HID
Summary is AI-generated, newsdesk-reviewed
  • Mobile access control simplifies ID management, surpassing traditional card systems in convenience.
  • Smartphones with NFC and Bluetooth enhance security in hoteling and commercial buildings.
  • Activating and deactivating mobile credentials improves efficiency and security protocols.
: Smart phones and mobile devices are beginning to prove even more convenient than access cards

More and more commercial buildings today are replacing mechanical keyed locks with card access systems. The basic reason is familiar to security professionals: card systems, once installed, cost less to manage and maintain. “When people are let go, if you don’t get their keys back, you have to rekey the locks and give everyone new keys,” says Brett St. Pierre, director, education solutions with Austin, Texas-based HID Global. “With a card system, all you have to do is deactivate the card.”

Smartphones better than access cards?

But smart phones and mobile devices are beginning to prove even more convenient than access cards, continues St. Pierre. “The big new trend, today, is mobile access control,” he says. “Employees store their credentials on smart phones. It has become very popular, especially in the business world of hoteling.”

Hoteling is an office assignment system used by consulting companies and other large firms where many executives spend months at a time on the road and away from their home office.

"Mobile access control makes identity and credentials management much easier than cards. You can activate and deactivate mobile phone IDs”, says Brett St. Pierre, director, education solutions with HID Global

In those firms, executives not on the road use the offices of people that are on the road.

Smartphones simplify ID management

“Mobile access control makes identity and credentials management much easier than cards,” says St. Pierre. “You can activate and deactivate mobile phone IDs.”

So when a consultant hits the road, security can deactivate the credentials in his or her phone and activate the phone of another consultant who is returning to the office for a while. No one has to turn in a card or pick one up. It is security the way everyone wants security: security that doesn’t get in the way.

While hoteling firms may have pioneered the use of mobile credentialing, the idea has begun to spread throughout the access control world.

Mobile security and credentialing comes in two flavours: near field communication (NFC) and Bluetooth.

“Provisioning phones with access control credentials is easy. Emails bring in an app and can load identities into the phones. You can also send a command to deactivate a smart phone’s credentials”, adds St. Pierre

NFC-based mobile access control

NFC is a radio frequency technology that makes it possible for electronic devices to communicate with each other for the purpose of carrying out a task. For instance, a user can play an NFC-enabled stereo system on an NFC-enabled mobile phone by holding the phone up to the stereo systems “touch point.”

Likewise, NFC can transmit credentials to access control readers.

As a near field communications device, a mobile phone must be placed very close to the reader – a distance of four centimetres or less.

Then again, NFC was originally designed as an electronic means of submitting credit card information. The short reading distance helps to keep the data being transmitted safe — but the short-distance read feature actually makes it less convenient for access control applications.

Bluetooth for access control

Bluetooth is a wireless technology designed to facilitate wireless connections between electronic devices. Unlike NFC, however, Bluetooth technology communicates over longer distances — up to 10 meters. It can be adjusted to suit a user’s preferences — perhaps 12 inches or so for access control applications.

Mobile access control is security the way everyone wants security: security that doesn’t get in the way

“Not all phones have been enabled to use NFC, either,” adds St. Pierre. “But virtually all smart phones have Bluetooth, which is being widely used for access control thanks to its longer range.

“Provisioning phones with access control credentials is easy. Emails bring in an app and can load identities into the phones. You can also send a command to deactivate a smart phone’s credentials.”

Overall, ID management is easier with mobile devices. HID literature observes, “Using a mobile device to access a building is about merging security with convenience.”

HID news

TX-RAMP certified HID PKIaaS for secure management

HID, a pioneer in trusted identity solutions, has achieved Texas Risk and Authorisation Management Program (TX-RAMP) certification for its Public Key Infrastructure as a Service (PKIaaS) solution. This certification demonstrates HID’s commitment to cybersecurity excellence and enables Texas state and local government to confidently engage with approved, trusted providers to procure secure, cloud-based certificate lifecycle management services with faster timelines and reduced administrati...

HID appoints Jos Beernink as VP Europe for PACS

HID, a worldwide pioneer in trusted identity solutions, announced the appointment of Jos Beernink as Vice President Europe for its Physical Access Control (PACS) business. In this role, Beernink will lead HID’s strategy, sales and operations across the whole European region, helping organisations leverage trusted identity and access control technologies to create a secure, smarter and more efficient workplace and physical spaces. Prior roles of Beernink  Beernink brings more than 2...

ASSA ABLOY Capital Markets Day: Strategic update

On Wednesday, November 19, starting at 08:00 CST, ASSA ABLOY hosts its Capital Markets Day in Milwaukee, Wisconsin, USA. Nico Delvaux, President & CEO and Erik Pieder, CFO, will provide an update on ASSA ABLOY’s strategy and direction, including an overview of the company’s strategic objectives and priorities to accelerate profitable growth.  The financial targets of an EBIT-margin of 16-17% and annual sales growth of 10% over a business cycle are re-confirmed. No deta...

HID case studies

HID helps in automating the access control management at Żabka

Enhancing enterprise security is high on the list of priorities for businesses across sectors. Within the retail industry, there is an additional focus on enabling new ways of working through management tools. Integrated solutions and applications help to create a robust security landscape and ensure a future-ready posture as organisations look to address emerging risks and create better experiences for next-gen employees. Physical access control (i.e., the readers on the door and the credentia...

Avolon selects HID mobile access® to upgrade headquarter security

Founded in 2010, Avolon is the third-largest aircraft leasing company in the world with 824 aircraft and 145 customers in 62 countries. Its new global headquarters in Dublin is comprised of 6,967 sq m (75,000 sq ft) of secure office space across six floors that houses its IT, catering, legal, and communications departments. Need for a centralised monitoring solution Avolon’s new premises in the upmarket Ballsbridge area of Dublin provided an opportunity for the company to rethink its app...

BNY's mobile access solution with SwiftConnect

How do you rethink and transform building access for a 241-year-old company? BNY started by asking employees. The response was encouraging. The BNY team found that employees embraced the concept of mobile access solutions. The thought of implementing access solutions was already being considered by the company and the team was excited about the idea of providing a modern experience that allows employees worldwide to conveniently access their building spaces with a simple iPhone or Apple Watch....