Mobility and access meet

Access & Identity Management Handbook 2017 Access Control & Identity Management, Integrated Solutions

Mobile biometrics received an enormous boost into the mainstream consciousness when Apple released its first iPhone with a fingerprint reader. This was not the first smartphone with fingerprint recognition, but it was the first to hit the market with a popular following. Samsung and others joined in the trend and today there are endless smartphones allowing you to skip entering passwords or PINs in favour of simply scanning your finger.

These changes filtered throughout the world very quickly and made fingerprint recognition a common and accepted method of authentication. Even in countries like South Africa, where fingerprint biometrics had seen remarkable growth in business and government, fingerprint authentication became common and accepted by everyone.

Technavio’s 2016 report on the mobile biometrics market, expects the global market to “grow steadily at a CAGR of over 103% during the forecast period” to 2020.

Today mobile biometrics is not simply a way you can log into your smartphone. First off, the type of biometrics available on one’s phone includes fingerprint, facial, voice and potentially iris recognition. Secondly, the functions it is used for include authenticating yourself, mobile payments and, more pertinent to this publication, access control.

Access control via a mobile device does not necessarily use biometrics (except in the case of voice biometrics as we explain in another article in this publication), but makes use of near-field communications or Bluetooth technologies to transmit access information to a reader. Of course, in the case of authenticating your identity to the device in order to gain access, biometrics plays a role and is expected to play an even more important role in future and spread to a number of different industries and applications.

However, since we are focused on access control and making sure the right people are able to go where they need to go and are allowed to go, we approached two companies playing a significant role in the local access control market, specifically when it comes to mobile access, and asked them about the market. Our first question asked why mobile devices are being used for access control when we already have more than enough ‘stuff’, from fobs to biometrics controlling entrances and exits.

Why mobile access?

Vikki Vink, from local manufacturer Impro Technologies, says customers are looking for increased convenience, without the traditionally associated increased risk.

“In the past, convenience had to be balanced against the level of risk or security – tighter security meant greater inconvenience. Today however, technology is moving at a rapid pace and the use of mobile phones for your access control system are a reality, without compromising security. That’s what makes the use of mobile so compelling.”

She also notes that the highest technology adoption in the world has been the mobile phone so it is actually a natural progression that a device carried by everyone would evolve into more than just a phone – it’s a camera, video recorder, computer, and now it’s a credential carrier for you to gain entry into a restricted area.

“Even in South Africa, where we have significant poverty issues, most people have a cellphone. It’s accessible, adopted and, through our new technologies, secure. A win-win for everyone.”

SALTO’s Wouter du Toit agrees, noting that the ability to bring your business and security onto a mobile platform has been a growing trend and technology is allowing us to provide better solutions for people on the move. “Being able to see what is happening at your office without you being there is just one of the ways mobile technology is improving the security element for SME users.”

Another way, he says, is combining cloud-based solutions with your mobile device. For example, a retail operator who owns a number of retail chains can now link all these sites easily into a central cloud-based solution and use his mobile device to access any location or easily invite new users to gain access to the property. They are also able to cancel access on the go without having to be in front of the server and get real-time notifications on doors left open, forced open and other events.

Yet another way mobile phones are changing in the hospitality environment is by sending your room check-in directly to your phone and eliminating waiting in long queues. It also allows the hotel to send information to your device and even to easily re-room you or cancel your access without you having to return to the front desk, enhancing the guest experience.

SALTO uses android mobile devices with NFC in combination with RFID cards to allow remote and mobile workers to update their access plan on their card through their mobile phone, allowing users to gain access to offline controlled areas where no network is in place.

Mobile versus traditional access

While using a mobile device for access control, whether it’s at work or in a hotel, wins many points for the ‘coolness factor’, Vink says it is really just an alternative credential carrier. Instead of using a tag, card or fob, now all that information is securely contained within your mobile phone. “The principle software and hardware remains the same (except for mobile-enabled readers on the door) and the user presents their phone to the reader for entry.”

She adds that the benefit is convenience. Most people have their cellphone constantly with them, and we’re more alert to protecting our cellphone as opposed to a tag. “This immediately reduces the security risk because the loss of a card is frequently not reported for some time. People may think they’ve left it at home, or that it will surface in a few days; however, if a cellphone is missing, it’s immediately investigated.”

Du Toit says mobile access adds the freedom to choose what type of carrier you would like to use for access-controlled areas. It is not bound to a fixed network or geographical location and allows you to be free in movement.

An additional benefit, according to Vink, is enhanced security. In the past if a tag was stolen, the only option available was to block entry to anyone presenting that specific tag. Now the option is available to revoke the tag on the mobile phone remotely. This means if a cellphone is stolen, the site owner can delete the credentials on the mobile phone ‘over the air’.

“Additional failsafes are available, such as the user having the ability to remotely wipe their phone with a variety of free apps; as well as the traditional method of revoking the individual’s credentials on the access control software, so if the phone is presented it will not allow access.

“It all adds up to greater security and peace-of-mind.”

Significant benefits

There are many benefits that come along with mobile access control. A few of them, according to Du Toit, are:

• Mobile access allows you to modify the users access rights on the fly wherever they are. SALTO has a number of ways for using mobile access, the one is through BLE where you use the Bluetooth connection between the phone and the reader, this is more accessible to the masses because most smartphones have this technology built in and is widely adopted in various sectors.

• The second is using NFC on Android phones where a secure EV1 Desfire tag is used in combination with the phone. The phone is used as a hotspot and transfers the required credentials securely from the phone through NFC onto the EV1 card. This means you can be anywhere and update your card to enter a property without the property needing any physical network connection.

The greatest benefits, says Vink, are convenience and security; as well as protection of privacy as the user owns their credentials. “The user decides where to release those credentials, to whom and when, i.e. when entering the building to my company each morning, thus alleviating any privacy concerns, especially in international markets.

“And because mobile phones are so prolific in most markets, it’s a readily available technology. Users are not being asked to take on a new technology, or change their way of operation. Mobile phones are part of our lives and most people are comfortable using them. This makes the market opportunity huge.”

In addition, she notes that more than simply using your mobile phone as a tag, Impro is also able to provide users with the ability to manage and control their entire site from a mobile phone – this provides unrivalled flexibility. Authorised users can use any HTML5 device, whether it’s a smartphone, tablet or computer to control the access control system remotely or to pull reports on the activities on site.

“Simplicity, flexibility and convenience. These are the waves of the future and we’re able to meet them today.”

The integration question

Many people have had the experience of buying the latest and greatest technology, only to find that it doesn’t work well with other technical systems. In the access control world, there are many large installations with equipment from various vendors, and many of them will have been around for years. The question that must be asked is how easy it will be to integrate the newer mobile access technologies with older systems since it is unlikely that a company will simply decide to replace their entire access control setup with a mobile solution – although smaller companies may be in a position to do this.

Vink explains that one of the reasons Impro’s Access Portal system has been so successful is the ability to quickly integrate new technologies into the solution. “Through our modular design, and the inbuilt flexibility of the platform, we are able to seamlessly bring in new products and features.”

Since Impro was purchased by ASSA ABLOY, this flexibility has been extended and the company can now offer customers credentials securely on their mobile phones. This will require mobile enabled readers on doors (from a hardware perspective), while the user downloads a free app and receives the authorised credentials remotely onto their device. “When you want to enter the building, you simply ‘twist’ your phone in front of the reader – no touch necessary – and access is granted.”

All these features are able to integrate into the company’s Access Portal software suite, enabling customers to get a full solution from Impro Technologies.

SALTO offers a similar solution, delivering a complete access control suite that comprises mobile and traditional access methods, as well as an API (application programming interface). Du Toit says the company tries to simplify the integration process through the API, but ultimately it is dependent on the client’s integration skills.

He adds, “Our platform is easy to use and quick to understand and is really no different from an operators point of view when adding or deleting standard credentials or cards on the system.”

Expanding on the Impro Access Portal solution, Vink explains, “Our Access Portal system comprises a variety of solutions, tailored for different customers depending on their specific needs. We have mobile readers that are handheld biometric devices for remote offsite verification of employees; mobile phone credentials where your phone becomes your tag, as well as the ability to control your site through a mobile HTML5-enabled device.

“The options are vast and enable us to offer each customer a tailor-made solution, with off the shelf products, to address their specific pain points, goals and needs – both for today, but more importantly, for tomorrow and beyond.”

From SALTO’s perspective, Du Toit says, “SALTO offers mobile solutions for the hospitality industry. Clients benefit from various features including, online key management, instant extended stay, instant room change, personalised promotions. Furthermore, not waiting in long queues gives front desk operators time to personalise and welcome guests properly, increasing the experience when you check-in.

“We also offer mobile solutions for our cloud-based platform where you can have full control over your site(s) from your mobile device anywhere in the world, this includes cancelling access, who enters your property, is any door left open or forced open, opening a door locally or remotely, multi-site access and more.

Our standard SALTO platform also includes BLE (Bluetooth Low Energy) and NFC (Near Field Communication). BLE is used as a credential on the phone and you can use both card and phone for access control with bi-directional communication. NFC in mobile phones is used to update the card with the latest credentials for people not frequently visiting the office and needing to visit remote locations where no networked access control solution is deployed.

For more information:

Impro Technologies: www.impro.net

SALTO Systems: www.saltosystems.com



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...