Summary is AI-generated, newsdesk-reviewed
  • Mobile access control offers better convenience than traditional access cards in hoteling.
  • Smartphones simplify identity management, allowing quick activation and deactivation of credentials.
  • Bluetooth's longer range enhances mobile access control, outpacing NFC's limited distance.
: Smart phones and mobile devices are beginning to prove even more convenient than access cards

More and more commercial buildings today are replacing mechanical keyed locks with card access systems. The basic reason is familiar to security professionals: card systems, once installed, cost less to manage and maintain. “When people are let go, if you don’t get their keys back, you have to rekey the locks and give everyone new keys,” says Brett St. Pierre, director, education solutions with Austin, Texas-based HID Global. “With a card system, all you have to do is deactivate the card.”

Smartphones Better Than Access Cards?

But smart phones and mobile devices are beginning to prove even more convenient than access cards, continues St. Pierre. “The big new trend, today, is mobile access control,” he says. “Employees store their credentials on smart phones. It has become very popular, especially in the business world of hoteling.”

Hoteling is an office assignment system used by consulting companies and other large firms where many executives spend months at a time on the road and away from their home office.

"Mobile access control makes identity and credentials management much easier than cards. You can activate and deactivate mobile phone IDs”, says Brett St. Pierre, director, education solutions with HID Global

In those firms, executives not on the road use the offices of people that are on the road.

Smartphones Simplify ID Management

Mobile access control makes identity and credentials management much easier than cards,” says St. Pierre. “You can activate and deactivate mobile phone IDs.”

So when a consultant hits the road, security can deactivate the credentials in his or her phone and activate the phone of another consultant who is returning to the office for a while. No one has to turn in a card or pick one up. It is security the way everyone wants security: security that doesn’t get in the way.

While hoteling firms may have pioneered the use of mobile credentialing, the idea has begun to spread throughout the access control world.

Mobile security and credentialing comes in two flavours: near field communication (NFC) and Bluetooth.

“Provisioning phones with access control credentials is easy. Emails bring in an app and can load identities into the phones. You can also send a command to deactivate a smart phone’s credentials”, adds St. Pierre

NFC-Based Mobile Access Control

NFC is a radio frequency technology that makes it possible for electronic devices to communicate with each other for the purpose of carrying out a task. For instance, a user can play an NFC-enabled stereo system on an NFC-enabled mobile phone by holding the phone up to the stereo systems “touch point.”

Likewise, NFC can transmit credentials to access control readers.

As a near field communications device, a mobile phone must be placed very close to the reader – a distance of four centimeters or less.

Then again, NFC was originally designed as an electronic means of submitting credit card information. The short reading distance helps to keep the data being transmitted safe — but the short-distance read feature actually makes it less convenient for access control applications.

Bluetooth For Access Control

Bluetooth is a wireless technology designed to facilitate wireless connections between electronic devices. Unlike NFC, however, Bluetooth technology communicates over longer distances — up to 10 meters. It can be adjusted to suit a user’s preferences — perhaps 12 inches or so for access control applications.

Mobile access control is security the way everyone wants security: security that doesn’t get in the way

“Not all phones have been enabled to use NFC, either,” adds St. Pierre. “But virtually all smart phones have Bluetooth, which is being widely used for access control thanks to its longer range.

“Provisioning phones with access control credentials is easy. Emails bring in an app and can load identities into the phones. You can also send a command to deactivate a smart phone’s credentials.”

Overall, ID management is easier with mobile devices. HID literature observes, “Using a mobile device to access a building is about merging security with convenience.”

HID news

ISC West 2019 Day Two: Explaining The New And The Tried-And-True

There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill...

HID Achieves TX-RAMP For PKIaaS Security Solution

HID, a pioneer in trusted identity solutions, has achieved Texas Risk and Authorization Management Program (TX-RAMP) certification for its Public Key Infrastructure as a Service (PKIaaS) solution. This certification demonstrates HID’s commitment to cybersecurity excellence and enables Texas state and local government to confidently engage with approved, trusted providers to procure secure, cloud-based certificate lifecycle management services with faster timelines and reduced administrati...

HID Appoints Jos Beernink As VP For PACS In Europe

HID, a worldwide pioneer in trusted identity solutions, announced the appointment of Jos Beernink as Vice President Europe for its Physical Access Control (PACS) business. In this role, Beernink will lead HID’s strategy, sales and operations across the whole European region, helping organizations leverage trusted identity and access control technologies to create a secure, smarter and more efficient workplace and physical spaces. Prior roles of Beernink  Beernink brings more than 2...

HID case studies

HID Helps In Automating The Access Control Management At Żabka

Enhancing enterprise security is high on the list of priorities for businesses across sectors. Within the retail industry, there is an additional focus on enabling new ways of working through management tools. Integrated solutions and applications help to create a robust security landscape and ensure a future-ready posture as organizations look to address emerging risks and create better experiences for next-gen employees. Physical access control (i.e., the readers on the door and the credentia...

BNY Innovates With Mobile Access Solutions

How do you rethink and transform building access for a 241-year-old company? BNY started by asking employees. The response was encouraging. The BNY team found that employees embraced the concept of mobile access solutions. The thought of implementing access solutions was already being considered by the company and the team was excited about the idea of providing a modern experience that allows employees worldwide to conveniently access their building spaces with a simple iPhone or Apple Watch....

HID Boosts Stockholm Transit With Digital Ticketing

HID, the pioneer in trusted identity and authentication solutions, announced that it successfully supported Stockholm's public transit authority, Storstockholms Lokaltrafik (SL), in transforming the daily travel experience for hundreds of thousands of passengers in the capital through a comprehensive digital ticketing modernization program. The initiative has eliminated paper tickets and enabled seamless contactless payments across buses, ferries, trams and metro stations. The technology u...