You are on page 1of 16

Mobile Credentials:

Access Control for the


Mobile Workforce
“Mobile credentials have the power
to revolutionise access control
- making it more sustainable,
convenient and flexible.”
Steve Wintle,
Head of Critical
Infrastructure at Abloy UK

2 Mobile Credentials: Access Control for the Mobile Workforce


Contents Page

Introduction 4
Flexibility and convenience 5
Identity verification 6
Enhanced security 7
Sustainability 8
Managing the credential 9
Lock vulnerability & battery concerns 10
Effective use of mobile credentials 11
Incedo Mobile Keys 12
CIPE Manager 13
ABLOY BEAT 14
Conclusion 15

Mobile Credentials: Access Control for the Mobile Workforce 3


Introduction

Over
The world is adopting new technologies 120
million
at an astounding rate, and as a society
we are becoming more reliant on digital
devices. When it comes to managing
access control, mobile credentials are
mobile
gaining popularity across a wide range credentials
of industries and applications.

A mobile credential is a digital access


key that sits on a smart device such as
a smartphone. This replaces a traditional
predicted to be
credential such as a key, a fob, or a card. A downloaded in
mobile credential allows you to authenticate
with your smartphone and use it as your key
to gain access to a building, room or location.

In this whitepaper, we explore a number


of reasons for this increased demand for
mobile credentials, including the need for
2023
flexibility and convenience, an easy way to
manage access rights with instant delivery,
and increased security and sustainability.

We also consider barriers to implementation

4.1
of mobile credentials and recommend the
type of applications where they could be the
most appropriate access solution.

million
downloads
recorded in

2018
(Source: Forecaster IHS Markit)

4 Mobile Credentials: Access Control for the Mobile Workforce


Flexibility and
convenience

The global mobile workforce - a group “A mobile workforce


of employees not bound by a central
physical location but connected by various is a group of employees
types of mobile technology - is expected to
reach 1.87 billion workers by 20221, and this
that isn’t bound by
new way of working brings a requirement for a central physical location.
adaptable and flexible access control.
Instead, the employees
Mobile credentials offer convenience are connected by various
as there is no need for a separate RFID
credential when you open secure doors and types of mobile technology:
openings with a device you already carry. For computers, smartphones
example, a smartphone can raise the car park
barrier, access the printer network or open and other mobile devices.”
a locker.

They are also flexible, as Security Global mobile workforce


or HR managers can amend, issue
or cancel credentials from anywhere and is expected to reach

1.87 billion
building users always have their access
rights up to date.

Plus, as mobile credentials are updated


wirelessly and remotely over the air,
it reduces face-to-face contact for both
workers by 2022
staff and visitors, as they do not need
to collect a card or fob.

This improves efficiency too, as employees

Two-thirds
waste less time collecting or amending
access credentials in person and visitors get
instant temporary access when they need it.
of organisations will have adopted
Research finds that over two-thirds
2

of organisations will have adopted mobile


mobile access control
access control to some extent within two
years. This increase in adoption has been
within two years
accelerated by the impact of the pandemic
and the growth in working from home. 1
https://www.ibm.com/topics/mobile-workforce
The Wireless Access Control Report 2021- https://www.
2

ifsecglobal.com/downloads/wireless-access-control-
report-2021/

Mobile Credentials: Access Control for the Mobile Workforce 5


Identity verification

Passwords alone are no longer acceptable Mobile credentials utilise on-device


in the cyber world, as they can be shared, passwords and biometrics such as
stolen and copied – just like some keys. fingerprint, voice and facial recognition,
The only way to overcome this issue to keep unauthorised people or groups from
is to verify the identity of the individual accessing the key stored on the smartphone.
attempting to gain access. This is seen as a significant advantage over
a physical key, fob or card credential.
Identity verification has become standard
practise in society, for example when
shopping or banking online. Consumers
are familiar with having to enter a verification
code when using a shopping app to confirm
their identity, and this offers peace of mind
that their details are secure.

6 Mobile Credentials: Access Control for the Mobile Workforce


Enhanced security

17.3%
of card or fob users
lose at least one
card or fob annually

Mobile credentials are seen as level of security on the device means


a more secure way to manage access, that it will be incredibly difficult for
and people are less likely to lose someone to access it, let alone get far
a mobile phone compared to other enough to utilise the credential.
credentials such as a key card or fob.
In fact, 17.3% of card or fob users lose Also, people will notice more quickly
at least one card or fob annually3, if they have lost a mobile than if they
compromising security and creating misplace a key or fob. This means the
a cost for the organisation to replace. organisation can be quickly alerted
to the missing smartphone, so they
If a key or fob goes missing, it can can revoke access instantly using the
easily be used by any person that has credential’s management software.
it in their possession. In contrast,
if a smartphone goes missing, the

Proxy’s 2019 Physical Security Trends Report


3

Mobile Credentials: Access Control for the Mobile Workforce 7


Sustainability

When using traditional credentials such access credentials in person and visitors get
as a key, card or fob, there is a time and instant temporary access when they need it.
efficiency cost in distribution, whether that Eliminating the need for key cards and fobs
is via delivery or handing them out physically. – and the constant replacement of lost cards
and fobs - reduces plastic usage too.
Mobile keys offer a more flexible and
convenient solution, as Security and For organisations with contractors travelling
Operations managers can amend, issue between disparate and remote sites, mobile
or cancel credentials from anywhere and credentials offer a way to enable access
building users always have their access permission changes in real time.
rights up to date.
This not only reduces CO2 emissions from
Plus, as mobile credentials are updated wasted trips where an incorrect key may have
wirelessly and remotely, it reduces been provided, as well as going back and
face-to-face contact for both staff and forth to collect and return keys, but improves
visitors, which is seen as another benefit operational efficiencies, and creates a more
in the wake of the pandemic. flexible workforce, saving time and money,
while improving management and tracking
It’s a more efficient system, and employees of who accessed what and when.
waste less time collecting or amending

8 Mobile Credentials: Access Control for the Mobile Workforce


Managing the credential

With all these advantages, it’s easy Without question, integration of mobile
to forget there is still a need manage technologies with Permit to Work ticketing
mobile keys. Mobile credentials can be and individuals’ training and competencies
convenient and flexible, and in some cases records can make the management
practical for external applications, but of access control easier, and at the same
it’s not the credential that’s providing the time enforce compliance.
actual security. The credential provides
confirmation that the holder is authorised Automation will allow the process
to access a site or open a lock - and that’s to happen routinely, providing a seamless
where the practicality issues come into and efficient operation, while also enabling
question. the exceptions to be scrutinised. But beyond
the credential, the flexibility in what it could
The credential is seen as the answer operate and how it can be used is often
to no physical keys, which has been underestimated.
a challenge for most businesses to manage.
The reality is, a mobile credential still needs
to be managed, and this is a factor that
needs to be planned in.

Mobile Credentials: Access Control for the Mobile Workforce 9


Lock vulnerability
& battery concerns

Mobile credentials require a lock that has simulated by the LPS standards? In this
an inbuilt reader, a power source, and instance, a physical key is a more practical
something to operate it - turn the lock - means of securing and controlling access
a function traditionally performed by a key. to critical assets.
At present, a large thumb turn is usually
provided on the outside, acting as the reader Amongst other concerns raised
and a means of operating the lock. by integrators around the use of mobile
credentials for access control, phone battery
This design leaves the lock vulnerable for life was listed as a potential issue. A phone
a vandal or organised criminal to attack and with no battery charge means no access can
disable, causing disruption and potential be granted to the user, which can impact
easy access for the perpetrator. This in turn a business in terms of lost working hours.
also causes an issue for the authorised This is where unpowered fobs or cards,
engineer or contractor needing or a physical key are seen as a more reliable
to gain access. source of credentials.

If it’s a high security door, then how do you


protect the thumb turn with a high security
shroud against hammer or drilling attacks

10 Mobile Credentials: Access Control for the Mobile Workforce


Effective use
of mobile credentials

Keyless solutions aren’t perfect for every This is ideal for the ad hoc visitor needing
application, and keys are still a very practical to access once, rather than on a regular
solution, especially for legacy estates basis. ABLOY® BEAT is a prime example of
with traditional locking mechanisms. The this, offering the ability to use a phone to
practicality of keyless solutions working in open and lock a padlock. The padlock is
dirty harsh remote conditions is completely physically secure, and access is managed
different from warm dry office applications. via an app controlled by the same piece
of mapping software as PROTEC2 CLIQ®.
In addition, there will be certain
environments where mobile phone usage
is simply not permitted – nuclear sites,
for example - making mobile credentials
an unsuitable solution.

Although there can be some limitations


to using mobile credentials, there are
many instances where the technology has
substantial advantages. A credential carried
or sent to a mobile phone is ideal for shared
site access, for example.

Mobile Credentials: Access Control for the Mobile Workforce 11


CIPE Manager

ABLOY’s CIPE Manager brings together CIPE Manager has been designed
a keyless solution, an electromechanical specifically for day-to-day operational
key solution and a mechanical key solution use by security, operations and facility
that can secure all applications with easy management to control keys and manage
management – with all three elements access rights to their organisations’ critical
working together. infrastructure sites and facilities. Typical
sectors include energy, water, telecom,
CIPE Manager is tailored to give a oil, gas, rail, ports and airports.
comprehensive situational overview and
increase operational efficiency in critical CIPE Manager includes a highly visual
infrastructure access management and key map-based user interface that provides
control. The solution allows organisations a clear overview on the variety of locking
to manage all their keys, locks and access points. With CIPE Manager the user can
rights from any location, with a user-friendly, connect the organisation’s mechanical,
cloud-based management system. electromechanical and keyless locking
solutions into the same system. This allows
CIPE Manager connects with every locking extensive situational awareness and efficient
solution in Abloy’s digital portfolio, access and key management.
including Abloy BEAT the keyless Bluetooth
padlock, the electromechanical PROTEC2 The user interface is browser-based,
CLIQ® system, and Abloy’s high-security allowing the management of keys, locks,
mechanical master key systems. and access rights remotely from any location
with most mobile devices or desktop
This range of traditional and digital access computers.
solutions can be combined in a variety
of ways to meet virtually any requirements, The administrator using CIPE Manager can
providing flexible, scalable and compliant grant and revoke access permissions to
security, while helping to control the people according to their roles, e.g. job task
movement of people in a wide range or organisation. In addition to easy access
of industries, building types and management, the solution offers extended
applications. Many of these locks are CPNI reporting and tracking features with full
tested and approved for UK Government use. audit trail data.

Mobile Credentials: Access Control for the Mobile Workforce 12


ABLOY BEAT

BEAT is a new keyless padlock that combines BEAT is especially useful in remote areas,
three main components: a digital key, with busy schedules and in case of
a mobile application and a heavy-duty, emergency, as travel and key logistics are
Bluetooth padlock, all managed with the drastically simplified, saving on emissions,
visual CIPE Manager user interface. time and cost.

BEAT is IP68 rated and is designed Integration with Abloy CIPE enables the
specifically for the physical protection remote management of keys, locks, and
of critical infrastructure, businesses and access rights from a single, highly visual
remote sites. BEAT physically secures and easy to use interface. The BEAT high
property while offering customers improved security padlock can also be integrated with
operational efficiency, reducing both third party systems or added to your existing
logistics and costs. workflow.

Setting a benchmark in keyless solutions BEAT adds operational excellence to any


and heralding a new era of effortless mobile critical infrastructure organisation, in a wide
connectivity, the BEAT Bluetooth padlock range of sectors. It is always in sync with
utilises Seos® credential technology your security situation, keeping a smooth
for best-in-class security and privacy flow of all contractors and employees, while
protection. tracking every movement.

Made to perform at all times in the most


demanding environments, the BEAT smart
padlock is functional both online and offline,
and allows flexible access and activation
of user rights from wherever you are via the
mobile app.

13 Mobile Credentials: Access Control for the Mobile Workforce


PROTEC2 CLIQ®

PROTEC2 CLIQ® is an innovative easy-to-


use electrochemical locking system that The risk of lost or stolen keys is eliminated
enables remote key management, and as they can quickly be removed from the
provides comprehensive audit trails on locks system, so security can be confidently
and padlocks, and can be integrated with the maintained in circumstances where a key
CIPE Manager solution from Abloy UK. has been lost or stolen.

PROTEC2 CLIQ® is Approved for UK CLIQ® combines programmable physical


Government use and is trusted by many keys and a range of wireless locks and
critical infrastructure organisations across padlocks with user-friendly admin software.
the globe and fulfils the requirements This solution improves site and building
of regulators. security and offers flexible access rights and
key management, which can be controlled
anytime and from anywhere.

Mobile Credentials: Access Control for the Mobile Workforce 14


Conclusion

It’s clear to see why mobile credentials


are gaining in popularity, and while
there is certainly an increasing demand
for this kind of technology, there
will remain a requirement for alternative
solutions in certain environments.
Ultimately, the key is still a very practical
credential and shouldn’t be written off
as a less robust access solution.

By choosing a solution such as CIPE Manager


and Incedo Mobile Keys, organisations can
get the best of both worlds and adapt their
credentials for different applications to meet
their requirements.

This offers the ability to have a mix


of physical keys, cylinders and padlocks,
as well as digital technology using mobile
credentials where it is the best solution, all
integrated into one platform for convenient,
controlled and secure access management.

15 Mobile Credentials: Access Control for the Mobile Workforce


Abloy is a security and locking Contact
innovation company with trust Abloy UK
at the core of all our activities. By School Street
combining mechanical and digital Willenhall
expertise Abloy develops modern, West Midlands
industry leading security solutions WV13 3PW
to protect people, property and T: +44 (0)1902 364 500
business. Abloy is part of the ASSA E: info@abloy.co.uk
ABLOY Group W: www.abloy.co.uk

You might also like