Download PDF version Contact company
LEGIC recently published a free value calculator hotels can use to calculate their individual potential cost savings
Using Connect, the process of deploying electronic room keys to cell phones is fast

From now on, guests of The Woodlands Resort & Conference Center near Houston, Texas can open their hotel room with their own smartphone. LEGIC provides its secure and proven trusted service LEGIC Connect. The latter deploys smartcards onto smartphones – at the touch of a button.

The Woodlands Resort & Conference Center with its 406 rooms is the first hotel in Texas providing its guests a very special experience: access a room, call an elevator or open external entry doors by simply holding the personal smartphone up to the reader. This new, state-of-the-art technology is provided by LEGIC Connect and Kaba’s mobile access solutions.

At the Woodlands property, which is owned by The Howard Hughes Corporation, LEGIC Connect facilitated a fast mobile set up and now, it ensures a reliable and highly secure guest experience. Based on LEGIC's Software Development Kit, Woodlands’ own app was created.

Simple, but efficient

The new guest experience is simple: guests book their room on Woodland’s website and download the free hotel app. As soon as their personal room is ready, they receive the Bluetooth-enabled room key wirelessly onto their mobile phones. They don’t need to queue at the reception and wait for a key card. Klaus U. Klosa, LEGIC’s Managing Director is convinced of the new technology: “LEGIC Connect not only relieves administrative work for hotels, it also reduces costs and improves guest satisfaction.”

LEGIC recently published a free value calculator hotels can use to calculate their individual potential cost savings.

LEGIC Connect – security first

Using Connect, the process of deploying electronic room keys to cell phones is fast, simple, secure and stays in the background.

The heart of the system is a well-designed security concept by LEGIC experts with over 20 years’ experience in the security industry. Two fully redundant certified data centers with several tamper proven hardware security modules transfer an encrypted “secure authorization” to the hotel guest’s mobile phone. This authorisation is only decrypted when holding the smartphone in front of the room door lock.

Download PDF version Download PDF version

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?