Profile D for access control peripherals

Issue 7 2020 Editor's Choice

ONVIF has published the Release Candidate for Profile D, a draft specification that covers interfaces for access control peripherals. This newest profile candidate is designed to provide ONVIF interoperability for peripheral devices such as locks, credential/biometric readers, PIN pads, license plate recognition cameras, door phones, sensors and displays.

“Profile D, together with access management profiles like ONVIF Profile A and C, and video profiles like ONVIF Profile T, will help users build modern and secure IP-based access control systems,” said Patrik Björling, chair of the ONVIF Profile D Working Group. “It will allow for the integration of products from different manufacturers and help further drive the adoption of ONVIF interfaces in the physical access control and video surveillance space.”

Using Profile D, a peripheral device can pass credential identifiers to a securely located Profile D conformant client, such as an access control unit or management software. The client or controller, which stores access rules, schedules and credentials, can then take the access decision and send a command back to the peripheral device to grant or deny access, display a message or request additional input such as a PIN code. Having sensitive information on a separate controller in a secured area enhances security. Communications between the device and client are secured using ONVIF security protocols such as TLS.

The Profile D specification enables a conformant client to configure a conformant device with the necessary data such as which door and access point the device is responsible for, as well as configure a list of allowed or blocked credential identifiers in a device that supports this capability.

The need for standardised interfaces between access control management systems and peripheral devices is driven by innovative identification technologies such as license plate recognition cameras for parking management, bar code reading cameras for visitor management, wireless locks and sensors for access control, and video door stations for intercom management.

ONVIF Profile D complements Profile A and Profile C in enabling standardised communications in an IP-based electronic access control system. Profile D devices can also support video profiles such as Profile T to enable an integrated video and access control system using ONVIF interfaces. Such devices include a door phone that combines a reader and lock with audio/video intercom, or an IP camera with a relay output connected to a lock that can be used by a guard to visually identify a visitor and remotely unlock the door.

Further information about ONVIF conformant products, including member companies and their conformant models, is available on the ONVIF website: www.onvif.org.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What South Africans need to know about smart devices
Technews Publishing Editor's Choice
We live in a world surrounded by smart devices, from our pockets to our driveways and living rooms.

Read more...
From overwhelm to oversight
Editor's Choice Cyber Security Products
Security automation is vital in today’s world, and Microsoft Sentinel is a widely adopted, but complex answer. ContraForce is an easy-to-use add-on that automatically processes, verifies and warns of threats round-the-clock.

Read more...
SMART Surveillance Conference 2023
Technews Publishing Editor's Choice CCTV, Surveillance & Remote Monitoring Conferences & Events
Some people think the future is all about cloud technologies, but the SMART Surveillance conference demonstrated that AI is making edge surveillance much more attractive, over distributed sites, than ever before.

Read more...
Has your business planned for the worst?
Editor's Choice Cyber Security Security Services & Risk Management
Incident response is a specialised part of security, like a hospital's intensive care unit: IR kicks in when the organisation detects a breach of its systems to stop criminals from doing more damage.

Read more...
Making a difference with human intelligence gathering
Kleyn Change Management Editor's Choice
Eva Nolle believes that woman should stand their ground as they often bring an entirely different skill set to the table, which enhances the overall service delivered.

Read more...
Milestone celebrates women in security
Milestone Systems Technews Publishing Editor's Choice News Conferences & Events
The Milestone Systems’ African team wanted to express their appreciation for the incredible contributions of the women in the security industry and held a breakfast in honour of the hard-working women in the industry on 8 August.

Read more...
Supporting CCTV intelligence with small and big data
Leaderware Editor's Choice CCTV, Surveillance & Remote Monitoring
The increasing development of AI and its role in enhancing investigation-led surveillance, and the increasing capacity of control rooms and local analysts to deliver data in return, can increase the synergy between intelligence and surveillance.

Read more...
Overcoming resistance to changing your current operating model
Editor's Choice Integrated Solutions
Business survival goes beyond cutting costs and driving efficiency, it’s about using data and technology as strategic assets to develop speed, agility and resilience, keep up with customer demands, beat the competition and grow the business.

Read more...
The road to Zero Trust not necessarily paved with gold
Editor's Choice Access Control & Identity Management Cyber Security
Paul Meyer says that while Zero Trust must be the goal, there are a few potholes to navigate on the journey. Here he expands on these caveats, but also exposes the greatest ally of Zero Trust.

Read more...
More agile, flexible access management
ASSA ABLOY South Africa Editor's Choice Access Control & Identity Management
Tim Timmins from ASSA ABLOY Opening Solutions examines the growing shift towards cloud access management. How can organisations benefit, and what should they look for when choosing a cloud access control solution?

Read more...