Download PDF version Contact company

HID Global®, a worldwide leader in secure identity solutions, recently announced the release of its HID Mobile Access® solution, which delivers a more secure and convenient way to open doors and gates while introducing a simple secure identity management process. The solution includes everything necessary for organisations to immediately begin using Bluetooth Smart and NFC-enabled smartphones and other mobile devices as an alternative to keys and smart cards in today’s increasingly popular BYOD mobility environment. The solution also makes it possible for users to unlock doors and open gates from a distance using the company’s patented “Twist and Go” gesture technology.

HID Mobile Access is used with the company’s mobile-enabled iCLASS SE® and/or multiCLASS SE® readers, and includes Mobile IDs, HID Mobile Access Apps and access to the HID Secure Identity Services™ portal for managing users and issuing or revoking Mobile IDs.  The mobile-enabled readers are also interoperable with 125 kHz HID Prox and high-frequency technologies including iCLASS Seos®, iCLASS SE, standard iCLASS®, MIFARE®, and MIFARE® DESFire® EV1, which optimises flexibility for using both cards and mobile devices.

“Powered by our award-winning Seos technology, HID Mobile Access opens a new chapter in the creation and management of digital identities for mobile access by making it possible to open doors using the broadest range of smartphones, tablets and other mobile devices – without the need for additional sleeves or other accessories,” said Selva Selvaratnam, senior vice president and chief technology officer with HID Global.  “Already proven in a number of successful pilots at major universities and businesses, our HID Mobile Access solution offers more secure, convenient and flexible access control, along with a best-in-class Mobile ID delivery process that is as easy and straightforward as downloading music.”

HID Global has created a unique and highly intuitive deployment and management experience with its user-friendly HID Secure Identity Service portal. Administrators simply send users an invitation to download an HID Mobile Access App directly to their Bluetooth- or NFC-enabled phones. After download and registration of the App, Mobile IDs can be immediately issued, provisioned or revoked over the air. The portal was designed for administrator convenience and efficiency, and allows administrators to manage individual or a batch of users for speedy provisioning and ongoing management.  After the Mobile ID has been issued, the user can open a door or gate by either tapping their handset to a mobile-enabled reader or, using their Bluetooth connection and HID Global gesture technology, simply rotate the device to initiate the transaction as they drive or walk up to it.

“One of the keys to success over the next several years will be to have an offering beyond traditional access control readers, panels, cards and software and embrace the new position of the industry which includes things such as remote management, mobile and fixed functionality credentials and wireless, reducing administrative burden and increased efficiency and integration with human capital management software,” said Blake Kozak, with the research firm IHS Inc. “Mobile solutions, including secure IDs and a simple yet comprehensive lifecycle management process, are a critical success prerequisite. With the advent of mobile solutions, the access control industry of tomorrow is knocking at the door.”

The bundled HID Mobile Access solution is powered by Seos technology, which turns smartphones and other mobile devices into trusted credentials.  Seos technology also preserves privacy by enabling Mobile IDs to be issued, delivered and revoked with end-to-end encryption as part of a unique transaction that protects personal identification data.  With Seos technology at the core of HID Mobile Access, the solution makes it possible to use smartphones and other smart devices for future applications such as PC login, time and attendance, biometrics, EV charging in a unified secure identity system.

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 security
Comprehensive K12 security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing the right fingerprint capture technology
Choosing the right fingerprint capture technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How do new security technologies transform retail and loss prevention?
How do new security technologies transform retail and loss prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...