• blog-eleven .jpg
    Getting Back to Business Security Technologies to Assist Offices Reopen in 2021

    Part 1: Hands Free Access Control Solutions

    Read More
  • blog-eight .jpg
    Getting Back to Business Security Technologies to Assist Offices Reopen in 2021

    Part 2: Video Analytics

    Read More
  • blog-five .jpg
    Getting Back to Business Security Technologies to Assist Offices Reopen in 2021

    Part 3: Visitor Management

    Read More

Mobile Credentials Part 2: How Do Mobile Credentials Work

Oct 21, 2021 8:52:32 AM


In Part 1 of this series, we outlined the benefits of implementing mobile credentials for your access control security program. In Part 2 we look at the technology that makes mobile credentials easy to deploy and secure to use.

When an organization issues a mobile credential to an employee or visitor, the credential is sent to the employee’s mobile device, usually by email, which is stored in the approved and compatible app. Additionally, mobile credential systems can leverage the existing employee database with integration to G-Suite, Active Directory, Okta and other human resources and IT solutions. The benefit of this mobile credential is that it can be issued virtually without the device owner being present at the location.

The credential is sent to the mobile device where the normal access control encryption, commonly Prox, DESFire, iCLASS, etc., is further enhanced by the common security features of a mobile device like two factor authentication (2FA), fingerprint, PIN, or face recognition.

Once on the mobile device, the credential signal is transmitted on demand to the door reader using native GPS and Bluetooth® or NFC functionality. Most systems can also transmit from an associated tablet or smart watch, eliminating the need to even remove the phone from a pocket.

Readers are available to replace or complement existing RFID credential readers. Integration to an existing access control system requires expert consultation for proper system design. Migration to mobile credentials can be managed to include ongoing use of RFID and biometric credentials or complete transition to mobile technology.

And if you are wondering how this can work for government entities, cryptographically protected credentials, like Personal Identity Verification (PIV), are a convenient authentication technology available for mobile credentials.

Access the Benefits

The Vision team is ready to help you protect your employees, contractors, visitors, and assets by providing expert advice and system design of high-performance access control solutions, including mobile credential implementation. We can perform immediate fixes and design long-term solutions. We’ll navigate initial discussions with all stakeholders by clearly explaining secure mobile credential technology and how it operates and impacts all stakeholders.

Once a plan is approved, our experienced team will ensure your facilities are properly protected.