Download PDF version Contact company

Door access with mobile phone is constantly increasing. Mobile phone is excellent for carrying digital access rights – secure, convenient and available to everyone. Mobile credential is transferred from phone to reader using the phone’s Bluetooth connection.

The connection between the reader and phone is protected by secure encryption – the same as mobile payments are using. Mobile access by phone also enables using the phone’s own security locking, such as fingerprint, as a part of the verification process. This option is not available with traditional physical transponders without a separate, often expensive biometric reader.

Traditional physical transponders

Mobile access and Idesco ID mobile access solutions make access control and especially access credential management and their delivery to users much easier. So far, previous mobile access solutions in the market have been merely cloud-based services. System installers have had to implement separate cloud service for mobile access credential management, parallel to their own access control system. They have had to register to this separate cloud service whenever they want to manage mobile access rights.

Idesco ID is a service for the management of mobile access rights in an existing access control system where traditional, physical transponders are also managed. Indeed, it enables sending mobile credentials to users’ phones directly from their own system, without the need to register to parallel systems.

Environment-friendly solution

Mobile access with Idesco ID is an economical and environment-friendly solution

Mobile access with Idesco ID is an economical and environment-friendly solution, especially for temporary access rights. Users don’t need to assign physical plastic cards or transponders for their customers if they need access rights only for a couple of days. If users manage and assign temporary access rights for management personnel, mobile access rights are very handy; they can send them remotely to their phones, saving time and resources.

Idesco ID provides different options to use the service. If an organisation is sending new mobile credentials to phones regularly, continuous Idesco ID Enterprise service could be their best choice. Another option is to send mobile credentials to all phones in lump, meaning that Idesco ID service is used only during this transfer.  

Managing access credentials

Small organisations, sending mobile credentials only occasionally, could benefit most from Idesco ID Entry level solution. There, user first downloads Idesco ID application which creates a mobile credential in their phone, then lets it be read into the system by a separate Enrolment Station device, e.g. in reception.

Whatever mode of service they choose, they always manage access credentials in their own system, and Idesco ID will not become a part of their own system. Mobile app users don’t need to create accounts in cloud or manage passwords. Only their phone number or additionally also an email address is needed from them, and that is only for sending the mobile credential. After sending, their phone number and email address are removed from Idesco ID service.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?