Download PDF version Contact company

The use of Mobile IDs in access control grows more frequent every week. That is why Idesco’s display reader, 8 CD 2.0 Pin D, will also soon accept a mobile ID from one’s smartphone.

Interactive routines that require identification, like payment, are easily and securely managed with an RFID keypad/display reader providing a menu and displaying user-specific responses. That is why 8 CD 2.0 Pin D’s keypad is designed to flexibly support users’ need to select options and input data.

Integrating mobile ID

When one integrates mobile IDs, system management and service can actually become easier. Mobile IDs are created and stored in phones, ready-to-use, once an Idesco mobile app is installed. If one’s site prefers migrating solely to mobile ID’s, one will no longer need to purchase and code physical transponders for users.

Alternatively, one can choose to keep traditional transponders working alongside mobile IDs, if mobile ID readers will only be installed at selected access points on a site.

Useful for temporary credentialing

When deploying 8 CD 2.0 Pin D for payment, mobile IDs will also make product and service purchases easier. For starters, customers won’t need coded transponders to enter. After Idesco’s app is installed on their phone and their ID registered in the system, they can begin purchasing products or paying for services immediately.

Mobile ID is equally well-suited for temporary credentialing, for example, providing room access to hotel guests, or simplifying their purchase of additional services or restaurant meals.

Download PDF version Download PDF version

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?