The future for smartcards

Access & Identity Management Handbook 2011 Access Control & Identity Management

Access all areas.

For many of us, smartcards are now part of our daily lives. We rely on their technology to use transport systems, gain access into our office buildings and give us access to networked computer systems. But as smartcard technology continues to evolve, there are some interesting new applications in the pipeline.

While many of them are still at the concept phase, they have the potential to make a very real impact in the most unexpected of places.

A case in point: A South African company based near Port Elizabeth was experiencing repeated problems with theft of petrol intended for its large mining trucks. The trucks were fitted with an antenna over the petrol filler and the nozzle of the petrol dispenser was fitted with a reader module. Once the nozzle was inserted into the filler, this then enabled the petrol itself to be pumped into the trucks. However, people soon discovered that they could remove the antenna from the trucks and place it over their own car filler, which allowed them to dispense petrol directly into their own cars.

Smartcard technology specialist HID Global worked with the company to design a special, tamper-resistant antenna, which if removed from the trucks would be rendered inoperable so fuel will not be dispensed.

Another new and interesting use of smartcard technology in South Africa was found within the city government. A local authority was struggling to find an effective way of managing parking in certain areas of Cape Town where its parking attendants were vulnerable to attack when carrying money on their person.

Under a pilot scheme involving HID Global, which could be rolled out across the city if successful, motorists can purchase a city-parking card from designated retail outlets that is pre-loaded with credit. After parking, the driver locates the nearest attendant – each of whom has responsibility for monitoring a maximum of around 10 bays – and informs him of his bay number, presenting his city-parking card to a GPS-enabled mobile reader. The mobile reader verifies that there is sufficient money on that card, and when the driver selects their desired parking time, the money is deducted from the card. The reader sends an electronic message to the central station confirming that a vehicle will be parked in a particular street for a set period of time. When that time is up, a message is sent from the central station back to the mobile attendant’s reader indicating that the vehicle has outstayed its allotted time slot. The warden then can return to ticket the car if necessary.

Smartcard technology could also help to make the system of dispensing regular medicines to patients in UK hospitals more secure. One concept that is currently under investigation is storing medicine at a patient’s bedside in a secure cabinet. This cabinet is fitted with reading technology and is wirelessly connected to a piece of pharmaceutical software that can link to personal dosage information stored on an RFID wristband.

For instance, if a patient needs to take one tablet at six o’clock in the morning, the software will communicate with the cabinet to indicate that the patient needs to access their medicine. The patient then presents their wristband to the reader that is located in the cabinet, opening the drawer and allowing the patient to take their prescribed medication at the correct time. Given that the NHS already uses HID Global smartcards for physical and logical access, extending their application to dispensing of medicine is a logical progression.

Another interesting use of HID technology is to facilitate mustering. In the event of a fire drill, the usual procedure is that everybody evacuates the building and meets at an assembly point where they report to a fire warden who ticks off their name on a list. Now this manual approach is being replaced by a more sophisticated process where a company’s access control system can be used to produce a list of people in the building at the time of a fire alarm. This information is then downloaded on a regular interval to mobile or mustering devices. Once safely at the assembly point, each employee touches their secure ID card to a mobile device carried by a fire warden, and their name can be checked off, with a counter logging each person until all are accounted for. Recent tests carried out by a large London-based corporation showed that an electronic process cut the time down by 45 minutes compared to a paper one – 45 minutes that could prove vital in an emergency.

Smartcard technology is also making an appearance in the fleet management sector, with RFID now being installed in rental cars. The idea is that a hire car could be parked on the street corner and could be accessed simply by presenting an RFID-enabled card to a reader installed in the window screen. HID Global’s partners are working with some major car rental companies that are keen to leverage the benefits of this technology in streamlining the management of their fleet.

The scope for smartcard technology to improve access control and drive operational efficiencies is virtually unbounded. As we continue to search for ways to run our busy lives more safely and smoothly, it seems likely that the potential for smartcards to help us do just that will be limited only by our imagination.

For more information contact HID Global SA, +27 (0)72 923 9426, jlakin@hidglobal.com, www.hidglobal.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.