Accelerating the
Industrial Internet of Things

Access Control

Access Control Access Control
Feature New Record
REQUEST SUPPORT
Posting...
We will respond within 2 business days
DEFINITION
A system that determines who, when, and where people are allowed to enter or exit a facility or area.
The traditional form of access control is the use of door locks, but modern access control may include electronic systems and wireless locks. Access control may also apply to cybersecurity. The IoT requires a variety of access control and associated accounting schemes to support the various authorisation and usage models that are required by users. The heterogeneity and diversity of the devices/gateways that require access control will require new lightweight schemes to be developed.
IOT SNAPSHOT
The IoT ONE Radar indicates the mix of hardware, software and services used in an IoT solution.
Hardware
Processors provide the intelligence behind IoT systems and are often integrated into system-on-a-chip designs.
Hardware that enables dual directional communication for data collection and control message delivery. Examples include cellular, Ethernet, and Wi-Fi.
Sensors transform energy into electrical data; they are the eyes and ears of IoT. Actuators transform electrical data into energy; they are the muscle of IoT.
IoT power supplies include traditional, thin-film and printed batteries, energy harvesting modules, flexible photovoltaic panels and thermoelectric sources.
Technologies that enable legacy devices and other systems to connect to the IoT. They integrate technologies and protocols for networking.
Products used by end users that contain IoT technologies. Examples include enabled equipment, wearables, hand-held scanners, and tracking devices.
IoT sensors and devices that are worn or embedded into clothing or accessories.
Software
Horizontal applications are standardized (e.g., asset tracking). Vertical applications are tailored to specific needs (e.g., delivery fleet management).
APIs are the market enabler for IoT. They allow users to manage devices, enable data transfer between software, and provide access capabilities.
Middleware integrates the diverse components of an IoT application by structuring communication, workflows, and business rules.
IoT analytics includes real-time or edge computing and batch analysis. Analytics can be behavioral, descriptive, predictive, or prescriptive.
Visualization solutions use dashboards, alerts, events, maps, and other tools to present easily comprehensible data to end users.
Data management solutions capture, index and store data in traditional database, cloud platforms, and fog systems for future use.
Security software provides encryption, access control, and identity protection to IoT solutions from data collection through end-user applications.
Services
System integrators link IoT component subsystems, customize solutions, and ensure that IoT systems communicate with existing operational systems.
IoT data management consultancies help to make sense of big data, decide which data to maintain and for how long, and troubleshoot IT issues.
IoT hardware consultancies provide services such as solution specification, product design, connectivity setup, and partner identification.
IoT software consultancies support the development of data analytics, visualization solutions, and platforms, as well as integration into embedded systems.
Examples of business consulting services include go-to-market design and execution, business model development, channel development, and corporate M&A.
Procurement consultancies support solution selection, ROI analysis, vendor shortlisting, and other areas related to selection and execution of solutions.
Training programs range from executive workshops to technical programs intended to upgrade workforces with IoT expertise.
NEW TERM ALERT
Get notified when New Term is published.