Download PDF version Contact company

By leveraging each other‘s technologies as companies sharing the dormakaba banner, LEGIC and Farpointe Data are at the forefront of the new expanding market for secure mobile credentials. LEGIC‘s 6000 series reader ICs and the mobile service LEGIC Connect are at the heart of Farpointe‘s new, award-winning Conekt mobile smartphone access control solution.

Farpointe’s first Conekt products are the K-BLE mobile access credentials and K-SMART3 electronic access readers with Wiegand output that support both mobile and traditional physical credentials. Electronic access control mobile smartphone-based credentials are an evolution of traditional RFID cards and tags, joining proximity and smartcard credentials to identify a user as he moves about a secured facility.

Mobile access credential

Mobile credentials Gartner suggests that by 2020, 20 percent of organisations will use mobile credentials for physical access

Mobile credentials make it possible for smartphones, such as the Apple iPhone and the range of Google Android devices, to be used as an electronic access control credential. Mobile credentials Gartner suggests that by 2020, 20 percent of organisations will use mobile credentials for physical access.

Security professionals creating electronic access control systems need to be aware that over 95 percent of all adults between the age of 18 and 44 own smartphones. Plus, 69 percent of the entire population already uses smartphones. And, the average smartphone user touches their device 2617 times a day (Dscout Research). Thus, practically anyone using an access system already carries a smartphone. Another way to look at it is that every smartphone user, or almost everybody, could now easily download a mobile access credential.

Sensitive confidential information

High security Conekt recognises the latest cybersecurity responsibilities expected of access control system providers. Original solutions often compelled end users to disclose sensitive confidential information about themselves and their installation.

Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way"

The new Conekt solution provides an easy way to distribute credentials with features that allow the user to register only once, needing just the smartphone’s number, and requiring no other portal accounts or activation features. “Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way.” Scott Lindley, General Manager, Farpointe Data, Inc.

Classic access control

Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way. How about using a smartphone as an intelligent key for a car? Want to know where a child or loved one is driving, how fast, if he/she added gas or oil or if anyone else is in the car? How about using it to access the gym, automatically sync to a piece of equipment, immediately gain expert advice or analyse the effectiveness of the workout?

Use a smartphone for everything, forget all those other tags and cards. a smartphone will become the passport to all aspects of life, from work to home to avocations. And at a fraction of the investment in traditional credentials, secure mobile Conekt credentials are all anyone will need.

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?