Being Mobile with your Security and Access Control

Mobile devices – we all have them! I bet most people reading this will have a smartphone that rarely leaves their side. Be it checking your social media and emails, shopping/banking online or text messaging your family and friends (and possibly even, heaven forbid, actually making a phone call!) that device is akin to your keys and wallet when it comes to essential daily items.

But what if your mobile device could become your definitive personal item? The likes of Apple Pay, Android Pay and PayPal are rapidly turning your mobile phone into a credible replacement for your wallet, but how about if it could reduce the numbers of keys you had to carry too? With access control and automated security, this is rapidly becoming a credible option!

Mobile Authentication

There is a lot of momentum in the Access Control market at the moment towards using mobiles devices for authentication, as opposed to cards or tokens. This idea started to become popular some three or four years ago and has grown with the proliferation of NFC (Near Field Communications) technology in mobile phones and smart devices.

Interestingly, the choice by Apple to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Whilst it’s fair to say that not everyone has an iPhone, it is an important segment of the market and means that other manufacturers are wary of how customers will be able to use any new technology.

Consequently, there has been a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. Security providers such as HID Global, STid in France and Nedap in the Netherlands have concentrated on developing Bluetooth Low Energy readers and mobile credential applications.

Enabling Mobile Credentials

Not only do you need a reader that will successfully work with a mobile device, you also need to be sure you are securely delivering the credentials to that phone. This needs to be easily actioned, whilst ensuring it isn’t intercepted, stolen or appropriated fraudulently. On top of this, you need to ensure that the communications between the reader and the mobile device are encrypted too.

This has been where much of the development focus has been over the last two/three years, putting these cloud-based credential delivery vehicles together – then, marrying them with the reader technology.

Future Options

The pace of development doesn’t stop there! There are efforts underway to produce security reader technology which can read QR codes as well.

This will add another choice to NFC and Bluetooth Low Energy options – giving greater scope to pick a technology that suits the application, users and security operator best.

Empowering People and Businesses

Many organisations have been embracing the idea of individuals using their own devices for a number of years now (Bring Your Own Device – BYOD) – something which got a lot of press in recent years, but now seems commonplace to many of us.

Laptops, tablets, mobile phones – these are all devices that people will happily use in the workplace, whether they belong to the business or the individual. This expectation has shaped the way we all view technology and the way we interact with it.

Using your mobile device as a security credential is an obvious extension of these expectations. It seems that further evolution of this approach is inevitable and is likely to become even more prevalent in the future.

Convenience and Security

The crucial consideration is finding a balance between conveniences for the user and maintaining stringent levels of security. If you can ensure mobile devices have the necessary checks and balances in place, they become a very logical and highly suitable way of identifying authorised individuals.

With the rapid evolution of technology and society’s attitudes towards it, all the signs are that using your mobile device for security will seem just as natural in the future as using a card or token is today!

 

No documents found.

Recent Case Studies

“Monkton Combe School have used FTL since 2014, they have been very helpful with assisting Monkton with their initial installation of electronic door access control and developing the schools system. The school has TDSI installed, at present we have 80 doors with electronic access control. We have a good working relationship and they are always available to offer advice over the phone or attend within a short period of time dependent on security needs if we have any issues. We have found them to be very proactive.”

A. Clark
Monkton Combe School

“Extremely professional, efficient and friendly. Been a pleasure to work with.”

I. Davis
Wellington College

The level of after sales support offered by FTL is paramount and we have found the technical support team to be one of the best we have ever dealt with - there has never been anything that they haven't resolved immediately and their staff are quick to respond, knowledgeable and professional.

IT Manager
Elegant English Hotels

“FTL have provided us with excellent service from pre sales through installation and post install bug fixes (even when it was our fault). Their technical skills and focus on details makes us feel confident in the systems installed in our school. This has allowed us to use them throughout our school on a variety of projects and are confident we have the right solutions in place to offer a safe learning environment for our students and staff.”

B. Maytham
Gumley House Convent

“Working with FTL has been a straightforward and reassuring experience at all stages. Their process is extremely thorough and exacting and they make a significant effort to ensure that your requirements have been fully understood and will confirm at all stages that they have correctly understood the solution you are asking for. They work extremely well on site maintaining professionalism at all times whilst keeping work quick and disruption to a minimum. They have delivered a top quality solution at BEN and have at every stage ensured that we fully understood exactly what we were paying for before going forward with any works.”

B. Cummins
BEN Motor and Allied Trades Benevolent Fund, Lynwood Court Care Home

With their technical ability, Isoscan has installed and maintained various systems which allow bmi to maintain cost effective management of key sites. I can safely recommend Isoscan as a competent and trustworthy contractor.

Facilities Manager
bmi