The Global Electronic market for access control and security devices has once again recovered, and is growing.  Primary drivers are concerns over security and the safety of personnel, rising crime rates and the terrorist threat. Linked also to the access control market is the growth in building management systems.  This growth is driven by a desire for the financial benefits from active building management and associated deficiencies, by “Green” and environmental issues and by the requirements of enhanced security.

The security market is becoming linked with smart building management systems. The most important element of the Security and Access Control System is the authentication.  This sector, biometric and card based authentication (largest market in 2013) increased by 13.1% CAGR during 2009-2013 to reach USD 11.7 billion in 2013. The Asia-Pacific EAC (Electronic Access Control) systems market expected to record the highest CAGR growth of 16.7% to reach USD 9.6 billion in 2019. Usage of EAC system in commercial sector (largest end-user in 2013) increased by 13.9% CAGR during 2009-2013 to reach USD 4.6 billion in 2013.  When allied with the growth in smart building management, this market is expected to show even bigger increases. Other research published by Markets and Markets considers that the Electronic Access Control System sector is expected to reach $16.3 billion by 2017.

One of the biggest growth areas is expected to be in authentication systems.  To operate an access or security system, each person who is authorised needs some type of identification. The system only allows that user to carry out the required action after identifying the individual and possibly their level of authority. The main functions supported by an Access Control or Security System therefore are:

Subsets of these functions are the need to:

Target market:

Smart Building. Access control, identification, Positioning system, Safety.


Use case scenario environment for physical level consists of wearable device eGo, wireless proximity reader eGR detecting presence of wearable device in close surrounding, IDSIMA4, controlling and management platform, will  configure reader structure and provide communication with server. The platform ensures running of user interfaces, services and applications. Use case scenario environment for logical level is twofold; permanent installation and temporary, event or concert based.

Use case scenario:

IDSIMA4eG access control with wearable device
Use case will demonstrate the innovation of IMA’s branded identification and access control system by integration of new functionalities of wearable devices eGo. The use case will be defined in WP2 and realized in followed WPs. New subsystem functionalities will allow the IDSIMA4 to deliver new kind of ACS services focused on contactless interaction human – objects within smart building environment. The objects aimed are automatic doors, computers access, security systems, location monitoring, appliances control etc.

Users, using the wearable device eGo (GTO), obtain an advanced ACS services, which authorize them to utilize both more secure and more comfortable functions of the system. The wearable device opens to users the access to highly-personalized system services.

Wearing the device, the user owns personalized rights to access dedicated zones, the reading of ID is done wirelessly. Based on the ID the user has got a free movement possibility within personalized area where also the automatic doors will improve the system functionality. Moreover, the wearable eGo device can communicate with indoor positioning system in order to monitor user path and take care of its safety in case the user activate alarm button. 

For pure permanent access control and building management evaluation the wearer of the device will have their unique identifier transmitted to a reader (New IDSIMA4-eG) via H2O contact.  The reader, through an industry standard interface will transmit that ID to a back end server for authentication.  If a positive ID is be returned the appropriate action is initiated by the reader.  Alternatively the reader in some cases would contain the logic to search a white list and perform the appropriate action while communicating the result to the back end server.

For temporary and event installation the wearer will have a less durable (disposable) device. Authentication by contact with the IMA Reader will be verified against the appropriate list held in a back end application.
The reader may enable an action based on the users credentials; such as allow reentry to a concert.

In  all cases user access data will be sent via Ethernet to back end server (Tyco) where user data will be processed and interpreted in order to visualize user access profiles, attendance behavior, alarms, unauthorized attempts etc.

Technological requirements, state of the art, main deadlocks:

Existing components/technology:

Reused project output: