Intelligent Tech Channels Issue 01 | Page 70

EXPERT SPEAK
Opening a parking door from within a car , without even rolling down your window , or accessing the entrance of a building while walking up to it , will increase the convenience for employees .
However , doors in close proximity to one another need to utilise a tap experience from a shortdistance . Opening the wrong door unintentionally , or indeed all your building ’ s doors , clearly is not a welloptimised mobile access solution . Each reader can be configured to match the requirements of the doors .
It may not simply be a case of rip and replace in your own company . Taking the time to carefully map out your requirements could prove a costeffective method of implementing your mobile access control solution .

4

Software to support mobile access
The next step is to make sure your mobile access system is supported by software that increases operational
Assess your building ’ s current access control infrastructure to determine the requirement for moving to mobile
efficiency by managing the enrolment and provisioning of mobile IDs overthe-air . No physical encoding , printing , or returns should be necessary .
This type of software enables administrators to upload users in batches , easily sharing customised invitations and instructions to each employee via email . Unique encryption keys , ensuring proper matching of both phone and mobile ID , protect over-theair provisioning .
At the reader level , an additional layer of encryption ensures a highly secure transaction . The mobile phone ’ s screen lock keeps the mobile ID unusable if the phone is lost or stolen . This type of software should also allow openness and integration capabilities to further define the business processes best suitable for your business .
Mobile IDs for workforce

5 The final step in your access system implementation is to issue mobile IDs to your staff . More and more providers are enabling their software to be available through the App Store or Google Play , allowing users to download the associated applications . After the application is installed on the users ’ mobile device , with a verification step for extra security , their mobile will be set up as a digital access control card .

To ensure smooth uptake of your mobile access control system , this stage needs to be as easy as possible for your users . The key is to be methodical and clear with staff during the mobile ID process . Using a cloud based system enables the easy transmission of individual mobile IDs to each employee , with new mobile IDs being sent autonomously through the air .
Employees receive an email , prompting them to download the access software application . A digital key is also included in the e-mail , so the employee needs to copy this code into the application and they are good to go .
Deploying the optimal architecture for employee mobile access solutions has the potential to transform your company ’ s culture , security and employee convenience . By keeping these steps in mind , the implementation process can be lot smoother than anticipated .
70 Issue 01 INTELLIGENT TECH CHANNELS