{"id":3764,"date":"2021-12-01T09:27:12","date_gmt":"2021-12-01T08:27:12","guid":{"rendered":"https:\/\/www.digitalid.co.uk\/blog\/?p=3764"},"modified":"2024-11-14T10:02:19","modified_gmt":"2024-11-14T09:02:19","slug":"mobile-access-control-guide","status":"publish","type":"post","link":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/","title":{"rendered":"The Complete Guide to Mobile Access Control"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Your questions answered<\/h2>\n\n\n\n<p>Mobile devices have impacted almost all areas of our daily lives, with studies showing that more than half of you will be reading this on your mobile phone. Regardless of whether you\u2019re included in that percentage, mobile phones have unquestionably become an essential part of most of our lives. They have become the chosen method for many to carry out instant research, check personal and business emails and pay for products and services, among various other things.<\/p>\n\n\n\n<p>This increase in mobile phone usage among adults has caused companies to completely shift the way they look at operations, networks and security. As the world adapts to changes caused by the pandemic, integrating mobile devices to optimise everyday experiences is the logical step forward for the device\u2019s technologies.<\/p>\n\n\n\n<p>Enter&nbsp;Mobile Access Control.<\/p>\n\n\n\n<p>Mobile access is the innovative access control technology that combines two of our favourite things: mobile devices and complete efficiency. The technology aims to make access easy for all involved while optimising security and user experience every step of the way.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Our mobile access control guide will discuss the breakthrough technology, how it works and whether it really is as good as it may seem.<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What is mobile access control?<\/h2>\n\n\n\n<p>Mobile access control is the process of using a smartphone, tablet, or wearable device such as a smartwatch to unlock doors, emitting the need to carry key cards or key fobs. The modern access control method has gained popularity over the years and shows no sign of slowing down. As a result of its increasing growth, we anticipate the technology to eventually dominate the access control market.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How does mobile access control work?<\/h2>\n\n\n\n<p>An administrator grants access permissions to an end-user\u2019s device over the air. After receiving credentials, the end-user simply places their phone or smartwatch near a compatible door reader. BLE (Bluetooth Low Energy) and NFC (Near Field Communication) technology transmit data between the device and reader to grant end-users access through the doors. No physical access card is necessary.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"HID Twist &amp; Go Mobile Access solution powered by Seos\u2122\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/j-Z1T7czV7Q?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Where are mobile access control systems used?<\/strong><\/h2>\n\n\n\n<p>Mobile access control systems can be used in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Universities and educational establishments<\/li>\n\n\n\n<li>Office spaces<\/li>\n\n\n\n<li>Healthcare<\/li>\n\n\n\n<li>SME workplaces<\/li>\n\n\n\n<li>Stadiums &amp; Event settings<\/li>\n\n\n\n<li>Public sector buildings<\/li>\n<\/ul>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>There are no limits to which organisations can implement mobile access systems, as the future-led technology is an efficient solution for everyone.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How secure is mobile access control?<\/h2>\n\n\n\n<p>Mobile devices use advanced security features that extend much further than the capabilities of legacy cards. This ensures mobile access control systems offer an unparalleled, secure way to access the building.<\/p>\n\n\n\n<p>Here\u2019s how mobile access control offers you higher security than legacy access systems:<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">1. Regain control of your physical access system<\/h3>\n\n\n\n<p>Recent events have shown the impact of relying on 3rd party manufacturers and suppliers. Yes, we\u2019re talking about the global semiconductor chip shortage.<\/p>\n\n\n\n<p>With smartphone access control systems, you don\u2019t need to rely on 3rd parties to control your access requirements \u2013 that privilege belongs to you. As there&#8217;s no need to order physical access cards, you\u2019re no longer at the peril of delays, stock shortages or supplier issues. Instead, you can easily manage access from your very own management dashboard.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">2. Ensure no unwanted guests are on the premises<\/h3>\n\n\n\n<p>Instantly disable or restrict access via your secure management dashboard and keep unwanted visitors at bay. Or even carry out live audit trails to monitor who is on the premises at all times.<\/p>\n\n\n\n<p>Administrators can control access remotely with the management portal, ensuring access is always top of the agenda.<\/p>\n\n\n\n<p>Furthermore, ex staff members are no longer a threat. Security administrators can revoke access once they\u2019ve finished with the company, and you can forget about them showing up unannounced.<\/p>\n\n\n\n<p>What&#8217;s more, if unauthorised guests ever try to enter the building, your secure portal allows you to deny access instantly.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/Mobile-Access-Control-pic.jpg\"><img decoding=\"async\" src=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/Mobile-Access-Control-pic-1024x683.jpg\" alt=\"Mobile Access Control\" class=\"wp-image-3873\"\/><\/a><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">3. Credentials are out of sight<\/h3>\n\n\n\n<p>Providing credentials digitally ensures that no confidential information is ever on display. With credentials sent directly to a mobile device via a cloud-based server, they are away from prying eyes, reducing the risk of a security breach. Credentials are also encrypted to protect each person\u2019s identity, providing highly improved security measures.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">4. Unclonable access<\/h3>\n\n\n\n<p>It\u2019s common knowledge that <a href=\"https:\/\/www.digitalid.co.uk\/blog\/risks-of-outdated-access-control\" target=\"_blank\" rel=\"noopener noreferrer\">anyone can clone outdated access control cards<\/a> with technology available online. However, mobile credentials are protected by encrypted technology, ensuring credentials are unclonable. Implementing mobile access thus ensures no impersonators can enter your premises, protecting your staff, guests (the authorised ones), and company data.<\/p>\n\n\n\n<p>And the benefits don\u2019t stop there. Switching to mobile access control also eliminates the high percentage risk of card theft, as no physical key cards are necessary. With various clear security benefits of implementing a mobile access solution, it\u2019s clear that the modern access control technology is much more secure than legacy access systems.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What makes up a mobile access control system?<\/h2>\n\n\n\n<p>A mobile access control system consists of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Management portal<\/li>\n\n\n\n<li>Mobile device<\/li>\n\n\n\n<li>Access reader<\/li>\n\n\n\n<li>Access credentials (data)<\/li>\n<\/ul>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/Mobile-Access_Blog_v3.jpg\"><img decoding=\"async\" src=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/Mobile-Access_Blog_v3.jpg\" alt=\"components of a mobile access system\" class=\"wp-image-3792\"\/><\/a><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How to integrate mobile access control<\/h2>\n\n\n\n<p>Mobile access is easy to integrate. The process involves simply upgrading to a mobile-compatible door reader and purchasing mobile licences. Building owners can then control licences and instantly issue access permissions.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What are mobile access credentials?<\/h2>\n\n\n\n<p>Mobile credentials are an authentication method stored in a mobile device. Credentials verify an individual\u2019s identity.<\/p>\n\n\n\n<p>Each mobile credential is unique to an individual, and credentials are encrypted to protect the identity of users.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How do licences work?<\/h2>\n\n\n\n<p>Administrators purchase <a href=\"https:\/\/www.digitalid.co.uk\/blog\/what-are-hid-mobile-credential-licences\">mobile credential licences<\/a> and can start managing them instantly. Licences renew on a term-to-term basis, with billing recurring annually.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How is access managed?<\/h2>\n\n\n\n<p>Administrators can instantly grant, disable and manage permissions via the secure management dashboard. The portal is entirely remote, so managers can manage access from absolutely anywhere.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How do end-users set up mobile access control on their phones?<\/h2>\n\n\n\n<p>Administrators send end-users an invitation email. The invitation includes a link to download a mobile app and an invitation code. Once the end-user has downloaded the app, they must enter the invitation code in the app.<\/p>\n\n\n\n<p>Registration is now complete and administrators can begin sending mobile credentials to the device, allowing users to gain access to the building.<\/p>\n\n\n\n<p>Note that the registration process requires internet connectivity, via either mobile data or Wi-Fi.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Costs of mobile access control<\/h2>\n\n\n\n<p>Various components are necessary to produce access control cards, meaning there\u2019s a long list of costs involved. However, the costs associated with mobile access control are simple: upgrading readers, licences, and installation.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/Mobile-Access-Comparison_Blog.jpg\"><img decoding=\"async\" src=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/Mobile-Access-Comparison_Blog.jpg\" alt=\"access control cost comparison\" class=\"wp-image-3793\"\/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>It\u2019s clear to see that switching to mobile access decreases organisational costs, with significantly fewer components required. By making the move to the cost-efficient access method, your organisation could end up saving a fortune in the long term.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">FAQs and Common Misconceptions<\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Which mobile devices are compatible with mobile access control?<\/h3>\n\n\n\n<p>Most modern smartphones are compatible, including Android, iPhone, Huawei and Google Pixel. Smartwatches are also compatible, including Android and Apple watches.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">What happens if a personal mobile phone isn\u2019t available?<\/h3>\n\n\n\n<p>Organisations have the option of providing staff members with business mobile devices for access purposes should an individual not have access to their own device.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Is switching to mobile access expensive?<\/h3>\n\n\n\n<p>No. The long-term costs of mobile access are significantly lower than those associated with access control cards and other legacy card technologies. Therefore, switching to mobile access&nbsp;can actually save you money.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Is upgrading to mobile access control time-consuming?<\/h3>\n\n\n\n<p>No. Implementing mobile access is very straightforward and, with our help, stress-free. The process consists of only a few steps, and your new and improved mobile access control system could be up and running before you know it.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Does a stolen device mean unauthorised access to the building?<\/h3>\n\n\n\n<p>No. Enabling a passcode or biometric authentication on the device such as facial recognition protects the contents of your device from thieves. What\u2019s more, an administrator can instantly revoke access from the device, enforcing the highest level of security management for the workplace.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>Implementing a mobile access control solution will firmly position your organisation at the forefront of the digital world. With easy access, amplified security measures and endless <a href=\"https:\/\/www.digitalid.co.uk\/blog\/benefits-of-mobile-access-control\" target=\"_blank\" rel=\"noopener noreferrer\">benefits of mobile access<\/a> systems, it\u2019s clear to see why more and more organisations are choosing to make the switch. The dynamic access control method is undoubtedly the most effective in providing secure, optimised physical access.<\/p>\n\n\n\n<p>Users can use the same device to gain access to the building, connect to WIFI, log on to the intranet, check emails and access other IT resources. A user\u2019s phone becomes all they need to conquer the day.<\/p>\n\n\n\n<p>Get in touch on <strong>0800 988 2095<\/strong> to launch your organisation into the digital age. A member of our expert team will be able to discuss how implementing <a href=\"https:\/\/www.digitalid.co.uk\/mobile-access\">mobile access control<\/a> can revive your access control system and open doors for you today.<\/p>\n\n\n\n<p><strong>Reference\/Sources<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.statista.com\/statistics\/277125\/share-of-website-traffic-coming-from-mobile-devices\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Your questions answered Mobile devices have impacted almost all areas of our daily lives, with studies showing that more than half of you will be reading this on your mobile phone. Regardless of whether you\u2019re included in that percentage, mobile phones have unquestionably become an essential part of most of our lives. They have become [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5171,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[14],"tags":[],"class_list":["post-3764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-access"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Complete Guide to Mobile Access Control | Digital ID<\/title>\n<meta name=\"description\" content=\"Introducing mobile access control. Our in-depth mobile access control guide looks at the modern access method taking the industry by storm.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Complete Guide to Mobile Access Control | Digital ID\" \/>\n<meta property=\"og:description\" content=\"Introducing mobile access control. Our in-depth mobile access control guide looks at the modern access method taking the industry by storm.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"| Digital ID\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/digitalidltd\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-01T08:27:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-14T09:02:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"734\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adam Bennett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DigitalIDltd\" \/>\n<meta name=\"twitter:site\" content=\"@DigitalIDltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Bennett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/\"},\"author\":{\"name\":\"Adam Bennett\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/90cb6fda6b4d61a914038827fb33a512\"},\"headline\":\"The Complete Guide to Mobile Access Control\",\"datePublished\":\"2021-12-01T08:27:12+00:00\",\"dateModified\":\"2024-11-14T09:02:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/\"},\"wordCount\":1497,\"publisher\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg\",\"articleSection\":[\"Mobile Access\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/\",\"name\":\"The Complete Guide to Mobile Access Control | Digital ID\",\"isPartOf\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg\",\"datePublished\":\"2021-12-01T08:27:12+00:00\",\"dateModified\":\"2024-11-14T09:02:19+00:00\",\"description\":\"Introducing mobile access control. Our in-depth mobile access control guide looks at the modern access method taking the industry by storm.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#primaryimage\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg\",\"contentUrl\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg\",\"width\":1100,\"height\":734,\"caption\":\"The Complete Guide to Mobile Access Control\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.digitalid.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Complete Guide to Mobile Access Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/\",\"name\":\"Digital ID Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.digitalid.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#organization\",\"name\":\"| Digital ID\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2024\/11\/digital-ID-logo.png\",\"contentUrl\":\"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2024\/11\/digital-ID-logo.png\",\"width\":640,\"height\":196,\"caption\":\"| Digital ID\"},\"image\":{\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/digitalidltd\",\"https:\/\/x.com\/DigitalIDltd\",\"https:\/\/www.linkedin.com\/company\/digital-id\/\",\"https:\/\/www.youtube.com\/user\/DigitalIDltdUK\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/90cb6fda6b4d61a914038827fb33a512\",\"name\":\"Adam Bennett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/450becc7fde98eb90c0fea8ea793ab4606b813764cdc306fc6da8154d4e62d87?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/450becc7fde98eb90c0fea8ea793ab4606b813764cdc306fc6da8154d4e62d87?s=96&d=mm&r=g\",\"caption\":\"Adam Bennett\"},\"description\":\"Adam is Head of Marketing at Digital ID. He is in charge of the content creation and overseeing all aspects of digital marketing. His work has led him to become a leading authority in the space, being featured in publications such as The Telegraph, Entrepreneur.com, Newsweek and Huffington Post.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Complete Guide to Mobile Access Control | Digital ID","description":"Introducing mobile access control. Our in-depth mobile access control guide looks at the modern access method taking the industry by storm.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/","og_locale":"en_GB","og_type":"article","og_title":"The Complete Guide to Mobile Access Control | Digital ID","og_description":"Introducing mobile access control. Our in-depth mobile access control guide looks at the modern access method taking the industry by storm.","og_url":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/","og_site_name":"| Digital ID","article_publisher":"https:\/\/www.facebook.com\/digitalidltd","article_published_time":"2021-12-01T08:27:12+00:00","article_modified_time":"2024-11-14T09:02:19+00:00","og_image":[{"width":1100,"height":734,"url":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg","type":"image\/jpeg"}],"author":"Adam Bennett","twitter_card":"summary_large_image","twitter_creator":"@DigitalIDltd","twitter_site":"@DigitalIDltd","twitter_misc":{"Written by":"Adam Bennett","Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#article","isPartOf":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/"},"author":{"name":"Adam Bennett","@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/90cb6fda6b4d61a914038827fb33a512"},"headline":"The Complete Guide to Mobile Access Control","datePublished":"2021-12-01T08:27:12+00:00","dateModified":"2024-11-14T09:02:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/"},"wordCount":1497,"publisher":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg","articleSection":["Mobile Access"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/","url":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/","name":"The Complete Guide to Mobile Access Control | Digital ID","isPartOf":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg","datePublished":"2021-12-01T08:27:12+00:00","dateModified":"2024-11-14T09:02:19+00:00","description":"Introducing mobile access control. Our in-depth mobile access control guide looks at the modern access method taking the industry by storm.","breadcrumb":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#primaryimage","url":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg","contentUrl":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg","width":1100,"height":734,"caption":"The Complete Guide to Mobile Access Control"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalid.co.uk\/blog\/mobile-access-control-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.digitalid.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"The Complete Guide to Mobile Access Control"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalid.co.uk\/blog\/#website","url":"https:\/\/www.digitalid.co.uk\/blog\/","name":"Digital ID Blog","description":"","publisher":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalid.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.digitalid.co.uk\/blog\/#organization","name":"| Digital ID","url":"https:\/\/www.digitalid.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2024\/11\/digital-ID-logo.png","contentUrl":"https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2024\/11\/digital-ID-logo.png","width":640,"height":196,"caption":"| Digital ID"},"image":{"@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/digitalidltd","https:\/\/x.com\/DigitalIDltd","https:\/\/www.linkedin.com\/company\/digital-id\/","https:\/\/www.youtube.com\/user\/DigitalIDltdUK"]},{"@type":"Person","@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/90cb6fda6b4d61a914038827fb33a512","name":"Adam Bennett","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.digitalid.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/450becc7fde98eb90c0fea8ea793ab4606b813764cdc306fc6da8154d4e62d87?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/450becc7fde98eb90c0fea8ea793ab4606b813764cdc306fc6da8154d4e62d87?s=96&d=mm&r=g","caption":"Adam Bennett"},"description":"Adam is Head of Marketing at Digital ID. He is in charge of the content creation and overseeing all aspects of digital marketing. His work has led him to become a leading authority in the space, being featured in publications such as The Telegraph, Entrepreneur.com, Newsweek and Huffington Post."}]}},"uagb_featured_image_src":{"full":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg",1100,734,false],"thumbnail":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control-150x150.jpg",150,150,true],"medium":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control-768x512.jpg",768,512,true],"large":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control-1024x683.jpg",800,534,true],"1536x1536":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg",1100,734,false],"2048x2048":["https:\/\/www.digitalid.co.uk\/blog\/wp-content\/uploads\/2021\/12\/The-Complete-Guide-to-Mobile-Access-Control.jpg",1100,734,false]},"uagb_author_info":{"display_name":"Adam Bennett","author_link":"https:\/\/www.digitalid.co.uk\/blog\/author\/adam-bennett\/"},"uagb_comment_info":0,"uagb_excerpt":"Your questions answered Mobile devices have impacted almost all areas of our daily lives, with studies showing that more than half of you will be reading this on your mobile phone. Regardless of whether you\u2019re included in that percentage, mobile phones have unquestionably become an essential part of most of our lives. They have become&hellip;","_links":{"self":[{"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3764"}],"version-history":[{"count":2,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3764\/revisions"}],"predecessor-version":[{"id":5502,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3764\/revisions\/5502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/media\/5171"}],"wp:attachment":[{"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalid.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}