Profile D for access control peripherals

Issue 7 2020 Editor's Choice

ONVIF has published the Release Candidate for Profile D, a draft specification that covers interfaces for access control peripherals. This newest profile candidate is designed to provide ONVIF interoperability for peripheral devices such as locks, credential/biometric readers, PIN pads, license plate recognition cameras, door phones, sensors and displays.

“Profile D, together with access management profiles like ONVIF Profile A and C, and video profiles like ONVIF Profile T, will help users build modern and secure IP-based access control systems,” said Patrik Björling, chair of the ONVIF Profile D Working Group. “It will allow for the integration of products from different manufacturers and help further drive the adoption of ONVIF interfaces in the physical access control and video surveillance space.”

Using Profile D, a peripheral device can pass credential identifiers to a securely located Profile D conformant client, such as an access control unit or management software. The client or controller, which stores access rules, schedules and credentials, can then take the access decision and send a command back to the peripheral device to grant or deny access, display a message or request additional input such as a PIN code. Having sensitive information on a separate controller in a secured area enhances security. Communications between the device and client are secured using ONVIF security protocols such as TLS.

The Profile D specification enables a conformant client to configure a conformant device with the necessary data such as which door and access point the device is responsible for, as well as configure a list of allowed or blocked credential identifiers in a device that supports this capability.

The need for standardised interfaces between access control management systems and peripheral devices is driven by innovative identification technologies such as license plate recognition cameras for parking management, bar code reading cameras for visitor management, wireless locks and sensors for access control, and video door stations for intercom management.

ONVIF Profile D complements Profile A and Profile C in enabling standardised communications in an IP-based electronic access control system. Profile D devices can also support video profiles such as Profile T to enable an integrated video and access control system using ONVIF interfaces. Such devices include a door phone that combines a reader and lock with audio/video intercom, or an IP camera with a relay output connected to a lock that can be used by a guard to visually identify a visitor and remotely unlock the door.

Further information about ONVIF conformant products, including member companies and their conformant models, is available on the ONVIF website: www.onvif.org.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...