koziol to learn more and discover your options.


By David Kelley, Vice President, Product Development, TouchNet

Both Near Field Communication (NFC) and Bluetooth Low Energy (BLE) are valuable technologies for use on higher ed campuses. While they seem similar, in fact they are not interchangeable, as each technology is best used to accomplish different, specific tasks.

NFC is best for payments and access control because NFC was built to do what payments and access control foremost need to do: quickly and securely transmit data from a single device to a single device.

BLE can send larger amounts of data between multiple devices over longer distances but that’s not needed or desirable for payments and access, and in fact these BLE traits often create problems for these types of transactions. BLE is better suited for other use cases.

Proximity, stability, rapidity, one to one

Because of how the technology was built, NFC has inherent advantages for payments and access that BLE does not possess. NFC was built to communicate over very short distances (less than 4 cm or about 1.5 inches), employ an automatic connection with rapid data transmission (less than 0.1 seconds), and involve only one device communicating with one device at a time.

The combination of these traits makes NFC the right technology for payments and access because they require secure, stable, fast, and accurate communication. The short distance and one to one connection ensures that the right device is connecting with the right device, transmitting stably and rapidly, and communicating without chance of interference and hacking.

BLE transmits over long distances (up to 30 feet/9 meters), requires a manual connection, and is open to connect multiple devices. These traits make BLE useful for transmitting data that is shared amongst many users and devices and does not require the utmost security, such as audio signal transmission.

But for the use cases of payments and access, these same traits can expose a signal to a wide field of interference and possible hacking from the dozens of devices within range of the BLE transmission. Requiring a manual connection also creates a frustrating user experience due to glitches in permissions and user errors with passwords.

The power of “no power”

NFC also operates at very low power, even when your phone's battery appears to be dead. In an emergency situation a phone will still be able to communicate with a NFC-enabled reader to gain immediate access and swiftly get to a safe place.

The ability to operate at very low power is especially important on a college campus where the safety of students is paramount and a significant reason why NFC is the best technology for building and facility access. In an emergency situation where speed is crucial, NFC means no worrying about dead phones, no wasting time manually attempting to set up a connection, no interference from allowing multiple devices to connect from across an extended area. In contrast, BLE exposes users to these unnecessary risks.

Very low power can be leveraged in an additional way. NFC allows for the use of passive radio-frequency identification (RFID) tags. The tags are powered by induced electromagnetic energy from a phone and drive data transmission between phone and reader to complete an access or payment transaction.

Use the right tool for the job

If a carpenter needs to drive a nail, they use a hammer, which is built to drive nails better than other tools. A carpenter would not use a socket wrench, which could pound a nail but it’s not built for that and won’t be as effective and efficient as a hammer.

NFC was built for rapid, secure transmission of data from one device to one device without interference, which is exactly what payment and access processes need to function correctly, and why NFC is the standard for these use cases instead of BLE.

The advantages of NFC for payments is why the world’s major credit and debit card companies embed NFC in physical cards to securely transmit payment data. The advantages of NFC for payments is why Apple Pay, Google Pay, and Samsung Pay use NFC in their digital wallets to securely transmit payment data. As a result, in most parts of the world NFC is now the standard for contactless payments.

The advantages of NFC for payments apply to access, too, especially in busy, crowded places where there is a high chance of interference and exposure to hackers. The security and stability of NFC is why public transport in many of the world’s largest and densest cities – including Hong Kong, Singapore, and London – use NFC-based cards as the access control mechanism for public transportation.

When developing your payments and access ecosystems, ensure your campus uses the right tools for the task. It is the best way to achieve lasting security, efficient operations, and consistent, high-quality service.

For more on building out your campus transaction ecosystem, visit TouchNet.com.

By: Willem Ryan, Senior Vice President, Marketing and Communications, AlertEnterprise

College campuses are bustling hubs of activity, with thousands of students, faculty and staff members breezing in and out of countless doors every day. With so many people, campus buildings and an expansive network of systems, security is becoming more and more of a challenge—especially in a mobile-driven world where convenience simply can’t be compromised.

Mobile phones are ubiquitous in today's society, and most students carry them everywhere they go. The pandemic accelerated the adoption of mobile computing and the expectation of mobile convenience, and when it comes to younger generations in particular, there is virtually nothing they wouldn’t expect to be able to do on their mobile devices.

The use of smartphones is becoming increasingly integrated into daily life, and students are expecting this same level of integration in their educational lives. In fact, for many, mobile-driven experiences are becoming a deciding factor in the process of choosing which schools to attend. But how do we cater to this relentless demand for convenience as we simultaneously try to dodge ever-growing security threats?

A new technology has recently emerged that is helping make college campuses more secure with a seamless, more integrated user experience: NFC wallet mobile credentials.

Digging into the benefits

NFC, or Near Field Communication, is a wireless communication technology that allows two devices to exchange information when they are close together. NFC has been around for a while, but only in recent years has it has become widely used in mobile phones. Today, many smartphones come equipped with NFC technology, which means that users can use their phones as contactless payment devices or to exchange information with other NFC-enabled devices.

NFC wallet mobile credentials take this technology a step further by allowing users to store their identification and access credentials on their mobile phones. Instead of carrying around a physical ID card or key fob, students, faculty and staff members can use their smartphones to access buildings, rooms and other restricted areas on campus. This has a number of benefits, including increased security, convenience and cost savings.

Perk #1: Convenience

By using their iPhones or Apple Watches as access cards, students and faculty no longer have to worry about losing or forgetting their plastic cards, which can be a hassle to replace. Additionally, they can use their phones to access multiple facilities, eliminating the need to carry multiple cards. With an NFC wallet mobile credential, users can keep their phone in their pocket and simply tap it against an NFC-enabled reader to gain immediate, secure access to dorm rooms, campus buildings, printers, vending machines, libraries and more.

Perk #2: Front and backend IAM

NFC wallet mobile credentials are far more secure than traditional ID cards and key fobs, which creates a game-changing user experience. With a physical ID card or key fob, there is always the risk of loss or theft. If someone finds or steals your ID card or key fob, they can potentially gain access to sensitive areas on campus. With an NFC wallet mobile credential, however, the risk of loss or theft is greatly reduced. People typically keep smartphones with them at all times, and they can be secured with a password and dual authentication to prevent unauthorized access.

But the back-end administrative management experience isn’t taking a back seat. In a matter of seconds, security personnel can easily issue and revoke credentials “over the air” rather than requiring face-to-face meetings to hand over or pick up physical cards. Automated end-to-end lifecycle management and governance of identities instantly enforces policies while getting rid of human error and security gaps. Manual data entry and reporting is completely eliminated, reducing days of work to mere seconds. And AI-powered analytics provide immediate insights to access-related events that may need further investigating.

Perk #3: Major cost savings

With the increase in college acceptance rates, NFC wallet mobile credentials can also save colleges and universities substantial money. Think of it this way: In addition to opening dorms and classrooms, a smartphone can also enable students to make purchases at dining areas and school stores. Plus, many universities have grown accustomed to receiving revenue from issuing card credentials, which they can dial up exponentially by incorporating mobile activation into their student technology fees to cover things like printing kiosks, department-specific items and credential packages.

Perk #4: A smaller carbon footprint

Minimizing or eliminating plastic cards can have a major effect on reaching ESG (Environmental, Social, and Governance) and SDG (Sustainable Development Goals) goals. By implementing mobile credentials, institutions can significantly limit the amount of plastic and paper waste generated from traditional ID cards, which often end up littering our streets or piling on top of landfills.

In addition to the benefits of NFC wallet mobile credentials for physical security, they also have the potential to improve cybersecurity on college campuses. With so much sensitive information stored on college networks, it is essential to ensure that only authorized users are able to access this information. NFC wallet mobile credentials can be used to authenticate users when they log in to college networks and online services, reducing the risk of unauthorized access.

The pros of NFC wallet mobile credentials are clear. They offer increased security, convenience, cost savings and environmental benefits, and are becoming increasingly popular on college campuses across the world. And when integrated with a cyber-physical identity access management platform, every compliance and governance step becomes automated, every process gets synced up and every security gap remains closed.

Contact AlertEnterprise to discover how you can create safer campus entries, and mitigate theft and security breaches, by taking a converged approach to security—powered by the latest advancements in mobile and AI, of course.

By Tyler Webb, Director of Sales, Campus EAC, ASSA ABLOY

Embarking on a system upgrade or new deployment? It can be challenging, but with proper planning, you can minimize the risks and come out smiling on the other side.

In my experience working with campuses across the country, here are some key things to keep in mind:

1. Communicate with stakeholders

As you begin the project, identify campus business units that will be directly impacted by the process and contact key stakeholders in each unit. Talk through the process and get their feedback so you can address concerns and integrate them into your planning. Keep these stakeholders informed as you move through the various stages of the upgrade process.

2. Create a detailed roadmap of the upgrade process

It should go without saying but build a detailed project plan. You need a roadmap to keep your team on track. The plan should include initial meetings, vendor partner selection, product identification, ordering, pilot testing, deployment, testing, and everything in between. Write it down, share it, and be flexible, as your plan will adjust over time.

3. Work with system providers to ensure a smooth transition

Your providers should be partners, and a good partner is there to help you succeed. Rely on your vendors to help guide you. While this is likely your first major integrated access upgrade, we have done it many times and can help you avoid pitfalls.

Though it has gotten more challenging since COVID, managing product lead times has always been a crucial component to a system upgrade. With lead times often maxed out due to chip shortages, shipping delays, or other component issues, it is more important than ever to build forgiving lead times into your plan.

Transparency between your team and your vendor partners is essential.

4. Test, test and test again

At various stages in the upgrade process, testing is imperative. Early on, sample cards encoded with your institution’s specific format and data structure should be tested by your vendor partners to identify potential issues.

At a mid-point in your journey, I recommend a small pilot project using a few doors in a highly controlled environment, such as a contained administrative office or a select number of residence hall doors with pre-selected participants.

Finally, as the actual upgrade process begins, don’t forget to test as you deploy each area. It is always better for your team to identify a problem before a user finds it.

5. Prioritize areas on campus to upgrade first

When it comes time to begin the installation, the order in which you upgrade should not be left to chance. Don’t leave it to the squeaky wheel to determine the order of upgrade. I recommend prioritizing mission-critical areas first, leaving secondary demand areas for later in the process.

Check out the other installments in the “Tyler’s Tips” series:

By Tyler Webb, Director of Sales, Campus EAC, ASSA ABLOY

Access and security are essential to a modern campus, but limited funds often hamper an institution’s ability to expand these systems. Students, parents, and staff expect and deserve a safe environment to study, live and work.

In addition to life safety issues, integrated access control systems can serve as a marketing differentiator for an institution, aid in enrolment, and provide a host of other benefits. So, figuring out creative ways to pay for the technology is often a requirement.

1. Federal funding sources

Periodically, national priorities have aligned with campus security needs, providing funds via dedicated grants. For those that qualify, apply, and are approved, these funds can help cover all or part of the costs for a security upgrade.

In recent years, COVID funds have helped many institutions improve security. The Coronavirus Aid, Relief, and Economic Security Act (CARES Act) was approved by Congress on March 2020. It authorized $2.2 trillion in economic aid to people and organizations negatively impacted by the pandemic.

According to the U.S. Department of Education, approximately $14 billion was dedicated to campuses via the Higher Education Emergency Relief Fund, or HEERF. Additional funds were allocated for the program in subsequent years, and in 2022, the use of HEERF (a)(2) grant funds for construction and renovation projects was authorized.

Late in 2021, the $2 trillion Infrastructure Law was passed. One part of the law is the Infrastructure Investment and Jobs Act, which includes key opportunities for higher education institutions. Though not all the opportunities are known at this time, it specifically includes $12 billion to update infrastructure at community colleges.

2. Phased approach using multi-technology readers

When you have a vision and a plan for where you are going, incremental steps toward that goal always make sense. If you know you want secure contactless credentials and/or mobile credentials, make the commitment to start now.

I cannot think of a time when I would not recommend this phased approach. It can be critical in immediate progress toward your goal.

When it comes time to replace a broken reader, renovate an existing building, or build new construction, you’ll want to begin the process of upgrading to more advanced contactless readers. If your current ID card uses mag stripe or 125 khz prox, you can issue dual technology cards to support cardholders who need to access both old and new readers.

I cannot think of a time when I would not recommend this phased approach. It can be critical in immediate progress toward your goal.

3. Partner with alumni associations or other organizations

Explore opportunities with other campus constituencies that may see the benefit of an integrated access system that increases life safety and can boost enrollment. Perhaps the alumni or student association has funds to allocate toward projects.

4. Public private partnerships (P3s)

In many cases, institutions are opting not to secure funds to pay for the construction of new facilities, specifically residence halls, on their own. Instead, some look to private companies to manage the construction and costs, charging the institution rent or fees to repay the construction, maintenance, and management costs. P3s often enable a campus to fast-track construction projects because they do not have to wait for state infrastructure dollars or internal funds to be allocated.

P3s often enable a campus to fast-track construction projects because they don't have to wait for state infrastructure dollars or internal funds to be allocated.

In any P3 project, specifying your integrated access system makes sense. Make the new project a part of your comprehensive program and have reader deployment baked into the project cost.

5. Technology fees added to student fees

Many campuses use technology fees to fund projects that are important to the student experience. If your institution already issues a technology fee, explore whether a portion of this fee could be allocated for security infrastructure. If you don’t have a technology fee, start the conversation to see if this could be a good fit for your campus.

Check out the other installments in the “Tyler’s Tips” series:

By Tyler Webb, Director of Sales, Campus EAC, ASSA ABLOY

On many of the campuses I’ve had the opportunity to work with, a fully integrated access and security system is not a hardware deployment, but rather an enterprise level software solution. Investments in these systems pay dividends in student and staff life safety, but they also deliver additional benefits.

Understanding these benefits and how to articulate them to key campus constituencies can help ensure others appreciate the investment. But you must be proactive and tell your story to make these less obvious benefits known.

1. Boost enrollment

Security is a core priority for many students and parents when selecting an institution. You cannot sit back and assume that word of your hard work on the security front will simply be noticed by prospective families. Tell the story of the investment in security and explain that it is an institutional priority to keep students safe. Work with orientation leaders and campus tour guides to help them craft a compelling message. Offer to educate campus marketing leads to integrate it into marketing materials.

Tout the convenience and security benefits of advanced ID technology including contactless cards and mobile credentials. Students love innovative technology, and it can weigh into their enrollment decisions.

2. Educate staff at all levels on the investment

It’s not just about students. Faculty and staff need to feel safe and know that the institution is working on their behalf. Often a staff member sees an access control reader on their building’s front door, but they don’t realize the pervasive nature of the campuswide deployment.

Work on programs to help them understand. Staff bulletins, email newsletters, and orientation sessions are opportunities to get the word out. Consider offering to give a quick presentation at a faculty-wide meeting or a series of departmental meetings.

When your faculty and staff understand the value of the investment and the commitment of the institution, they can appreciate it personally and be an advocate to others on campus.

3. Go beyond residence halls

I often see campuses focus on residence hall security but neglect other aspects and areas. The student experience with security technology frequently includes academic and administrative buildings, athletic and leisure facilities, libraries, and more.

Turnstiles may control access to dining locations and libraries. Biometric readers may provide added security in labs as well as added convenience for pools and rec centers.

An integrated approach to access on campus also enables you to tie in parking, visitor management, CCTV, parking lot availability, and a host of other peripheral systems. I encourage campuses to consider the full range of offerings that an integrated security system can deliver, and tout all those you have – not just residence hall security – to your various audiences.

4. Data analytics for life safety, wellness checks

Access control systems produce a massive amount of data. Start the discussions on campus about utilizing this data to support your students and staff.

Experiment with some basic reports you could drive that might indicate a student at risk. I have worked with clients that look for students that have not accessed their res hall for an extended period, that use parking garage cameras to identify abandoned vehicles, or that look for other patterns that diverge from norms. If you can show some sample reports, it can facilitate the discussion with your campus community.

5. Streamlined management across the enterprise

An integrated access system alleviates the common institutional problem of supporting multiple PACS. Over the years, many – if not most – campuses saw different departments investing in different access control systems. This decentralized, siloed approach made management a challenge and left some areas more vulnerable to breach than others.

Consolidating these systems facilitates management and operations, as well as issuance and revocation of credentials. If someone’s access privileges need to be revoked, this can be done quickly and safely via one system.

Across the board, this approach to access and security provides far better visibility into system data.

Check out the other installments in the “Tyler’s Tips” series:

By Tyler Webb, Director of Sales, Campus EAC, ASSA ABLOY

These days, everyone seems to be talking about mobile credentials. The technology brings efficiencies for the campus, convenience for students, and security across the board. But it’s important that everyone is aware of all the potential challenges involved with their adoption.

So, I’d like to share some tips I have learned during my days deploying mobile credentials as the director of the Sooner Card program at the University of Oklahoma and from helping other campuses do the same in my position at ASSA ABLOY.

1. Understand your current situation

It is essential to understand your campus environment holistically. Too often, we lose sight of the big picture and focus on the things we see every day, like issuance, access control, and dining. But there are many, many more touchpoints for most programs.

I recommend creating a document that outlines where your cards are used today. Next to these uses, note the systems that are leveraging the technology. For example, one use area might be the residential room assignment during orientation, and the system would likely be the housing management system.

Across the areas you identify, you’ll need hardware to read the NFC or Bluetooth credential from the mobile phone. If you have already been rolling out modern readers to read contactless IDs, you may be partway down the road. Still, on every campus I have worked with, many readers required replacement or upgrade.

If you have already been rolling out modern readers to read contactless IDs, you may be partway down the road. Still, on every campus I have worked with, many readers required replacement or upgrade.

Next, examine the current situation as it relates to personnel. Do you have the resources to make a migration to mobile credentials possible? It will entail long hours and dedicated effort from your IT department, as well as your card office team and its leadership. You’ll want to ensure that it is a priority for everyone who needs to be involved to ensure that they are able to dedicate the time and resources necessary.

2. Evaluate mobile credential technology options

When you decide to make the leap to mobile credentials, there is a series of decisions you must make. Your choice of vendor may mandate some things for you, but similarly, your technology decisions could influence which vendors you choose as partners.

There are two distinct ways to get the credential information – such as the ID number – from the mobile phone to the reader. Near Field Communication (NFC) and Bluetooth Low Energy (BLE) are both wireless communication standards that transmit data through the air. NFC is more commonly used in the higher education market. It transmits over a shorter distance than Bluetooth, which is actually a benefit as it keeps the data within inches of the reader. It is also considered by many to be more secure. NFC also provides greater interoperability with other systems now and in the future, whereas BLE is used solely for access.

Your choice of vendor may mandate some things for you, but similarly, your technology decisions could influence which vendors you choose as partners.

The major transaction system providers offer a mobile credential solution. I recommend educating yourself on these offerings and how they differ. If you already work with a transaction system provider, start there and see what infrastructure, software, and institutional knowledge you already have in the proverbial bank.

Because life safety is the most crucial function of a campus ID, I always suggest talking to access control providers at the start of this process.

Technology options extend far beyond the wireless technology and the vendor selection. Be proactive and ask questions about credential provisioning, revocation, and encryption key ownership.

3. Get executive buy-in from the necessary stakeholders on campus

It is almost a cliché to say that you need executive level buy-in for a project to succeed in higher ed, but that doesn’t make it untrue. For a major technology initiative like mobile credentials – one that requires major commitment, staffing and financial resources – it is imperative.

I suggest starting with forward-thinking colleagues in IT, security, housing, and high-level administration. With support from within the various departments, it can be easier to get the okay from the department heads and the dean/provost. And don’t forget the students. They can be a major ally in the process.

4. Determine the business model for your program

Operating a mobile credential program is like running a business. You may not need to turn a hefty profit, but you do need to run efficiently and – especially if your office is a self-sustaining auxiliary – cover your costs. You also need funding to procure infrastructure and build the program.

Let’s assume your administration has approved the funding to launch the program (if not, there is no reason to proceed to these other tips). The first thing I ask card program directors is if they are ready to change roles and responsibilities – and potentially replace staff – as the need to print cards is reduced or eliminated.

Card offices traditionally cover a sizable part of their ongoing costs via lost card fees. In the mobile credential world, these fees go away. Get creative and explore ways to replace these fees with other revenue streams.

The nature of the work will change, so you and your team must change with it. If the workload diminishes, staff may have to be reallocated. If you have employees nearing retirement, you may be able to eliminate the positions and replace them with part-time student staff.

Many card offices traditionally covered a sizable part of their ongoing costs via lost card fees. In the mobile credential world, these fees go away. Get creative and explore ways to replace these fees with other revenue streams.

Additionally, as lost card fees do dry up, you will also incur an annual license fee for each person issued a mobile credential. In the past, a card issued as a freshman arrives to campus might last four or five years until graduation. After the initial cost of the card and its issuance, there were no more fees for that credential. Be prepared for this change to your program’s business model.

5. Create your launch plan

If you have made it to this point, give yourself a major pat on the back! But get ready for more work and late nights. I find that a well thought out launch plan is key to keeping things smooth in these final stages.

First, be sure to establish a realistic launch date. It is not realistic to pull off a project of this magnitude “over the summer break.” Take your time and do it right.

You may feel external pressure from constituencies on campus to launch ahead of some milestone event or date. You may also feel internal pressure to meet your own established timeline. Be certain that you are really prepared to hit the launch date, and if not, don’t be shy. Be transparent, make your concerns known, and hit reset.

Provide mobile credentials to students before they come to campus for the first time. With a little marketing, you can get mobile credentials onto student phones before they leave home. That is the beauty of over-the-air provisioning. They do not need to be in your office to receive their ID. The more you can issue ahead of time, the smoother the first days of the launch will be.

Test, retest, and test again. This includes all parts of your ecosystem. Look back at your initial outline of all the areas using your credential and let it guide your testing.

Test, retest, and test again. This includes all parts of your ecosystem. Look back at your initial outline of all the areas using your credential and let it guide your testing. Leverage a group of full-time employees and students as test subjects. In addition to providing real word feedback, they will become some of your greatest advocates, helping spread the word to others.

Have a defined, comprehensive marketing plan in place to make sure your populations know what is happening and why they should participate. Just because you build it does not mean they will come. Call on marketing professionals and staff, as well as students and your vendor partners to assist.

Manage expectations surrounding the launch. Participation levels may not be where you want them to be on day one, but with continued effort you will get there. Make sure that others on campus understand that the migration can be a slow roll, so don’t expect 100% enrollment on day one.

Check out the other installments in the “Tyler’s Tips” series:

By Sean Houchin, product manager, ELATEC

Campuses seeking an open alternative to traditional access control platforms such as LEGIC or HID have an increasingly accepted option to consider: LEAF. LEAF is an open, interoperable platform that allows end users to use their LEAF ID card, key fob or smartphone to unlock access to various campus applications through any LEAF-enabled reader. As more campuses look for ways to streamline and simplify access control, LEAF-compatible RFID readers can offer an advantage to original equipment manufacturers (OEMs) and system integrators selling into the campus market.

Conceived by DSP and cryptographic engineer Hugo Wendling, the LEAF standard is based on MIFARE DESFire EV2. Today, it is carried forward by the LEAF Consortium, a group of industry partners representing hardware manufacturers, software developers and identity media manufacturers. LEAF offers several critical benefits:

LEAF-enabled products include door locks for building access and RFID readers that can be integrated into various devices for physical access control and digital access management. In a campus environment, applications could include elevator panels, turnstiles, multi-function printers, computer workstations, vending machines, smart lockers, retail registers, EV charging stations and more.

This creates the opportunity for a genuinely unified access control system. Instead of managing multiple user identities and identification media for different applications – such as campus transportation, building and parking garage entry, single sign-on (SSO) to campus networks, and access to amenities such as the cafeteria or gym – users can use their LEAF identity credential for everything. That same credential card carries over to other LEAF-enabled applications off-campus, too. As a result, LEAF provides an easier way for end users to manage their digital identities to access locations, physical assets and services in both the consumer and professional realms.

The open platform makes LEAF exceptionally easy for equipment manufacturers and system integrators to implement. With the LEAF standard, access control from the front door to the printer can be unified under one universal standard—even when using readers from different manufacturers. A simple firmware update can make suitable readers LEAF-compatible.

As the “smart office,” “smart city” and “smart campus” become a reality, user identification and access control are more critical than ever. LEAF makes it possible to create unified access systems with more user convenience and a lower entry barrier for system owners, integrators and equipment manufacturers.

Curious about implementing LEAF? ELATEC can help you decide whether the LEAF standard is right for you.


Sean Houchin is the product manager for ELATEC in Palm City, Fla., and is part of the global ELATEC GmbH product-management team. He has over 20 years of experience in product development, management and applications engineering. Sean is an expert in RFID technology, optoelectronic and fiber optic video, audio, and data transmission equipment for military and commercial applications, and is a veteran of the United States Navy.

By Jeff Koziol, Allegion’s business development manager of campus software partners

Credential technology has come a long way since the first electronic card access system was developed in 1968. For decades, universities have used some form of campus card. Yet many campuses have made few changes to the legacy technology they adopted years ago.

While many understand the risks of outdated technology, they haven’t made the change to something more secure, like smart cards or mobile student IDs. And those who had plans in place likely saw them shattered when the pandemic struck last year, forcing universities to pivot their 2020 initiatives.

Ironically, the pandemic uncovered the benefits of a contactless campus, leaving many to revisit the need to invest in smart cards or mobile student IDs.

Luckily, there is funding available to help colleges and universities prepare to bring students back to healthier campuses. Because contactless credentials can help limit the spread of COVID-19, Higher Education Emergency Relief Funds (HEERF) might be able to help your campus make the transition.

What is HEERF?

Wondering how to fund higher education plans that will allow you to resume a somewhat normal campus experience? Coronavirus relief funding might be the answer.

HEERF was established as part of the CARES Act to provide fast and direct economic aid. Since then, new funding has been issued through the CRRSA Act and ARP Act to provide more relief from financial losses resulting from COVID-19 and support safe reopening of campuses. The NASFAA created this comparison chart to explain the three HEERFs.

“There are two parts to the higher education funds: student relief and institutional relief,” says Dr. Paula Love, President of RFPMatch.com. “The institutional portion of these funds can be used to implement evidence-based practices to monitor and suppress spread of the coronavirus in accordance with public health guidelines.”

“These funds are flexible to allow schools to use the funds where they are needed most,” Love adds. “For some, that might be implementing contactless transactions and touchless access control on campus.”

"Bottom line, there is a lot of money available for higher education institutions that can be used to help implement strategies to prevent the spread of COVID-19."

During the NACCU session, “Demand for Frictionless Technology: The Silver Lining of a Global Pandemic,” the speaker shared how the University of Montana used stimulus funding for new readers on each building to support its move to contactless credentials. The move increased security, reduced the time it took campus police to manually lock and unlock doors and helped them prepare for the next pandemic.

Bottom line, there is a lot of money available for higher education institutions that can be used to help implement strategies to prevent the spread of COVID-19.

It’s time to reconsider contactless credentials

“Regardless of cost, campus leaders are certainly thinking a lot about ways to make life involve less contact with surfaces and people, as COVID is here for now and will impact future behaviors,” writes Melissa Ezarik for University Business in November 2020. The article outlines six areas of campus to make contactless, including mobile credentials.

I’m hopeful that the end is in sight. Yet, the behavioral changes that we inherited during the last 14 months aren’t going to evaporate overnight. I’d still prefer a touchless door over mechanical operation. I’d rather use my phone to tap-and-go versus handing over my credit card for a cashier to swipe. Bottom line, I don’t want to put my hands where who knows how many hands have been before.

While I’m hopeful, I also recognize we are still in the pandemic and caution must be taken to limit the spread on campus. It appears that campuses across markets agree. Research from Campus Safety’s “Access Control, Lock and Lockdown Special Report found that there was interest among higher education, K-12 and hospital campuses in hands-free (17%), touchless (14%) and antimicrobial door hardware (13%) to stem the spread of COVID-19 and other infectious diseases.

Three ways contactless credentials can help prevent the spread of COVID-19 on campus:

Deploy remotely. Mobile student IDs offer the same contactless and security benefits as smart cards, plus they can be remotely deployed to avoid in-person contact. Wave goodbye to the long lines at the card office. The University of Tennessee, Knoxville, experienced this last summer when it had to pause it’s in-person summer orientations, the time students traditionally receive their VolCards. Students with Apple devices were able to take advantage of virtual deployment so there was less person-to-person contact at the card office.

No swiping needed. Students only need to present their mobile device or campus card in the RF field emitted by the reader for building access, dining, library transactions and more. They won’t need to hand over their credentials to a cashier to swipe or touch any objects. Nor will they have to swipe the magnetic stripe on their card, where they are essentially rubbing their hands on readers that are being touched by all campus personnel.

“At most universities and colleges, the campus card is the lifeblood of a student’s daily routine,” says Brad Sweet, when explaining how to safely improve campus security. “It’s how students access buildings, eat at dining halls, check out books from the library, print term papers, do their laundry—the list goes on. With so much relying on that card, it’s safe to assume it’s being touched multiple times a day. Therefore, upgrading to a contactless solution limits how frequently the student needs to swipe a card on campus, which involves coming in contact with the reader.”

Contact tracing. “As schools and institutions of higher education (IHEs) resume in-person learning, case investigation and contact tracing with staff, educators, and students are effective strategies to identify and isolate cases and test and quarantine close contacts to reduce transmission,” per the CDC guidelines.

Many universities, like USC, have already piloted contact tracing programs. With the right technology, it can be as simple as presenting a mobile student ID or campus card upon entering specific locations on campus. This video shows how University of Vermont implemented campus contact tracing using an iPad, mobile credentials and Schlage MT20 readers.

Preparing for the future

Universities are focused on getting students back, and to do so, they need to prepare a campus that is suitable for keeping students and faculty healthy and safe. Actions taken today will better prepare campuses for future public health crises. Many are already incorporating lessons learned during this pandemic into their emergency preparedness plans.

The reason for upgrading campus cards might be different than a couple years ago, but the goal is the same -- contactless smart or mobile student IDs. With the renewed focus on going contactless, now might be the time to revive plans or kick off a move from magnetic stripe to contactless mobile credentials using HEERF funds.

"The reason for upgrading campus cards might be different than a couple years ago, but the goal is the same -- contactless smart or mobile student IDs."

Not sure where to start? Check out these four common scenarios that campuses face when upgrading credentials and get tips for each. There are more options available than the four in the article.

Allegion experts are available to develop a tailored path if you would like to explore your campus’s migration plan.

CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Feb. 1 webinar explores how mobile ordering enhanced campus life, increased sales at UVA and Central Washington @Grubhub @CBORD

Join Jeff Koziol and Robert Gaulden from @AllegionUS as we explore how mobile credentials and proptech are changing on- and off-campus housing.

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2024 CampusIDNews. All rights reserved.