Dates: March 5-7, 2012
Location: Las Vegas, Nevada
Venue: Mirage Hotel
URL: Click here
Description: CARTES in North America will combine a high level conference program with international experts and a comprehensive exhibition featuring the most representative companies in card manufacturing, payment solutions, identification solutions and digital security.
Mobile devices are poised to become the ID credential of the future. In a recent video interview, Blackboard Transact president David Marr shared his views on mobile platforms in higher ed and the impacts on campus card offices. CR80News’ Chris Corum discussed the topic with Marr as well in a podcast.
He describes the mobile device as “the virtual front door of the institution,” but he stresses that you can’t just leave that door propped open. “The credential that is the key to opening that door will reside in the campus card office,” he says.
When it comes to service delivery on the modern campus, Marr explains, “geographic boundaries of a campus are no longer the primary driver, mobile devices and applications have blurred these boundaries.”
He suggests that campus card administrators get immersed in the conversations about mobile on their campus. “Let IT know that campus card solution providers are moving the credential to the phone,” he says, “I am confident that will get their attention.”
In the video, Marr highlights several exciting mobile initiatives underway at campuses across the country including Stanford University and University of Washington.
To listen to the podcast, click the play button below:
HID, Arizona State pilot multiple handsets, carriers and apps on campus
As the Fall semester geared up at Arizona State University, something revolutionary was happening in one of the residence halls. Select students living in Palo Verde Main were no longer using their Sun Card to gain access. Instead they were using cell phones.
Compared to most residences, Palo Verde Main was already considered advanced in access control circles. For six years, contactless technology in the student ID card had granted access to the building. But in August, a group of students and staff became the first in the country to use smart phones equipped with near field communication (NFC) technology instead of keys or cards.
ASU worked with HID Global on the pilot. The company’s contactless iCLASS technology powers the student ID known as the Sun Card and HID readers secure residences, offices and labs throughout the Tempe campus.
Though the pilot came together rapidly, the spark for it was years in the making. “Three-years ago I began to notice a lot of press around NFC,” says Laura Ploughe, director of Business Applications and Fiscal Control for University Business Services at Arizona State University. “I mentioned it to my HID rep and about a week later he sent me news clip from ASSA ABLOY hospitality with a photo showing a phone opening a door.”
It was an “aha” moment. She realized the phone was the ubiquitous device that would really change things. “I stuck the news clip on my wall with a pushpin and it has been there ever since,” she says.
At a trade show this spring, Ploughe saw a demonstration of HID’s new iCLASS line based on its Secure Identity Object concept. Called iCLASS SE, short for Secure Identity Object-enabled, it allows the access credential to be stored on cards, fobs, phones and other devices. “It was a dream come true,” she explains. “I could see live what was under that pushpin on my wall.”
Ploughe told her contacts at HID that she would love to be involved if they needed a pilot location. “Never in my life did I think they’d say yes,” she laughs. But by early summer, agreements were in place and planning commenced.
“I thought we’d take a 24-week timeline for a pilot,” says Ploughe. “But the timeline was shortened when we began talking to stakeholders.”
Ploughe works in University Business Services. Among other things, the division oversees the Sun Card program and the Electric Door Access and Surveillance program. She approached her colleagues in University Housing for support, as they would be crucial to the success of the pilot.
“We looked at where it would best fit in the school calendar,” she says. “Housing agreed to participate but wanted to do it during early move-in to ensure there was no disruption to student learning.” That dictated an August launch, so a single discussion shortened the original timeline from 24 weeks to just eight weeks.
On Aug. 1 the hardware and equipment for the pilot was installed. Internal communications were sent to stakeholders including the police department and facilities to make sure they weren’t alarmed when news spread that cell phones were opening residence hall doors.
The following week HID Global staff trained campus technicians and the lock maintenance group.
On Aug. 10 new phones were given to the students and staff participating in the pilot. In all 32 participants – 27 students and five staff – were provided NFC-equipped phones to use as they lived life in and around Palo Verde Main.
The hall was not selected by accident. It houses many of ASU’s engineering students, individuals with an obvious technical acuity. “We picked Community Assistants (resident assistants) because they have single rooms and are both responsive and responsible,” says Ploughe.
As for the staff participants, Ploughe explains, “we wanted a couple of people from facilities to be able to test the system and we also chose staff from the residence hall to assist with technical support.”

“Because this was a pilot, we decided it would be good to have multiple brands of smart phones,” explains Deb Spitler, HID Global ‘s VP of HID Connect. Participants were outfitted with one of three handsets: RIM’s BlackBerry Bold 9650, Samsung’s Android (multiple models) or Apple’s iPhone 4G.
Handsets with embedded NFC functionality are not widely available so the pilot relied on microSD cards and sleeves for the NFC functionality. Three separate carriers – AT&T, Verizon Wireless and T-Mobile – were used for mobile services.
Two separate apps were used to carry the electronic credentials. The BlackBerry and iPhone users ran ASSA ABLOY’s Mobile Keys Application while Android users ran a mobile access application from HID.
Each participant received a fully provisioned phone with unlimited voice and text service. At the outset, the hope was to use the students’ existing smart phones. “We surveyed them to find out if they had a phone that we could enable with a microSD card,” explains Spitler. “There was a very small number that actually had a workable handset … well over half had a basic phone and not a smart phone.”
So the school and HID put new smart phones into all their hands. Because participants would keep the handset after the trial, Spitler says, they matched the mobile carrier and handset model to the individual’s current service. In that way, they could transition their new smart phone to their current carrier post pilot.
“We hoped this would help to engage them and show them that their participation and input to the pilot was important to us,” says Spitler.
ASU already had HID iCLASS readers across the campus and at key points in Palo Verde Main. But to accept the new NFC keys, readers needed to be upgraded to accept the company’s Secure Identity Object credentials. At six entrances, iCLASS SE readers replaced the existing contactless readers. Four new locations were also enabled with the SE units.
Additionally, four individual rooms within the residence hall were equipped with an offline door lock from ASSA ABLOY’s Sargent line. These locks require the use of a PIN in addition to the credential on the phone.
To gain access, students present keys, cards or phones at as many as four separate points within the residence hall. A main entrance, a courtyard entrance, a wing door and finally a room door each are secured. Most of the students still required the key to gain ultimate entry to their room, but four participants used the phone at all entry points thanks to the Sargent locks.
“When a student approaches a door they click the icon on the smart phone to launch the app and then present it to the door,” explains Ploughe. For the pilot, the countdown was set to 30 seconds before the application closes.
“The sweet spot was different on each phone,” she says, referring to the ideal physical place on the phone to hold next to the reader for optimal use. “We put a Sparky emblem (ASU’s mascot) on back of each phone to make it easy and convenient.”
At the midpoint of the pilot, an initial survey of participants revealed promising results. Key questions pertained to training and support on devices, functionality of the application and comparison to the card in terms of convenience and speed. Other questions asked for suggestions to improve the current functionality and ideas for additional applications.
At the conclusion of the pilot, a second survey was conducted to address changes in perceptions over time. Have you changed your mind on things? Are you more or less happy with the functionality? Would you like to see the functionality continue to be supported on campus?
Results of these surveys will be released during a panel discussion on Monday, Sept. 19 at the ASIS conference in Orlando. Look for additional details here next week on the survey results.
The pilot concluded on Sept. 6. At press time, ASU was reviewing the survey data to determine next steps.
For Spitler, the pilot was a lesson in reality meeting new technology. “It enabled us to explore how people use mobile credentials and NFC in the real world,” she says.
That is the real value of a pilot. It forces stakeholders to forget their preconceptions of a technology and address how people actually live and work.
As Spitler points out, this is why it was great to have a number of different devices, readers and apps. “It gave us different feelings and that is what a pilot is all about,” she adds.
“It’s my hope that we do a secondary pilot,” says Ploughe. “Ideally I would like the smart phone to be the tool for everything. Lots of people are driving a mobile app to smart phones but there is some risk.”
She hopes that one outcome of these pilots and this user directed research is the establishment of some best practices. “Take care of the risk,” she explains, “and we can open up other applications.”
Ultimately, for ASU it’s all about student success. “The key is engaging them the way they want to be engaged – the same way they do with their friends and with the same tool that connects them socially,” explains Ploughe. “It means that we provide our services to students with devices like this or we have failed in helping them be successful.”
Wireless locks from ASSA ABLOY’s Aperio line can now be used within Keri Systems’ Doors.NET physical security offering. Customers can mix and match the Aperio wireless readers and the Keri TCP/IP-based NXT readers to get the ideal functionality at each door.
Aperio brings a cost-effective way to connect additional openings to an existing electronic access control system. It communicates wirelessly using 802.15.4 and supports HID iCLASS credentials. More than 40 access control companies have adopted the technology globally.
“We are very excited that Keri Systems is the first to integrate our two wireless technologies – Aperio and WiFi,” said Martin Huddart, vice president for Electronic Access Control at ASSA ABLOY Door Security Solutions. “The combination of their Doors.NET software and NXT hardware platform with ASSA ABLOY’s complete range of wireless solutions offers customers the flexibility and performance they need.”
Students at Louisiana Tech University are using their campus card and Tech Express account at local merchants thanks to CBORD’s UGryd. The cards have been used for on-campus purchasing since the mid-1990s but this is the first foray into the community.
The article cites expansion of the physical campus closer to downtown as one reason for rising student interest in the off campus card use.
Lisa Cole, comptroller for Louisiana Tech, told the News Star that initial phase of the program would include more than 25 merchants, a record for a UGryd launch. Merchants receive a POS terminal, daily settlement via ACH, online access to real-time transaction activity and end-of-month statements.
CBORD describes UGryd as a PCI-compliant transaction-processing host for off-campus programs. It enables real-time transaction processing over secure connections between universities and merchants, eliminating the need for phone lines, modem banks and excess hardware on campus.
So zombies might not be the typical badge holders on campus but as the campus game known as Humans vs. Zombies spreads we may see a new use for the student ID. This week at Case Western Reserve University in Cleveland, zombie students tried to tag human students to turn them into zombies, while humans defended themselves with nerf dart guns.
Participants sign up online to play and receive a ‘human’ ID card. When a zombie tags a human, he claims his victim’s ID number and logs the kill online. The human then becomes a zombie and can join the hunt.
One zombie told a reporter for the Plain Dealer, “It’s a lot of fun … you meet people from every major and talk to people you would have never talked to.” And a faculty member added, “This school has a reputation of people sitting in their rooms doing chemistry homework so to see someone running around campus at full speed is good.”
Humans vs. Zombies first started at Goucher College in Baltimore but is now played on campuses around the world.
While the human ID at Case Western is not the official campus card, could this be the next application for our campus card system providers?
Read more about the Case Western battle here
Read more about the game, its rules and software support
Some scoff at the idea of emerging biometrics, saying that the identification technology as a whole is still emerging. In reality, however, fingerprints have been used to identify criminals for nearly a century and around the world biometrics are used to gain access to buildings, get cash at ATMs and authenticate online transactions.
The days when biometric scanners were merely props in James Bond movies are gone. The North American market appears to be on the precipice of a change. Use cases for secure authentication are everywhere, and the technology foundations to enable biometrics have matured.
Re:ID editors spoke with a group of industry leaders to get their thoughts on what's coming in the biometric market. The individuals deploy and look at biometric systems every day and the emerging trends they identified were remarkably consistent. They include the rise of two formerly outlying modalities and the coalescence of biometrics and mobile devices for two distinct applications.
Trend: Vascular biometrics gets under your skinVein pattern biometrics is a modality that is garnering a lot of interest, says Rick Lazarick, chief scientist at the identity labs for CSC. Some large-scale test results show that both finger vein and palm vein biometrics are extremely accurate, he says, and possess some really important convenience attributes.
The modality is being used in ATMs throughout Japan as well as in Brazil and Poland. "The ATM implementations show that they have the capability to be used in large scale and mainstream applications," Lazarick says.
The Japanese ATMs use three-factor authentication for transactions–card, PIN and a vascular biometric, says Walter Hamilton, a senior consultant at ID Technology Partners and chairman of the International Biometrics and Identification Association.
The technology is starting to show up in North America as well. The Port of Halifax in Nova Scotia is using vascular technology for physical access control and Baycare Health System in Tampa, Fla. is using it for patient identification, Hamilton says.
"It works well, and based on independent testing, I see the technology being just as accurate as fingerprint for one-to-one matching," Hamilton says. "I also see the general population having fewer challenges submitting a good sample of their vein pattern in comparison to the problem some people have with fingerprints."
Some individuals have difficulty with enrolling a usable fingerprint sample, Hamilton says. Very fine fingerprints are tough to pick up and others may have damaged their fingerprints making it difficult to get an image and then match later.
Vein pattern biometrics use light to map the vascular pattern underneath the skin so the surface doesn't matter. Failure-to-enroll rates for vein pattern technologies are very low, Hamilton says.
Test results have shown that the technology is very reliable, adds Lazarick. "Many times vascular outperforms iris," he says.
It can also be viewed as a privacy-enabling technology compared to fingerprints, iris and facial, Hamilton says. Fingerprints leave a residue that can be lifted off a surface and potentially replicated.
"Some people doubt (fingerprint biometrics') ability for credentialing because there's a chance someone may copy a fingerprint from a glass," Hamilton says.
Since vein pattern records the pattern beneath the surface it's virtually impossible to covertly observe. "Unions and certain segments that would object to fingerprints would not object to vein pattern," Hamilton says.
Vascular is also touted as the hygienic biometric, Hamilton says. Typically with this technology a user places his hand or finger on a guide above the scanner whereas with contact scanners there is the possibility of germ transfer between users.
But there still are challenges vascular technologies will have to overcome, Hamilton says. Fujitsu and Hitachi are the two main vein recognition providers and each uses its own proprietary algorithm for matching. This means templates from a Hitachi scanner cannot be read by a Fujitsu scanner and vice versa.
This may change, however, as the National Institute for Standards and Technology is working on a standard for vein recognition. But, Hamilton explains, the work is in the early stages.
Trend: Iris gets a second lookIris is the other modality that seems to be on the cusp of widespread deployment, says Bryan Ichikawa, vice president of identity solutions at Unisys. "Long distance iris recognition opens up whole new worlds and works very well," he says.
The U.S. Department of Homeland Security contracted Unisys to test the different long distance iris products last year. The test, says Ichikawa, showed that iris solutions from multiple vendors could be used for one implementation.
Long distance iris systems from Sarnoff and AOptix show tremendous promise, Lazarick says. "They are close to having something pretty phenomenal," he says.
"Mainstream iris adoption has already begun," says Dale Bastian, VP of Sales – Biometrics, AOptix Technologies. "There are many large scale, production and final stage testing deployments underway that demonstrate that important end-users have fully accepted the modality."
In the Middle East iris is being used for immigration applications and to track individuals expelled from the country, Hamilton says. Airports are also considering using iris for employee access control to secure areas.
"The data from real-world, large scale deployments will demonstrate that iris offers significant advantages over other modalities for appropriate applications," adds Bastian.
The real innovation that is bringing iris to the forefront is its newfound flexibility. In the past, iris capture required a user to precisely and purposefully place the eye in front of a camera. Newer solutions enable the images to be captured from long range, while the subject is in motion and even without his knowledge.
"Longer distance identification means that an officer no longer has to be close to a subject to identify him so there can be a larger safety buffer," explains Mark Clifton, Sarnoff's acting president and CEO. "Distance enables identification in large venues, perimeter control and discrete applications."
Additionally, Clifton explains that longer distance also enables one system to capture both the iris image and face image simultaneously, providing multiple modalities to improve accuracy, speed and ease of use.
Iris nullifies a lot of the hygienic concerns that people have with fingerprints. It also has the potential, like it or not, to be used for non-intrusive or surreptitious identification as shown by a recent announced deployment in northern Mexico.
Trend: Biometrics going mobileWhat may bring biometrics to the masses is its use in smart phones and mobile devices. These devices are being used more frequently for higher-value transactions and steps need to be taken to so they can be better secured. PINs and pattern-based applications exist but many argue they don't offer the level of security that biometrics can provide.
Traditionally the topic of biometrics and handsets has centered on hardware, most often the integration of fingerprint sensors into the phone. Globally a variety of handsets have launched with built-in sensors, and early this year LG released the first model with U.S. availability.
But it is software not hardware-centric biometrics that has the industry buzzing these days. Using the tools already built into phones, a range of biometric authentication is possible.
Adding biometrics to mobile devices could be relatively easy, says Cathy Tilton, vice president of standards and emerging technology at Daon. "The obvious (modalities) are face and voice," she says. "The devices already have cameras and microphones."
Adding iris to the mix wouldn't be much of a stretch either, adds Lazarick. "Without an additional infrastructure you could fuse them," he says. "As the functionality of these devices increases, the security of the transactions will more and more demand identity verification."
There is also the opportunity for multi-modal application via mobile devices. In a multi-modal environment, the system would take a score from a voice pattern, facial image and perhaps an iris image to determine if the individual is authorized to use the device or conduct the transaction, Lazarick says.
Getting acclimated to use the mobile device for biometric verification may be the biggest challenge. Because it is a one-to-one match, however, many of the issues that exist with large-scale one-to-many matches don't apply.
Because you are matching against a single known template, the captured image does not need to be as precise as it would to isolate a match from thousands or millions of templates in a one-to-many environment. "It's all manageable if you get used to using the device," Lazarick says.
And for most smart phones these features could be added with a software application and no additional hardware. "To coin a phrase, ‘there's an app for that,'" Hamilton says.
Enabling biometrics on mobile devices will take away the need for people to verify identity at fixed locations, says Ichikawa. A credential could be stored on the mobile device and confirmed via facial recognition iris, fingerprint or voice. "Once you create a level of mobility, you don't have to authenticate at fixed points," he says. "You can now identify them anywhere."
Trend: Law enforcement takes biometrics from the station to the streetsThe next trend again matches biometrics with mobile devices, but this time leaves the realm of the consumer world for that of law enforcement. The days of being arrested and having your fingerprint placed on an inkpad and rolled onto paper are already history for many police departments. Paper-based collection has been replaced by electronic scanners in the station. But what's coming next is the extension of the capability to the street, says Tilton.
Mobile biometrics devices have been used by the military in Iraq and Afghanistan for years to identify insurgents and make sure only authorized individuals enter restricted areas. The devices are also becoming popular to confirm access to U.S. ports with the Transportation Worker Identification Credential.
While many of the devices used by military officials are dedicated for those purposes, there are different peripherals that can be added to the iPhone and other mobile devices so it can be used to check biometrics, Hamilton says. Most of these are aimed at law enforcement applications to enable officers to enroll and check biometrics in the field.
BI2 Technologies has a sleeve that works with the iPhone and can capture face, fingerprint and iris, Hamilton says. A number of law enforcement agencies are already using the system, he says.
At the same time companies providing systems to the military are releasing updated products with increased functionality. Analysts predict that these dedicated devices will be used for both military and law enforcement applications while add-ons build biometric functionality into other mobile devices such as smart phones.
While biometrics have been teetering on the edge of mass adoption for years in North America, the momentum may finally exist for widespread adoption.
Interestingly, the trends identified for this article suggest that it may be different modalities and use cases that ultimately provide the spark.
In the past, facial images and fingerprints were the modalities of choice, and most looked to physical security and one-to-many identification as the applications to drive adoption.
While these modalities and applications are certainly still important and even dominant, it may be this newer generation–call it Biometrics 2.0–that finally gives Sisyphus his much needed break from pushing the biometric rock up that adoption mountain.
Hitachi's VeinID finger vein scanners have been deployed since 2004 by major banks in Japan and more recently Poland," says Lew Iadarola, VeinID sales manager for Hitachi Security Solutions. "Some South American banks are conducting trials as well."
"In total we have more than 100,000 embedded modules in ATMs, time and attendance readers and other devices," says Iadarola. Another 100,000 of the company's USB-connected logical access readers have also been deployed for authentication to various networks and applications, he notes.
According to Iadarola, one of the largest use cases in the U.S. is with Konica Minolta's bizhub multi-function printers. The finger vein scanner secures document output in government, military and health care environments. Additionally, Japanese telecom giant KDDI has deployed more than 10,000 VeinID scanners for employee logon.
Rather than using the biometric to identify an unknown individual from a population, Iadarola sees vascular technology as ideal for operational biometrics. "Use the vein pattern to ensure the individual is who they claim to be and only then initiate the service, access or transaction," he says.
"Our focus with VeinID is one-to-one matching on a smart card or device," he explains. This comes from the company's historical preference to enhance privacy in public facing applications.
Many of our large customers preferred to minimize the liability that comes with handling personally identifiable information by performing match-on-card transactions rather than storing information in a database, he says. Government Integrators and end-users worldwide did not want to use the same technologies used and stored in databases by law enforcement.
"Some people want to buy a coke, rent a car, and pick up their prescriptions without providing something personally identifiable," he concludes. "People prefer to verify identity and walk away leaving nothing behind."
Sarnoff Corp., a subsidiary of SRI, is a leader in long distance iris recognition technology. The company offers two models in its Iris On the Move (IOM) line: a walk-thru gate called the IOM PassPort and a small mountable unit called the IOM Glance.
"Sarnoff revolutionized iris recognition by providing longer distance, higher speed, and higher throughput than traditional systems," says Mark Clifton, Sarnoff's acting president and CEO. "We have improved upon systems that require you to be uncomfortably close," he explains, "and have enabled recognition up to 3 meters in distance while walking at a natural pace. Because of that we can process up to 30 people per minute."
The initial adopters include airports, banks, stadiums, construction sites, he explains, "any place where you have need to get people in and out very quickly."
AOptix Technologies, a Campbell, Calif.-based iris innovator, launched its first "iris at a distance" product, the InSight VM, early in 2009. "It puts the advanced adaptive optics technology of the original InSight into a new form factor appropriate for access control, immigration control and eGate applications," says Dale Bastian, VP of Sales – Biometrics, AOptix.
Immigration control is a key application being addressed by the InSight line. "We recently completed three highly successful proof-of-concept studies in the Middle East where the adoption of iris recognition for enrollment of deportation subjects and the screening on in-bound travelers is underway," he explains. "They demonstrate extraordinary results on key criteria including failure-to-acquire and failure-to-enroll rates, average time of capture and accuracy."
Leading the adoption of iris are national identity programs following closely behind immigration applications, Bastian says. He suggests that governments around the globe are evaluating iris recognition technology, which could lead to cooperation between governments to share methodologies creating more secure immigration and travel environments.
Animetrics is offering facial recognition for Android, Windows Mobile and RIM (Blackberry) operating systems. Using the phone's embedded camera, a facial image patterns is generated at the point of access and compared to the enrolled pattern to grant or deny access.
On the voice front, PerSay, a spinoff from Verint Systems, SecuriMobile, Palo Alto, Calif., VoiceVault in the UK and Germany's VoiceSafe all offer voice biometric solutions to secure mobile devices and transactions.
Other companies are using mobile biometrics to add an additional factor to out of band authentication solutions.
PhoneFactor, Overland Park, Kan., uses the phone as the second authentication factor, ‘something you have.' They also use voice pattern biometrics via the phone to add the third factor, ‘something you are,' to the authentication process.
When a user authenticates to a PhoneFactor-enabled site, he enters his username and password. The PhoneFactor technology calls the user's pre-supplied phone number. The user answers the phone and hits the #-key to affirm the transaction and only then is the online access granted. Additionally, a secret passphrase can be required for voice pattern recognition to further increase security.
Present at the National Association of Campus Card Users (NACCU) 18th Annual Conference, April 17 – 20, 2011 in Baltimore, Maryland. It is the most important event in the campus card industry and its quality relies on the presentations made by industry professionals like you.
The deadline for proposals from institutional members and corporate members is Monday, October 4, 2010. The proposal should include the session title, description and learning outcomes. Educational Sessions are 60 minutes in length and should include time for questions.
If you are interested in presenting, please visit http://www.naccu.org/2011/callforpresenters.htm for more information or to submit a proposal.
Free webinar: Thursday, August 5, 2010 2:00 PM - 2:45 PM EDT
During this webinar, industry veteran Brad Jarvis of HID Global will explore the current and future industry requirements and challenges facing the physical and logical access control (PACs) market. The discussion is based on the Avisian, Inc. 2010 PACs market research study and provides revealing insights on next-generation physical access control systems along with the market drivers behind these trends.
This session will also provide beneficial tips on leveraging secure identity solutions to address rising security challenges, the growing need for higher levels of convenience, and customer demands for reducing the lower total cost of ownership.
Presenters:
Brad Jarvis, vice president of product marketing at HID Global
Chris Corum, editor and publisher at AVISIAN Inc.
U.S. attendee sees similarities and differences between American and European card programs
By Danny Smith, Vice President, ColorID
More than 120 university attendees traveled from all across Europe to Lodz, Poland to attend the 2008 European Campus Card Association (ECCA) Conference. As the only attendee from North America at this year’s conference, I wanted to share an overview of my experience.
ColorID has been a sponsor and has attended the ECCA conference since the inaugural conference in Waterford, Ireland in 2002. Each year attendance of the ECCA conference has grown and this year’s event set an attendance record.
The Technical University of Lodz hosted the conference. The university is one of Poland’s largest universities and serves a student population of more than 20,000. Michał Strzelecki of Technical University of Lodz was the main organizer of this year’s event. In addition to being well organized the conference had the right blend of exhibits, presentations and social/networking opportunities.
It is really interesting to see the common challenges between the U.S. and the European card programs. In the end it’s the same, we’re still trying to maximize the available card system technologies to its fullest. Our European counterparts face similar systems limitations and obstacles.
In North America, the National Association of Campus Card Users (NACCU) has done a tremendous job promoting and encouraging card system development by bringing institutional and corporate members together. The ECCA has taken a similar approach in this direction and it is really evident with the European Education Connectivity Solution (EECS) project.
Eugene McKenna of Waterford Institute of Technology, Ireland and Tor Fridell of Linkoping University, Sweden gave a presentation on the connectivity solution, which has been driven by ECCA, at the conference. The goal of this project is to provide standards, mobility and interoperability among European campuses. A comprehensive project proposal has been submitted for funding to the European Union (EU) and ECCA members are waiting to hear the outcome.
While there are many common characteristics between the European and North American card systems, there are also significant differences. For instance, it would be the exception to see a magnetic stripe on a student ID card in Europe. Most schools are using contact or contactless technologies and in some cases, both. Most of the contactless technology is MIFARE.
Also some countries, such as Croatia, Poland and Hungary, have a national university ID cards that are mandated by their government. Several in-depth presentations were given highlighting these programs. I was surprised to learn that many of these ID programs are highly developed and a good number utilize “home grown” solutions involving contact or contactless technologies.
Overall, the ECCA membership is very much like the NACCU membership. Everyone is willing to exchange information, ideas and suggestions. The camaraderie of the attendees has grown each year and many attendees stay in contact throughout the year.
Next year the ECCA conference will be held on the coast of the Adriatic Sea in Croatia, hosted by the University of Zagreb. The specific details will be announced in the near future. The Europeans have embraced advanced technologies and are moving forward with solid applications and solutions. I’m sure you would find attending to be a worthwhile investment and will come away with new ideas and solutions.
Learn more information about ColorID & ECCA at www.ecca.eu / www.colorid.com.

