By leveraging each other‘s technologies as companies sharing the dormakaba banner, LEGIC and Farpointe Data are at the forefront of the new expanding market for secure mobile credentials. LEGIC‘s 6000 series reader ICs and the mobile service LEGIC Connect are at the heart of Farpointe‘s new, award-winning Conekt mobile smartphone access control solution.

Farpointe’s first Conekt products are the K-BLE mobile access credentials and K-SMART3 electronic access readers with Wiegand output that support both mobile and traditional physical credentials. Electronic access control mobile smartphone-based credentials are an evolution of traditional RFID cards and tags, joining proximity and smartcard credentials to identify a user as he moves about a secured facility.

Mobile access credential

Mobile credentials Gartner suggests that by 2020, 20 percent of organisations will use mobile credentials for physical access

Mobile credentials make it possible for smartphones, such as the Apple iPhone and the range of Google Android devices, to be used as an electronic access control credential. Mobile credentials Gartner suggests that by 2020, 20 percent of organisations will use mobile credentials for physical access.

Security professionals creating electronic access control systems need to be aware that over 95 percent of all adults between the age of 18 and 44 own smartphones. Plus, 69 percent of the entire population already uses smartphones. And, the average smartphone user touches their device 2617 times a day (Dscout Research). Thus, practically anyone using an access system already carries a smartphone. Another way to look at it is that every smartphone user, or almost everybody, could now easily download a mobile access credential.

Sensitive confidential information

High security Conekt recognises the latest cybersecurity responsibilities expected of access control system providers. Original solutions often compelled end users to disclose sensitive confidential information about themselves and their installation.

Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way"

The new Conekt solution provides an easy way to distribute credentials with features that allow the user to register only once, needing just the smartphone’s number, and requiring no other portal accounts or activation features. “Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way.” Scott Lindley, General Manager, Farpointe Data, Inc.

Classic access control

Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way. How about using a smartphone as an intelligent key for a car? Want to know where a child or loved one is driving, how fast, if he/she added gas or oil or if anyone else is in the car? How about using it to access the gym, automatically sync to a piece of equipment, immediately gain expert advice or analyse the effectiveness of the workout?

Use a smartphone for everything, forget all those other tags and cards. a smartphone will become the passport to all aspects of life, from work to home to avocations. And at a fraction of the investment in traditional credentials, secure mobile Conekt credentials are all anyone will need.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...