WaveKey. Mobile phone access control made reliable

Raise the standards of smartphone access control systems to the next level together with us. Discover WaveKey technology.
CONTACT US

Door access control system of the future

Offer your customers something exceptional. WaveKey is the fastest mobile access control technology on the market, with best-in-class reliability and bulletproof security. See how we did it.

Best-in-class reliability

6 months of intensive testing at a busy office building has produced results. We have tested over 15,000 door openings with 100 different phone models covering 20 brands. You really can trust WaveKey.

The fastest on the market

WaveKey opens the door in 0.3 seconds, so you won’t have any problems using it in a busy office environment. The secret lies in its unique pre-authentication system of up to 8 mobile phones within the reader’s range.

Unwanted door opening solved

Thanks to adaptive algorithms and RSSi signal trend analysis, the reader knows whether the user is approaching the reader or moving away from it. A phone within range but lying on a table will never open a door.

Bulletproof security

Bluetooth communication is fully protected in our own secure channel. We used AES-128 and RSA-1024 encryption keys. It is essentially impossible to eavesdrop and misuse mobile credentials.

Frictionless distribution

With a few clicks in the web interface, the administrator generates mobile credentials and sends them to users remotely. There is no need to meet users to provide their credentials or spend on costly physical distribution.

We don’t charge for credentials

Liberate companies from needless costs. Mobile credentials for access control are always cheaper than RFID cards, but from us, they are completely free of charge. Just like the 2N® Mobile Key application itself.

Cloud-provisioned mobile credentials

If you use the My2N Management Platform to set up your 2N system and to assign mobile access rights, your users’ devices will have the Bluetooth credentials they need automatically.

Discover WaveKey in our video

Play

Choose from 4 different modes 

You control which modes are available in the readers so users can choose how to enter.

2N Wavekey
  • Touch mode ensures absolute convenience. Users only touch the reader with their hand or elbow and leave their phone in their pocket.

  • Contactless Tap in app mode offers greater security. Users must disable any lock screen, and open the door via a virtual button in the app. This is also an ideal way to open the exit gate from a car park while sitting in the car.

  • Motion mode is completely contactless. All you have to do is approach the video intercom with the phone in your pocket or wave your hand over its camera and the door will open.

  • The last option is Card mode. The phone works as a card, and the user has to place it right next to the reader. This is similar to the popular NFC technology, but with WaveKey, it works with Android and iOS phones.

What does our mobile access control system consist of?

The user needs the My2N App on their mobile phone. This is available for both iOS and Android and is free of charge. The next thing you need are Bluetooth-enabled access control readers and/or IP intercoms. Specifically, these are selected products from the 2N Access Unit 2.0 family, the 2N Access Unit M and the 2N IP Style, 2N IP Verso 2.0, 2N IP Verso and 2N LTE Verso intercoms. 

For fast access system management, including mobile access control, we strongly recommend using one of our management platforms (either the 2N Access Commander software or My2N Management Platform).

Why choose 2N mobile credentials access control? 

  • Convenience
    Convenience

    Users only need their mobile phone in their pocket to gain access
  • Simple distribution
    Simple distribution

    Credentials can be handed over remotely and frictionlessly
  • Minimum risk of misuse
    Minimum risk of misuse

    People rarely misplace or lend others their mobile phone
  • No wasted costs
    No wasted costs

    No need to pay to replace cards or keys
  • Privacy
    Privacy

    Avoid the problems of handling sensitive data such as fingerprints or facial scans