{"id":1173,"date":"2022-09-27T02:31:36","date_gmt":"2022-09-27T02:31:36","guid":{"rendered":"https:\/\/www.thinmoo.net\/?p=1173"},"modified":"2022-09-30T02:33:58","modified_gmt":"2022-09-30T02:33:58","slug":"convenient-mobile-access-control","status":"publish","type":"post","link":"https:\/\/www.thinmoo.net\/?p=1173","title":{"rendered":"Convenient Mobile Access Control"},"content":{"rendered":"\n<p>Who needs cards when everyone has a smartphone? That\u2019s the key question underlying the access control industry\u2019s transition to mobile credentials. But the transition is easier said than done, and mobile access control, for all its advantages, also has limitations, which further innovation continues to address. Wider acceptance comes next, driven by use cases in various vertical markets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-are-the-latest-developments-in-mobile-access-control\">What are the latest developments in mobile access control?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/mobile-access-control.png\" alt=\"mobile access control\" class=\"wp-image-1174\" width=\"266\" height=\"258\" srcset=\"https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/mobile-access-control.png 861w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/mobile-access-control-300x292.png 300w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/mobile-access-control-768x747.png 768w\" sizes=\"(max-width: 266px) 100vw, 266px\" \/><\/figure><\/div>\n\n\n\n<p>Modern access control solutions reflect society\u2019s growing reliance on smartphones, as today\u2019s technology providers replace key cards and key fobs with mobile applications capable of a wide range of authentication protocols. Some use biometrics, such as facial recognition or a fingerprint, others use QR codes, and others continue to use more traditional credentialing systems like passcodes or swiping a mobile app. <\/p>\n\n\n\n<p>They all serve as a critical form of identity verification for users looking to unlock or access doors, elevators, turnstiles, or even office printers. These solutions have helped countless facilities modernise their security systems, eliminating the problem of lost or stolen keys and reducing the reliance on 24\/7 door staffing. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"mobile-access-control-systems-come-with-additional-security-benefits-including-the-ability-to-revoke-access-at-any-point-and-maintain-a-log-of-entry-events-it-s-a-robust-but-simple-way-to-streamline-access-control-for-an-entire-facility\">Mobile access control systems come with additional security benefits, including the ability to revoke access at any point and maintain a log of entry events. It\u2019s a robust but simple way to streamline access control for an entire facility.<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/mobile-access.png\" alt=\"\" class=\"wp-image-1175\" width=\"490\" height=\"450\" srcset=\"https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/mobile-access.png 858w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/mobile-access-300x276.png 300w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/mobile-access-768x705.png 768w\" sizes=\"(max-width: 490px) 100vw, 490px\" \/><figcaption>Mobile Access Control<\/figcaption><\/figure><\/div>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-right is-layout-flow wp-block-quote-is-layout-flow\"><p>We are already seeing several organisations, especially in the education sector, adopting a mobile-first access control strategy. With near-field communication (NFC), you can simply use a smartphone or smart watch and tap it right to a reader to open a door without having to open an app. <\/p><p>Another interesting development that is likely to advance the adoption of mobile access control is the Physical Security Interoperability Alliance\u2019s Secure Credential Interoperability (SCI) initiative. SCI aims to increase interoperability and reduce the barriers to portability, supporting enterprise credential management across multiple device manufacturers. The SCI leverages existing standards and commercially available technology. This initiative will likely facilitate the integration of mobile access control and therefore encourage the development of non-proprietary solutions and a secure, open way to manage mobile credentials.<\/p><cite>Fran\u00e7ois Brouillet <small>Genetec, Inc.<\/small><\/cite><\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"it-s-said-that-over-half-of-the-world-s-entire-population-now-owns-a-smartphone-with-that-we-re-seeing-a-rapid-development-in-digital-technology-including-recent-advancements-in-mobile-access-control\">It\u2019s said that over half of the world\u2019s entire population now owns a smartphone. With that, we\u2019re seeing a rapid development in digital technology, including recent advancements in mobile access control. <\/h4>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.thinmoo.net\/?page_id=455\"><img decoding=\"async\" width=\"1000\" height=\"1000\" data-id=\"1178\" src=\"https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe21.jpg\" alt=\"\" class=\"wp-image-1178\" srcset=\"https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe21.jpg 1000w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe21-300x300.jpg 300w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe21-150x150.jpg 150w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe21-768x768.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.thinmoo.net\/?page_id=455\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" data-id=\"1176\" src=\"https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe31.jpg\" alt=\"\" class=\"wp-image-1176\" srcset=\"https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe31.jpg 1000w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe31-300x300.jpg 300w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe31-150x150.jpg 150w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe31-768x768.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.thinmoo.net\/?page_id=455\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" data-id=\"1177\" src=\"https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe41.jpg\" alt=\"\" class=\"wp-image-1177\" srcset=\"https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe41.jpg 1000w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe41-300x300.jpg 300w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe41-150x150.jpg 150w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/Q330\u4e3b\u56fe41-768x768.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<p>From iOS integration to data encryption, online systems continue to change the way building networks operate, and various mobile access control applications are making use of the rising standards in this field. <\/p>\n\n\n\n<p>The use of mobile phones and their apps has been a revelation to the hotel industry for example, where remote access now permits guests entry to various types of access points \u2013 removing the need for traditional key card methods for check in, check out and even lift access. <\/p>\n\n\n\n<p>When developing the Consort Mobile Access App, we recently found Bluetooth functionality and intuitive cloud compatibility were central to its success, with these elements \u2013 alongside sustainability \u2013 becoming core development areas when it comes to modern mobile access control.<\/p>\n\n\n\n<p><a href=\"https:\/\/thinmoo.en.alibaba.com\/\" data-type=\"URL\" data-id=\"https:\/\/thinmoo.en.alibaba.com\/\">Shenzhen Thinmoo Technology Co.,Ltd. <\/a>Focusing on software and hardware of intelligent mobile Internet products company , the company&#8217;s core team members from Huawei , Jingdong and the industry well-known enterprises, with more than 15 years of software and hardware design and development experience in intelligent hardware , Internet audio and video communications\\ security , artificial intelligence has a profound accumulation. <\/p>\n\n\n\n<p>We have launched the industry&#8217;s leading mobile Internet-based access control&amp;video door phone products , available in volume quantities to domestic and foreign customers, we adhere to the customer as the center, construction a team with a strong service capabilities , continuous innovation to meet customer needs , and strive to provide better products and services.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/\u4ea7\u54c1-6-1-1024x476.png\" alt=\"\" class=\"wp-image-1180\" width=\"954\" height=\"443\" srcset=\"https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/\u4ea7\u54c1-6-1-1024x476.png 1024w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/\u4ea7\u54c1-6-1-300x139.png 300w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/\u4ea7\u54c1-6-1-768x357.png 768w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/\u4ea7\u54c1-6-1-1536x714.png 1536w, https:\/\/www.thinmoo.net\/wp-content\/uploads\/2022\/09\/\u4ea7\u54c1-6-1.png 1745w\" sizes=\"(max-width: 954px) 100vw, 954px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Who needs cards when everyone has a smartphone? That\u2019s the key question underlying the access control industry\u2019s transition to mobile credentials. But the transition is easier said than done, and mobile access control, for all its advantages, also has limitations, which further innovation continues to address. Wider acceptance comes next, driven by use cases in &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.thinmoo.net\/?p=1173\"> <span class=\"screen-reader-text\">Convenient Mobile Access Control<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[36,63,64],"class_list":["post-1173","post","type-post","status-publish","format-standard","hentry","category-news-news","tag-mobile-access","tag-mobile-access-control","tag-smartphone"],"jetpack_publicize_connections":[],"_links":{"self":[{"href":"https:\/\/www.thinmoo.net\/index.php?rest_route=\/wp\/v2\/posts\/1173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thinmoo.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thinmoo.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thinmoo.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thinmoo.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1173"}],"version-history":[{"count":2,"href":"https:\/\/www.thinmoo.net\/index.php?rest_route=\/wp\/v2\/posts\/1173\/revisions"}],"predecessor-version":[{"id":1181,"href":"https:\/\/www.thinmoo.net\/index.php?rest_route=\/wp\/v2\/posts\/1173\/revisions\/1181"}],"wp:attachment":[{"href":"https:\/\/www.thinmoo.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thinmoo.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thinmoo.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}