Call Us 757.857.4777
Skip to main content
Axis Global Header Image

Remote Access Gives Companies Smartphones a Virtual Key Fob

 Friday, September 7, 2018 | Virginia Beach, VA
Smartphone Technology Graphic

Remote Access Gives Companies Smartphones a Virtual Key Fob

Companies are finding a way to cut costs and keep their employees safe through their smartphones.  More and more businesses are using their phones instead of an access card or key fob to enter a building. This allowing companies to save on card costs, which can quickly add up. 

There are 2 technologies that allow mobile access, Bluetooth Smart and NFC.

Bluetooth Smart
Bluetooth Smart is able to operate both at close range and from a distance, supports both iOS and Android, and has low power consumption. Environments with mixed device populations and those that require activation from a distance are best served by this communication standard. 

NFC
The NFC standard, operating in HCE mode, is a good choice for close-range applications (less than 10 cm or direct contact with a “tap”) that do not include iOS devices in the mobile population.

A mobile access solution should be designed with security as a first priority. Managing sensitive identity data on mobile devices requires a holistic view of end-to-end security.  Some of the questions to consider are:

  • How are Mobile IDs generated?
  • How are they managed over the entire lifecycle?
  • How can Mobile IDs be securely stored on mobile phones?

Attacks can come in many ways so mobile IDs must be encrypted to prevent manipulation. All Mobile IDs and user information should be protected by cryptographic operations. Applications that manage Mobile IDs should run in a dedicated sandbox, ensuring no unauthorized apps can access or modify data.

We recommend banning jail-broken or rooted devices from business use. If a phone that is being used for mobile access is lost, stolen or compromised, it is easy to remove the access.  If the device is found again it can just as easily be re-activated. 

It is very important to have a policy in place that if a phone is lost it be reported.  This policy should already be in place in the event a card or key fob goes missing.  To further reduce the impact of a stolen device, devices can be configured to engage only with readers when the device is unlocked. You want to use trusted back-end services to protect your access control system. 

You will need new readers to implement this solution, but it will save you money on cards and make life easier for your employees.

About the Author

Debbie Ybarra is an Account Executive for Axis Global Enterprises DBA ASI Security. She is continually staying up to date with the latest technology to be able to offer it to her customers. If you are interested in this type of technology for your business, you can reach her at dybarra@asisecurity.net or visit asisecurity.net.

How can we help? Request an assessment today by giving us a call at 757.857.4777
SWaM Certified
DBE Certified
MBE Certified
SBA 8(a) Certified
SDVOSB
AGC
BCEVA Member
V3
HR Acre Member
IREM Member
HRCC
BBB
DBIA
LEED
VASCUPP
PSA