Digitizing accessibility and identification systems, and expand them into the mobile world and enrich them with new functions: this is the task of the product Mobile Identity & Access, MIA from T-Systems. This universal identification and digital key system can be used both for physical obstacles as well as for logical resources such as IT systems, desktops or web applications (e.g. customer portals or dashboards). The advantages: reduced effort through digital key management, no costs for procurement and management of physical keys or cards as well as flexible, simple and secure operation. How does the technology for this access control work?
Intelligent client-server solution
The digital key is operated with a client-server system. The client – a smartphone with the appropriate app – sends mobile information to a central server within Deutsche Telekom's Multi-IoT Service Platform
(MISP). This information may vary: from GPS locating via QR codes photographed with the smartphone camera to Bluetooth signals, different variants are possible depending on the application scenario. An authorization process is then carried out on the Multi-IoT Service Platform. This checks whether the required access authorization is available. If so, access through the digital key is granted. In addition, resources can also be released remotely.
Always in sight: the smartphone
The benefits a digital key has with regards to physical barriers such as doors, elevators or bank lockers are obvious. In addition to convenience aspects for the user, the arguments about security are convincing. Unlike a traditional physical key, the digital key cannot be lost or stolen unintentionally – just like a smartphone. If a smartphone goes missing, the owner usually is sooner aware of this fact than it is the case with a missing key or wallet. With MIA, the access authorization can be immediately blocked online and further effects can be avoided. For example, the replacement costs for a key or even a complete locking system are eliminated.
A simple, efficient digital key management is attractive and cost-saving for the housing industry, service providers and companies in the areas of mobility and parking management. New business models are made possible, for example by the parcel deliverer for accessing trunks to drop parcels, or electric car drivers can unlock load columns by smartphone. Another plus is accessibility: wheelchair users or the elderly need only be close to open a door – no longer directly in front of the lock or card reader.
MIA can also bring benefits in the logistics sector: here, for example, subcontractors or couriers can also gain access through a digital key via MIA. In this way, roller doors can be opened, even if no staff is present – for example, after the end of the business day or at night. It is equally easy for these persons to withdraw their access rights.
MIA is an open system. The connection of existing PACS systems is supported, if appropriate interfaces are available. To support migrations parallel operation is possible. Various control concepts for gates, single doors, barriers, turnstiles are available.
Login without Username and Password
There are several options for secure logon to logical resources such as e-mail accounts, salary billing or order entry systems: using a scanned QR code, one-time-password or via Bluetooth. All variants have in common that their handling is extremely safe and easy, forgotten passwords are no longer a problem. With already existing interfaces to standard programs such as Salesforce or Office 365, MIA facilitates everyday life, since password and username are eliminated. Thus, MIA becomes an important tool and optimization lever.
Identification by peer-to-peer validation
In large enterprises, where not all employees know each other personally, the identification function of Mobile Identity & Access is a big advantage. The range extends from the general access regulation to particularly sensitive fields of application – for example to create an appropriate security standard for confidential meetings. This identification can take place eye-to-eye or – for example, during a telephone conference – via the system. This creates new opportunities in digital key management, for example, in terms of efficiency, security and simplification of important and confidential projects.