hands typing on smartphone with code image overlay

Physical and Logical Access With Wearable and Mobile Credentials

Getting in and Logging on With Mobile Access

There’s an app for just about everything these days — including access control. While many organizations stick with tried-and-true smart cards, others are branching out into the flexible, high tech and high security world of mobile access, verifying trusted identities with credentials like smart phones and wearables.

With mobile access, users download an app and administrators provision access to that unique device, which is scanned by readers wherever security is needed. There are infinite permissions possibilities; some users may be granted access to one or two places, while others could be allowed almost anywhere. These permissions can be changed instantly as well — even granted to visitors as they enter a building and automatically revoked when they exit. Unlike cards, smart phones are unlikely to be forgotten or borrowed by coworkers and friends. They also come with their own standard level of security, since they’re unlocked with a biometric or private passcode. Adding a multi-factor authentication (MFA) requirement for access to particularly sensitive areas further increases their security. In addition, some credentials significantly improve people flow by allowing readers to authenticate trusted identities several feet before their approach. When it comes to building lobbies, for example, security is paramount, but so is the rate at which people are able to enter and exit. Mobile access can help maximize security while keeping people moving throughout the hustle and bustle of a busy workday.

Wearables: Beyond the Phone

Of course, smart phones aren’t the only way to enjoy the security and flexibility of mobile access. Wearables like smart watches, rings, key fobs and bracelets are increasingly requested by organizations and individuals. Like smart phones, these wearables are unlikely to be loaned or lost. Unlike phones — which must be pulled from purses or pockets, unlocked and held to a reader — wearables like watches and rings are already out and ready to scan. They can even be read through protective gear like latex gloves and other PPE, so medical staff can log into systems and spaces safely, without compromising their equipment or their health. From building entry to cashless cafeteria payments, mobile access allows for flexible, robust and user-friendly security.

Interested in learning more about the world of wearables? Check out our executive brief, Introduction and Advantages of Using Wearable Devices for Access Control.


HID Origo™ 개발자 포털 소개

HID Origo™ 개발자 포털의 가용성에 대한 소식을 전해 드릴 수 있게 되어 기쁘게 생각합니다. 이 포털에서는 기술 파트너들에게 직원들의 물리적 및 디지털 경험과 기술이 혼재하는 앱과 API 통합을 구축하는 데 필요한 도구와 지원을 제공합니다.

10월은 국가 사이버 보안의 달입니다

매년 10월은 정부와 사이버 보안 업계가 협력을 도모하기 위해 지정한 국가 사이버 보안 인식의 달(NCSAM)입니다. 이 교육 기간 동안 유익한 정보를 통해 기업과 개인이 온라인에서 스스로를 보호할 수 있는 방법에 대한 인식을 고취시킬 수 있습니다.