Intelligent Tech Channels Issue 01 | Page 70

EXPERT SPEAK
Opening a parking door from within a car, without even rolling down your window, or accessing the entrance of a building while walking up to it, will increase the convenience for employees.
However, doors in close proximity to one another need to utilise a tap experience from a shortdistance. Opening the wrong door unintentionally, or indeed all your building’ s doors, clearly is not a welloptimised mobile access solution. Each reader can be configured to match the requirements of the doors.
It may not simply be a case of rip and replace in your own company. Taking the time to carefully map out your requirements could prove a costeffective method of implementing your mobile access control solution.

4

Software to support mobile access
The next step is to make sure your mobile access system is supported by software that increases operational
Assess your building’ s current access control infrastructure to determine the requirement for moving to mobile
efficiency by managing the enrolment and provisioning of mobile IDs overthe-air. No physical encoding, printing, or returns should be necessary.
This type of software enables administrators to upload users in batches, easily sharing customised invitations and instructions to each employee via email. Unique encryption keys, ensuring proper matching of both phone and mobile ID, protect over-theair provisioning.
At the reader level, an additional layer of encryption ensures a highly secure transaction. The mobile phone’ s screen lock keeps the mobile ID unusable if the phone is lost or stolen. This type of software should also allow openness and integration capabilities to further define the business processes best suitable for your business.
Mobile IDs for workforce

5 The final step in your access system implementation is to issue mobile IDs to your staff. More and more providers are enabling their software to be available through the App Store or Google Play, allowing users to download the associated applications. After the application is installed on the users’ mobile device, with a verification step for extra security, their mobile will be set up as a digital access control card.

To ensure smooth uptake of your mobile access control system, this stage needs to be as easy as possible for your users. The key is to be methodical and clear with staff during the mobile ID process. Using a cloud based system enables the easy transmission of individual mobile IDs to each employee, with new mobile IDs being sent autonomously through the air.
Employees receive an email, prompting them to download the access software application. A digital key is also included in the e-mail, so the employee needs to copy this code into the application and they are good to go.
Deploying the optimal architecture for employee mobile access solutions has the potential to transform your company’ s culture, security and employee convenience. By keeping these steps in mind, the implementation process can be lot smoother than anticipated.
70 Issue 01 INTELLIGENT TECH CHANNELS