Mobility and access meet

November 2016 Access Control & Identity Management, Integrated Solutions

Mobile biometrics received an enormous boost into the mainstream consciousness when Apple released its first iPhone with a fingerprint reader. This was not the first smartphone with fingerprint recognition, but it was the first to hit the market with a popular following. Samsung and others joined in the trend and today there are endless smartphones allowing you to skip entering passwords or PINs in favour of simply scanning your finger.

These changes filtered throughout the world very quickly and made fingerprint recognition a common and accepted method of authentication. Even in countries like South Africa, where fingerprint biometrics had seen remarkable growth in business and government, fingerprint authentication became common and accepted by everyone.

Technavio’s 2016 report on the mobile biometrics market, expects the global market to “grow steadily at a CAGR of over 103% during the forecast period” to 2020.

Today mobile biometrics is not simply a way you can log into your smartphone. First off, the type of biometrics available on one’s phone includes fingerprint, facial, voice and potentially iris recognition. Secondly, the functions it is used for include authenticating yourself, mobile payments and, more pertinent to this publication, access control.

Access control via a mobile device does not necessarily use biometrics (except in the case of voice biometrics as we explain in another article in this publication), but makes use of near-field communications or Bluetooth technologies to transmit access information to a reader. Of course, in the case of authenticating your identity to the device in order to gain access, biometrics plays a role and is expected to play an even more important role in future and spread to a number of different industries and applications.

However, since we are focused on access control and making sure the right people are able to go where they need to go and are allowed to go, we approached two companies playing a significant role in the local access control market, specifically when it comes to mobile access, and asked them about the market. Our first question asked why mobile devices are being used for access control when we already have more than enough ‘stuff’, from fobs to biometrics controlling entrances and exits.

Why mobile access?

Vikki Vink, from local manufacturer Impro Technologies, says customers are looking for increased convenience, without the traditionally associated increased risk.

“In the past, convenience had to be balanced against the level of risk or security – tighter security meant greater inconvenience. Today however, technology is moving at a rapid pace and the use of mobile phones for your access control system are a reality, without compromising security. That’s what makes the use of mobile so compelling.”

She also notes that the highest technology adoption in the world has been the mobile phone so it is actually a natural progression that a device carried by everyone would evolve into more than just a phone – it’s a camera, video recorder, computer, and now it’s a credential carrier for you to gain entry into a restricted area.

“Even in South Africa, where we have significant poverty issues, most people have a cellphone. It’s accessible, adopted and, through our new technologies, secure. A win-win for everyone.”

SALTO’s Wouter du Toit agrees, noting that the ability to bring your business and security onto a mobile platform has been a growing trend and technology is allowing us to provide better solutions for people on the move. “Being able to see what is happening at your office without you being there is just one of the ways mobile technology is improving the security element for SME users.”

Another way, he says, is combining cloud-based solutions with your mobile device. For example, a retail operator who owns a number of retail chains can now link all these sites easily into a central cloud-based solution and use his mobile device to access any location or easily invite new users to gain access to the property. They are also able to cancel access on the go without having to be in front of the server and get real-time notifications on doors left open, forced open and other events.

Yet another way mobile phones are changing in the hospitality environment is by sending your room check-in directly to your phone and eliminating waiting in long queues. It also allows the hotel to send information to your device and even to easily re-room you or cancel your access without you having to return to the front desk, enhancing the guest experience.

SALTO uses android mobile devices with NFC in combination with RFID cards to allow remote and mobile workers to update their access plan on their card through their mobile phone, allowing users to gain access to offline controlled areas where no network is in place.

Mobile versus traditional access

While using a mobile device for access control, whether it’s at work or in a hotel, wins many points for the ‘coolness factor’, Vink says it is really just an alternative credential carrier. Instead of using a tag, card or fob, now all that information is securely contained within your mobile phone. “The principle software and hardware remains the same (except for mobile-enabled readers on the door) and the user presents their phone to the reader for entry.”

She adds that the benefit is convenience. Most people have their cellphone constantly with them, and we’re more alert to protecting our cellphone as opposed to a tag. “This immediately reduces the security risk because the loss of a card is frequently not reported for some time. People may think they’ve left it at home, or that it will surface in a few days; however, if a cellphone is missing, it’s immediately investigated.”

Du Toit says mobile access adds the freedom to choose what type of carrier you would like to use for access-controlled areas. It is not bound to a fixed network or geographical location and allows you to be free in movement.

An additional benefit, according to Vink, is enhanced security. In the past if a tag was stolen, the only option available was to block entry to anyone presenting that specific tag. Now the option is available to revoke the tag on the mobile phone remotely. This means if a cellphone is stolen, the site owner can delete the credentials on the mobile phone ‘over the air’.

“Additional failsafes are available, such as the user having the ability to remotely wipe their phone with a variety of free apps; as well as the traditional method of revoking the individual’s credentials on the access control software, so if the phone is presented it will not allow access.

“It all adds up to greater security and peace-of-mind.”

Significant benefits

There are many benefits that come along with mobile access control. A few of them, according to Du Toit, are:

• Mobile access allows you to modify the users access rights on the fly wherever they are. SALTO has a number of ways for using mobile access, the one is through BLE where you use the Bluetooth connection between the phone and the reader, this is more accessible to the masses because most smartphones have this technology built in and is widely adopted in various sectors.

• The second is using NFC on Android phones where a secure EV1 Desfire tag is used in combination with the phone. The phone is used as a hotspot and transfers the required credentials securely from the phone through NFC onto the EV1 card. This means you can be anywhere and update your card to enter a property without the property needing any physical network connection.

The greatest benefits, says Vink, are convenience and security; as well as protection of privacy as the user owns their credentials. “The user decides where to release those credentials, to whom and when, i.e. when entering the building to my company each morning, thus alleviating any privacy concerns, especially in international markets.

“And because mobile phones are so prolific in most markets, it’s a readily available technology. Users are not being asked to take on a new technology, or change their way of operation. Mobile phones are part of our lives and most people are comfortable using them. This makes the market opportunity huge.”

In addition, she notes that more than simply using your mobile phone as a tag, Impro is also able to provide users with the ability to manage and control their entire site from a mobile phone – this provides unrivalled flexibility. Authorised users can use any HTML5 device, whether it’s a smartphone, tablet or computer to control the access control system remotely or to pull reports on the activities on site.

“Simplicity, flexibility and convenience. These are the waves of the future and we’re able to meet them today.”

The integration question

Many people have had the experience of buying the latest and greatest technology, only to find that it doesn’t work well with other technical systems. In the access control world, there are many large installations with equipment from various vendors, and many of them will have been around for years. The question that must be asked is how easy it will be to integrate the newer mobile access technologies with older systems since it is unlikely that a company will simply decide to replace their entire access control setup with a mobile solution – although smaller companies may be in a position to do this.

Vink explains that one of the reasons Impro’s Access Portal system has been so successful is the ability to quickly integrate new technologies into the solution. “Through our modular design, and the inbuilt flexibility of the platform, we are able to seamlessly bring in new products and features.”

Since Impro was purchased by ASSA ABLOY, this flexibility has been extended and the company can now offer customers credentials securely on their mobile phones. This will require mobile enabled readers on doors (from a hardware perspective), while the user downloads a free app and receives the authorised credentials remotely onto their device. “When you want to enter the building, you simply ‘twist’ your phone in front of the reader – no touch necessary – and access is granted.”

All these features are able to integrate into the company’s Access Portal software suite, enabling customers to get a full solution from Impro Technologies.

SALTO offers a similar solution, delivering a complete access control suite that comprises mobile and traditional access methods, as well as an API (application programming interface). Du Toit says the company tries to simplify the integration process through the API, but ultimately it is dependent on the client’s integration skills.

He adds, “Our platform is easy to use and quick to understand and is really no different from an operators point of view when adding or deleting standard credentials or cards on the system.”

Expanding on the Impro Access Portal solution, Vink explains, “Our Access Portal system comprises a variety of solutions, tailored for different customers depending on their specific needs. We have mobile readers that are handheld biometric devices for remote offsite verification of employees; mobile phone credentials where your phone becomes your tag, as well as the ability to control your site through a mobile HTML5-enabled device.

“The options are vast and enable us to offer each customer a tailor-made solution, with off the shelf products, to address their specific pain points, goals and needs – both for today, but more importantly, for tomorrow and beyond.”

From SALTO’s perspective, Du Toit says, “SALTO offers mobile solutions for the hospitality industry. Clients benefit from various features including, online key management, instant extended stay, instant room change, personalised promotions. Furthermore, not waiting in long queues gives front desk operators time to personalise and welcome guests properly, increasing the experience when you check-in.

“We also offer mobile solutions for our cloud-based platform where you can have full control over your site(s) from your mobile device anywhere in the world, this includes cancelling access, who enters your property, is any door left open or forced open, opening a door locally or remotely, multi-site access and more.

Our standard SALTO platform also includes BLE (Bluetooth Low Energy) and NFC (Near Field Communication). BLE is used as a credential on the phone and you can use both card and phone for access control with bi-directional communication. NFC in mobile phones is used to update the card with the latest credentials for people not frequently visiting the office and needing to visit remote locations where no networked access control solution is deployed.

For more information:

Impro Technologies:

SALTO Systems:


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

A customised solution for backup power
August 2019, Specialised Battery Systems , News, Integrated Solutions
Specialised Battery Systems designed and implemented a bespoke solution for Stallion Security Electronics to deploy at almost any site.

HID addresses identification challenges at ID4Africa
August 2019 , News, Access Control & Identity Management, Government and Parastatal (Industry)
Being able to verify people’s identities is critical for a nation’s growth and prosperity and yet HID says nearly half of all African citizens can’t prove who they are to vote, travel freely and receive government benefits and services.

Came acquires Turkish company Özak
August 2019, CAME BPT South Africa , News, Access Control & Identity Management
Came broadens its market horizons and signals growth and consolidation in the Middle East.

Augmented security with drones
August 2019, Drone Guards , Editor's Choice, Integrated Solutions
Drone Guards is moving into an untapped market of using drones to secure residential estates and other high-value assets such as mines, farms and commercial properties.

10 things to consider when shopping for a VMS
August 2019, Genetec , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Today’s video management systems (VMS) provide a wide range of tools and capabilities that help make security personnel more efficient by allowing them to focus on what really matters.

The benefits of electronic visitor management
August 2019, Powell Tronics , Access Control & Identity Management, Residential Estate (Industry)
Access control is a critical aspect of estate security as it represents the controls put in place to restrict entry (and possibly exit) along the outer boundary of the location.

Addressing risks by means of access control layout and design
August 2019 , Access Control & Identity Management, Security Services & Risk Management
In order to develop a suitable, practical and appropriate security system for any organisation, it is essential to first develop a master security and life safety plan strategy.

Secure hands-free access
August 2019, Suprema , Access Control & Identity Management, Residential Estate (Industry)
Suprema’s facial biometric terminals bring no-touch access into secure residential estates, high-rise apartments and luxury homes providing fast, easy and intuitive user authentication with the added benefit of hygiene.

MorphoAccess Sigma Extreme
August 2019, IDEMIA , Products, Access Control & Identity Management
MorphoAccess Sigma Extreme from IDEMIA is a touchscreen device with multiple recognition device interfaces (NFC chip reader, PIN and BioPIN codes, contactless card readers).

Outdoor access terminals
August 2019, Suprema , Access Control & Identity Management, Residential Estate (Industry), Products
Rugged, dust- and weather-proof access control solutions that provide exceptional durability in extreme conditions is a strong requirement for many residential estates.