Drop us a line

Your Name (required)

Your Email (required)


Your Message

Reasons to Embrace Mobile Access

Recent innovations in technology and the IoT movement are rapidly changing the access control industry. Things that seemed impossible are suddenly becoming a reality and it seems that every industry is fighting to keep up. The physical access control industry is not immune to these changes. Those that embrace technology and the capabilities that it brings, will pioneer a new standard for security. The first step was moving access control to the cloud. This in turn helped the management of credentials. The next step was moving these credentials to a more convenient and secure location, a smartphone.

Sequr can enable smartphones, tablets, and even wearables to function like a keyfob or keycard. By embracing the increasingly mobile-first world, the technologies that accompany these devices can now operate as peripherals for expanded functionality. Lets take a look at some numbers. According to the Ericsson Mobility Report:




Reasons to embrace mobile access.

More Secure

The proprietary technology used to communicate between the BLE/NFC enabled device and the reader  preserves privacy by enabling Mobile IDs to be issued, delivered and revoked with end-to-end encryption as part of a unique transaction that protects personal identification data.  Mobile Access makes it possible to use smartphones and other smart devices for future applications such as PC login, time and attendance, biometrics, EV charging in a unified secure identity system. A lot of people ask, “what happens if someone shares there account login information, will that person have access as well?” The answer is no. Every credential that is assigned to someone is unique to them and their device. Simply sharing your login information will not give them access. This makes copying mobile credentials nearly impossible. On top of that, people are more likely to lend someone their keycard than their phone.


Mobile access provides a layer of convenience for the user and the credential manager. Users don’t have to worry about forgetting or losing their keycard anymore. As long as they have their phone, (and lets be honest, who leaves home without their phone?) they have access. On top of that,  readers can be configured to recognize three types of entries. The first is to simply tap your phone to the reader. The second is the HID patented “Twist and go” technique that allows you to turn you phone to the side from a given distance to open the door or gate. And the third is passive entry. This means that the door will unlock as you approach, without having to remove your device from your pocket.


This one is pretty obvious, but opening a door with your phone is just plain cool. When smart residential locks started coming out (such as August Lock), you probably thought it would be great to have that everywhere. Soon that will be a reality. Imagine a scenario. You drive up to your office building and your mobile device is detected in your pocket. The gate automatically opens. Next stop is the lobby elevator. Simply tap your phone to the reader to go to your floor. As you are walking up to your office door, twist your phone to unlock the office. Now imagine you could do this at your gym, apartment, and storage facility. Mobile access just may make access control cool. Just maybe.


The flexibility of a mobile credential is perhaps its greatest strength. A physical credentials problem is that it is, well, physical. It requires manually entering a token/facility number into a system and distrubting the credential to the authrozid user. Revoking access to that card is easy enough but chances are you are not going to get the credential back. This can get quite expensive. The ability to assign a mobile credential allows for the automation of the credentialing process. Keys can be assigned, partitioned, or revoked in real time. Temporary keys can be assigned without having to pull another physical credential. Integrations with business systems can further automate a managers work flow.



ASSA ABLOY: http://bit.ly/20yih5I

Ericsson: http://yhoo.it/1PZ4n5b