MIA – the universal digital key solution from T-Systems
Solution

Mobile Identity & Access

A combination of identity verification and digital key solution

  • A digital key to access physical and logical resources
  • Central, cloud-based, mobile access and identity control
  • Secure login without password
  • More safety, convenience and efficiency
  • New utilization and delivery models possible
  • Simplification of processes and cost reduction due to digitization

Mobile Identity & Access: Digital access key and identity solution on the Internet of Things

A heavy collar with keys for house, apartment and office doors, car, garage door, mailbox? Full wallet and purse with a multitude of cards for access to all kinds of doors, parking, banking and more? Not only a problem for private individuals. Companies also struggle with key and password management as well as with authentication and security requirements. Not to mention the cost. The solution Mobile Identity & Access – MIA for short – combines digital key functions and identification procedures in the form of a smartphone app. Mobile Identity & Access is part of Deutsche Telekom's Internet of Things (IoT) family of products.

A digital key for (almost) everything

This digital universal key allows real-time identification of the user and makes it accessible to both physical and logical resources. All that is required is the smartphone to securely authenticate access to buildings or to open barriers or cars, such as trunk logistics. However, the mobile phone can also be used just as easily to log on to IT systems, company-internal networks, or web applications such as dashboards or customer portals. Even the use of banking machines is possible with Mobile Identity & Access.
Flyer
Mobile Enterprise Services
Mobilize your business holistically

Read now

Just in line with the motto "kill the password", user names and passwords are not required. Thanks to Bluetooth technology, the smartphone does not even have to be taken out of the pocket. The solution does not only optimize internal processes in companies, for example, by omitting the need to set up a new ID management system. Instead, it is simply docked onto existing systems (mobilization of existing identities). With MIA, companies also benefit from reduced costs and key management risks, as well as fully automatic billing. Security does not stop there: if the smartphone is lost or stolen, the digital key can be invalidated in almost real-time. In addition, a combination of different methods such as biometry, one time code, dynamic QR code, beacon technology, etc. provides additional security. Depending on the security requirements of the respective object, the security can be adapted by combining several authentication methods. The standardized security concept for end-to-end IoT solutions complies with the criteria of Deutsche Telekom.

Technical specifications

  • For iOS from version 8.0.x or higher and for Android from version 4.1 or higher
  • Ability to combine various safety methods depending on the need for protection
  • Safe identification of the counterpart
  • Central monitoring
  • Application-related security settings with anomaly detection
  • Remote management of digital keys and permissions
  • Overview of locations across the board
  • Data storage and processing in the highly secure German data center of Deutsche Telekom
  • Use of the scalable, future-proof and cloud-based Multi-IoT Service Platform (MISP) with integrated, immediately usable device management
  • Standardized security concept for end-to-end IoT solutions
  • Data protection according to German legislation

Infographic

Ecosystem of Mobile Identity & Access application scenarios

Video

Digital transformation is one of Deutsche Telekom’s strategic business units. In 2015, subsidiary T-Systems founded the Digital Division – the first unit of its kind in a Deutsche Telekom enterprise in Europe. 

Push The Button

Who really thinks about the button? It’s just there. And yet: if you push it, it will trigger something – increasingly even very complex actions. Especially in the age of digitization. The latest video from Deutsche Telekom uses the simple scenario of pushing a button to explain what the Digital Division, a unit of T-Systems, the corporate customers unit of Deutsche Telekom, can do for its customers.
 

The innovative digital key access system: Mobile Identity & Access

You might also be interested in
Digitizing accessibility and identification systems, and expand them into the mobile world and enrich them with new functions: this is the task of the product Mobile Identity & Access, MIA from T-Systems. This universal identification and digital key system can be used both for physical obstacles as well as for logical resources such as IT systems, desktops or web applications (e.g. customer portals or dashboards). The advantages: reduced effort through digital key management, no costs for procurement and management of physical keys or cards as well as flexible, simple and secure operation. How does the technology for this access control work?

Intelligent client-server solution

The digital key is operated with a client-server system. The client – a smartphone with the appropriate app – sends mobile information to a central server within Deutsche Telekom's Multi-IoT Service Platform (MISP). This information may vary: from GPS locating via QR codes photographed with the smartphone camera to Bluetooth signals, different variants are possible depending on the application scenario. An authorization process is then carried out on the Multi-IoT Service Platform. This checks whether the required access authorization is available. If so, access through the digital key is granted. In addition, resources can also be released remotely.

Always in sight: the smartphone

The benefits a digital key has with regards to physical barriers such as doors, elevators or bank lockers are obvious. In addition to convenience aspects for the user, the arguments about security are convincing. Unlike a traditional physical key, the digital key cannot be lost or stolen unintentionally – just like a smartphone. If a smartphone goes missing, the owner usually is sooner aware of this fact than it is the case with a missing key or wallet. With MIA, the access authorization can be immediately blocked online and further effects can be avoided. For example, the replacement costs for a key or even a complete locking system are eliminated.
A simple, efficient digital key management is attractive and cost-saving for the housing industry, service providers and companies in the areas of mobility and parking management. New business models are made possible, for example by the parcel deliverer for accessing trunks to drop parcels, or electric car drivers can unlock load columns by smartphone. Another plus is accessibility: wheelchair users or the elderly need only be close to open a door – no longer directly in front of the lock or card reader.
MIA can also bring benefits in the logistics sector: here, for example, subcontractors or couriers can also gain access through a digital key via MIA. In this way, roller doors can be opened, even if no staff is present – for example, after the end of the business day or at night. It is equally easy for these persons to withdraw their access rights.
MIA is an open system. The connection of existing PACS systems is supported, if appropriate interfaces are available. To support migrations parallel operation is possible. Various control concepts for gates, single doors, barriers, turnstiles are available.

Login without Username and Password

There are several options for secure logon to logical resources such as e-mail accounts, salary billing or order entry systems: using a scanned QR code, one-time-password or via Bluetooth. All variants have in common that their handling is extremely safe and easy, forgotten passwords are no longer a problem. With already existing interfaces to standard programs such as Salesforce or Office 365, MIA facilitates everyday life, since password and username are eliminated. Thus, MIA becomes an important tool and optimization lever.

Identification by peer-to-peer validation

In large enterprises, where not all employees know each other personally, the identification function of Mobile Identity & Access is a big advantage. The range extends from the general access regulation to particularly sensitive fields of application – for example to create an appropriate security standard for confidential meetings. This identification can take place eye-to-eye or – for example, during a telephone conference – via the system. This creates new opportunities in digital key management, for example, in terms of efficiency, security and simplification of important and confidential projects.

Related Topics