Access control systems with mobile credentials generally use one of two different technologies: BLE (Bluetooth Low Energy) or NFC (Near Field Communication).
We now do almost everything on our smartphones. This development has not gone unnoticed in the field of access control either. In this article, we explain the main differences between these two options.
Readers with BLE technology
- Range: Readers with BLE technology use a programmable and fast encrypted data transmission with a maximum range of 9 meters distance. This makes this technology very suitable for hands-free solutions. Depending on the applications, access can even be granted without taking the smartphone out of the pocket or bag. As long as the app is open, the user can simply walk through. As a result, BLE is often experienced by users as more convenient than NFC.
- Availability: In principle, all smartphones are suitable for the use of BLE. App-based systems use the user's smartphone to grant access or trigger processes.
- Installation: Most Bluetooth readers are mounted on the secure side of the door. But there are also readers that are suitable for mounting on the outside, should this be necessary in a specific situation.
Readers with NFC technology
- Range: Readers that use NFC offer the possibility of contactless data transmission over short distances. To do this, the user must hold his or her smartphone on or near the terminal to gain access. This can prevent the interference from other devices.
- Availability: NFC is only available for Android devices. Availability for iPhones and via Apple Pay is limited.
- Installation: Because the readers work with NFC technology with short distances, they are installed on the unsecured side of the door.
How are mobile access credentials changing the market?
The use of smartphones as a payment method or replacement for various plastic cards is not new. Therefore, it is only logical that smartphones are also used as an access reference. This method of access control also has a number of advantages over credentials. For example, users do not need to carry an extra tag or card.
In addition, no physical contact moment is required to transfer the references. No pass or tag needs to be handed over. Mobile credentials can be sent remotely to grant someone access to a secure building or space. This greatly increases convenience: for example, the possibilities to give visitors one-time remote access to a building, allow guests in a hotel to check in via their phone and open their room without going to the reception, new colleagues when HR is remote, and more.
How are mobile access credentials changing the market?
The use of smartphones as a payment method or replacement for various plastic cards is not new. Therefore, it is only logical that smartphones are also used as an access reference. This method of access control also has a number of advantages over credentials. For example, users do not need to carry an extra tag or card.
In addition, no physical contact moment is required to transfer the references. No pass or tag needs to be handed over. Mobile credentials can be sent remotely to grant someone access to a secure building or space. This greatly increases convenience: for example, the possibilities to give visitors one-time remote access to a building, allow guests in a hotel to check in via their phone and open their room without going to the reception, new colleagues when HR is remote, and more.
Reduced costs by using mobile credentials
Another important advantage of access control systems that use smartphones is the cost. By deploying mobile phones from the users themselves via a cloud-based system, it is no longer necessary to buy other tokens for identification. Think, for example, of cards or tags. In addition, it saves a lot of time, because the replacement, cancellation and (re)issue of the references can be arranged completely remotely.
But the cost is not the only advantage: in general, access control using mobile phones is safer than the usual cards or tags. The loss of a plastic key card can sometimes go unnoticed for a while, for example if an employee works from home for a few days or is on holiday, and therefore does not need his card. As a result, it also takes longer before the lost card can be blocked.
The lack of a smartphone, on the other hand, is immediately noticeable. Access permissions can then be blocked or changed within seconds, as everything happens immediately in the app. And even if it takes a while for the user to report that his or her phone is gone, mobile credentials are still more secure than a tag. Because most people have activated a code or facial recognition to secure their own smartphone, no one else can open the app to gain access.
How can companies switch?
Installers are often asked questions about the challenges of switching from a traditional access control system to one that uses mobile credentials. Especially for companies without their own security team, this seems to be a major challenge at first.
In most cases, however, no large investment is required. Depending on the current system, it may not even be necessary to replace existing readers. Many smart readers are designed with mobile credentials in mind, and can be easily upgraded to allow access via smartphones.
In addition, physical credentials, such as cards or tags, often go seamlessly with mobile credentials. For example, during a certain switching period, many readers can be set to use both ways. For example, the transition to smartphone use is going smoothly.
What does the user have to take into account when switching to access control with smartphones?
Before you advise your customer to switch to a certain access control system, it is especially important to explain that the systems basically include more than just the smartphones themselves. During the switch, advice is also needed on the selection of the right readers, transaction security, app integration and possibly back-end integration.
Here's how to choose the right technology:
- In order to be able to advise on the right access control system, it is useful to answer the following questions in advance:
- Is the goal to combine the use of mobile devices and smart cards, or to move to the use of mobile devices only?
- Which access control scenarios are needed at the specific location? And in which of these scenarios will mobile credentials be used?
- How can security, privacy, and convenience be ensured in the specific scenarios?
- How many people will use the system regularly?
- What roles and access rights should be assigned and managed?
- Do new processes or policies need to be established?
- How can mobile access control be integrated with back-end systems?
- Which areas should be supported by mobile access control? For example, parking garages, main entrances, elevators, office doors, server rooms?
- Which communication standard(s), BLE vs. NFC, would be suitable for the specific situation?
- How can the over-the-air communication between servers, mobile devices and readers be secured?
- How can you ensure that your customer's investment in mobile access control can be leveraged in the long term?
