22225 - SCTE Broadband - Aug2024

TECHNICAL

7. Data Updating and Storage: The information is updated and stored within CIPE or a third-party system, facilitating the generation of reports for management. 8. Use of Gateway: A gateway allows for the remote opening of locks from a central location using fibre or mobile date, particularly in areas with strong mobile (e.g., 5G) coverage. 5G is not always necessary if using a connected

So, how would this work in the real world for engineers and staff in charge of maintenance across the critical infrastructure sphere? An ideal digital access control process 1. Fault Raised: Initiated via system notification or by an engineer identifying an issue. 2. Job Ticket Creation: A job ticket is created and assigned to an engineer with the appropriate competencies for the task. 3. Digital Key Credential Assignment: As part of issuing the job ticket, access can be sent to the appointed engineer automaticaly or an administrator assigns a digital key credential through CIPE (Critical Infrastructure Protection Environment) or a third-party system for those ad- hoc visitors. 4. Engineer Receives Access: The designated engineer receives access to the lock relevant to the site or location in question. 5. Lock Activation and Opening: Upon arrival, the engineer activates and opens the lock using the digital key credential on their smartphone. No mobile signal required at site. 6. Monitoring by ARC: This action allows security to view the lock’s time, date stamp and status in real time.

monitoring, incident response and decision-making.

n Cost efficiency: By using existing IT components and facilitating easier updates and integrations, an API- first approach can also lead to cost savings. Reducing the need for bespoke solutions or extensive system modifications to accommodate new technologies or requirements ensures a more efficient allocation of resources. n Enhanced user experience: Finally, this approach significantly improves the user experience by enabling more straightforward, intuitive interactions with access control systems. Whether it’s simplifying the process of granting access rights or integrating access

device. This is ideal for the ad-hoc visitor, access controlled from the ARC.

9. Lock Status Update via Gateway: The lock’s status is updated through the gateway without the need for direct interaction with a mobile phone. 10. Report Generation: Reports are generated through CIPE or the client’s third-party system, providing valuable insights and data for management and regulator audits.

control functionalities into familiar platforms and devices, prioritising APIs from the outset focuses on making security as user-friendly as possible.

A View to the Future The nature of critical infrastructure, with its many disparate assets to secure, often in harsh environmental conditions and remote locations, makes access control and security no easy feat. However, with technologies such as ABLOY BEAT and CIPE Manager now implemented across sectors such as energy, water, transport, telecoms and more, there is a ‘blue sky’ methodology to access control developing.

www.abloy.co.uk

SEPTEMBER 2024 Volume 46 No.3

97

Made with FlippingBook flipbook maker